You searched for Check Point Software/ | SC Media

Your search for Check Point Software/ returned 17 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Doug Olenick remove

Your search for Check Point Software/ returned 17 results

Sort Results:

Relevant Recent
Cryptocurrency, Security News

Persistence and scale signature moves of new Monero miner campaign

A new Monero cryptomining campaign has been detected in the wild being spread and operating in a manner more consistent with ransomware and other attacks that retain a level of persistence than has been seen before. Check Point researchers said these mining operations have been on-going since mid-January using two specific trojans, Trojan.Win32.Fsysna and an…
Government/Defense, Security News

U.S., Israel move to harden aviation assets from cyberattack

The defense and aviation industries are taking a fresh and harder look at how well their top-of-the-line aircraft are protected from cyberattacks. In the U.S. the Lockheed-Martin F-35 is the recent focus of attention due to the fighter plane’s overwhelming dependence upon software to handle everything from weapons deployment to resupply, reported the Military Times.…
Malware, Security News

ShadowHammer code found in several video games

An adjunct to the ShadowHammer campaign has been uncovered that has video games being implanted with malware in a similar manner as was done with ASUS computers. Kaspersky Labs’ GReAT team previously disclosed ShadowHammer in March, after discovering the supply chain attack in January, but this time it tracked a case from the creator of…
Android Hack mobile security
Mobile Security, Security News

Millions of Android phones vulnerable to phishing attacks

More than half of the Android mobile phones in use are susceptible to an advanced text-based phishing attack that only requires a cybercriminal make a $10 investment. Check Point researchers found malicious actors using a remote agent to trick phone owners into accepting new phone settings that hand over various levels of control to the…
Cybercrime, Security News

Credential stuffing: Bigger and badder than ever

Credential stuffing has been around since 2014 enticing cybercriminals with a hefty return on investment and usage has increased of late as even more payment account credentials are stolen and sold on the dark web. Recorded Future just issued a report that looks at the economic environment surrounding credential stuffing and some of the tools…
Several vulnerabilities identified in TheCartPress WordPress plugin
Security News, Vulnerabilities

WordPress removes vulnerable Yuzo Related Posts plugin

Sometimes when an organization dutifully shuts down a plugin due to cybersecurity concerns it merely acts as a signal flare to attract malicious actors to a possible attack vector and that seems to be what happened with the WordPress plugin Yuzo Related Posts. WordPress shut down Yuzo Related Posts, which has 60,000 installs, on March…
Phishing, Security News

Wipro clients hit after firm falls for phishing attack

The Indian information technology consultancy firm Wipro has confirmed to the Economic Times that it is investigating a phishing attack that may have allowed its systems to be used to attack many of its clients. Wipro believes it was targeted, possibly by a nation-state attacker, who then used the company’s own systems to deliver follow…
Security News

2019 Mergers and acquisitions

January Sophos brings on DarkBytes, AvidThe companies did not release the financial details of the agreement, but Sophos said it plans to use DarkBytes technology as the foundation for new managed detection and response andSecurity Orchestration Automation Response services it plans to offer. Dan Schiappa, Sophos’ senior vice president and general manager of products, said Secure…
Executive Insight, Opinion

Automate your mobile application security without the staff

Mobile devices have overtaken desktop devices as the leading means to access applications and the internet. The growing demand for mobile apps creates a need for developers to improve their processes and release new features at an unprecedented rate to stay ahead of the competition. Consequently, the development community embraces newer processes such as Agile…
Executive Insight, Opinion

Putting zero trust into action

If awards were given for “Security Phrase of the Year”, surely zero trust would win the top prizes for 2019. The term graced the headlines of countless cyber industry articles, blogs, case studies and PowerPoint presentations, all created by organizations hoping to harness the power of this construct. The excitement is understandable, because it sure…
Next post in Executive Insight