You searched for Check Point Software/ | SC Media

Your search for Check Point Software/ returned 15 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 6 months remove

Your search for Check Point Software/ returned 15 results

Sort Results:

Relevant Recent
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Network Security, Secondary Featured, Security News, Vulnerabilities

Microsoft sounds alarm to fix wormable bug “SIGRed”

Microsoft Corporation on Patch Tuesday addressed 123 vulnerabilities — 18 of them critical — including a “wormable” flaw in Windows DNS Service that could be leveraged to execute remote code in the context of the Local System Account and then spread malware across various network devices. Officially designated CVE-2020-1350, the wormable flaw is caused by…
Cybercrime, Malware, Mobile Security, Security News

Malware found in popular barcode apps produces ads that instantly vanish

A pair of Android barcode reader apps that were downloaded more than 1 million times were found to contain ad fraud malware that tries to stay hidden by generating advertisements that instantly disappear from view. The malware, detected as AndroidOS_HiddenAd.HRXJA, can operate in the background even when infected devices aren’t actively being used, and it…
Network Security, Secondary Featured, Security News

Fake Cisco switches provoked network failures

Counterfeit Cisco devices were behind the failure of an IT company’s network switches last fall after a software upgrade, an investigation has found. Underscoring the security challenges posed by counterfeit hardware, the real-life anecdote prompted the victimized purchaser to commission F-Secure’s hardware security team to perform a thorough analysis of the components. The company discovered that…
Patch Management, Patch/Configuration Management, Security News, Vulnerabilities

Microsoft fixes 129 flaws, 23 critical, in massive Patch Tuesday

In a Patch Tuesday to rival June’s security update,  Microsoft fixed 129 new software vulnerabilities, including 23 critical flaws, impacting multiple platforms, including the Windows Graphic Device Interfaces (GDI), Microsoft SharePoint and Microsoft Exchange Server. Justin Knapp, Automox product marketing manager, attributed the patch laundry list to a remote workforce not going back to offices en masse…
Malware, Mobile Security, Privacy & Compliance News and Analysis, Security News

Glupteba malware leverages blockchain as a communications channel

Glupteba malware does something novel: It uses the bitcoin blockchain as a communications channel to receive updated configuration information. That’s important because malware always needs a way to go back to its home base, preferably without being detected, according to a paper released this week by Sophos Labs researchers. The new form of malware sprinkles…
Executive Insight, Opinion

Putting zero trust into action

If awards were given for “Security Phrase of the Year”, surely zero trust would win the top prizes for 2019. The term graced the headlines of countless cyber industry articles, blogs, case studies and PowerPoint presentations, all created by organizations hoping to harness the power of this construct. The excitement is understandable, because it sure…
Privacy & Compliance News and Analysis, Ransomware, Security News

SMBs imperiled as low-end RaaS grows more powerful

As Ransomware-as-a-Service (RaaS) has simultaneously grown more powerful and easier to use, just about anyone can launch successful, damaging ransomware attacks on organizations. Small and medium businesses are particularly vulnerable to the widening variety of tactics –from the “spray and pray” favored by Avaddon to the mass-market-based business model used by Dharma RaaS. “The skills…
Next post in Security News