You searched for Check Point Software | SC Media

Your search for Check Point Software returned 12 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 6 months remove

Your search for Check Point Software returned 12 results

Sort Results:

Relevant Recent
Cybercrime, Finance, Phishing, Security News

Phishing operation picking on Canadian banks since at least 2017

Researchers recently discovered a large-scale phishing email operation that has been targeting primarily customers of Canadian banking chains since at least 2017. The emails generally attempt to trick recipients into revealing their credentials on a phishing page that utilizes a lookalike domain and impersonates a log-in screen. Researchers with Check Point Software Technologies uncovered the…
Coronavirus, Cybercrime, Malware, Security News

Foreign APT groups use coronavirus phishing lures to drop RAT malware

Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for knowledge concerning this pandemic. The perpetrators, and their victims, are based all over the world, as evidenced by two recently discovered global APT-style campaigns designed to spread remote access trojans. Fake Indian Health Advisory spreads…
Cybercrime, Malware, Retail, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security

Magecart attack on e-commerce service impacts Sesame Street store and many more

Magecart hackers found out how to get to Sesame Street’s online store – and in all likelihood thousands more merchants – by initially compromising e-commerce and shopping cart service provider Volusion to deliver the credit card-skimming code. Israel-based security researcher Marcel Afrahim, who for his day job works as a research developer at Check Point…
Product Review

FireMon Security Manager 8.26

  FireMon Security Manager uses intelligent policy automation so analysts have the ability to leverage comprehensive rule analysis and automated workflows for a streamlined change management process and to initiate proactive stance against risk. It works by ingesting security policies and configurations across an entire network. By leveraging APIs, FireMon discovers, maps and offers alerts…
Security News

2019 Mergers and acquisitions

January Sophos brings on DarkBytes, AvidThe companies did not release the financial details of the agreement, but Sophos said it plans to use DarkBytes technology as the foundation for new managed detection and response andSecurity Orchestration Automation Response services it plans to offer. Dan Schiappa, Sophos’ senior vice president and general manager of products, said Secure…
First Look, Reviews

First Look: Capsule 8 Protect

Product: Capsule 8 Protect Vendor: Capsule 8 Price: Sliding scale based on number of concurrent servers. What it does:  Provides endpoint protection and response for Linux based production systems.  Offering targets enterprises operating production facilities that cannot slow down or stop. What we liked: Smooth workflow for managing many separate data points.  It facilitates rapid processing of large volumes of data…
Cryptocurrency, Malware, Security News

Dexphot malware uses fileless techniques to install cryptominer

Microsoft Corporation yesterday revealed its discovery of a polymorphic malware that uses fileless techniques to execute a cryptomining program on victimized machines. Dubbed Dexphot, the malware was first observed in October 2018 when Microsoft detected a campaign that “attempted to deploy files that changed every 20 to 30 minutes on thousands of devices,” according to…
Coronavirus, News Archive, Security News

VPNs: Not a cybersecurity slam dunk for telecommuters in the age of COVID-19

CISOs and cybersecurity teams around the world are watching their threat surface multiply as millions of staffers find themselves working from home for the first time in order to help constrain the spread of Coronavirus. The removal of these people from the safe and controlled working environment found in their offices and tossing them into…
Ransomware, Security News

Talkin’ about an EVOLUTION…

In cybersecurity terms, is there anything more Darwin-esque than ransomware? Small variations in targets, attacks, points of entry, payout and even attacker priorities have saved it from extinction and increased its ability to compete, survive and reproduce just as Charles Darwin contended organisms developed. Unfortunately, though, those attacks have evolved into a greater menace for…
APTs/cyberespionage, Cybercrime, Events, Malware, Network Security, Ransomware, Research, SC Security Ops Center, Security News, Vulnerabilities

We interviewed cyber experts on a Vegas ferris wheel. Then ride security showed up…

In the film “Ocean’s 11,” Danny Ocean and his team of expert cybercriminals execute a daring casino heist in glitzy Las Vegas. This past summer at the Black Hat and DEF CON conferences in Sin City, the editorial staff at SC Media attempted to pull off a less ambitious – and decidedly more legal –…
Next post in Network Security