You searched for Check Point Software/ | Page 2 of 2 | SC Media

Your search for Check Point Software/ returned 16 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 2 years remove
Post remove
Home remove

Your search for Check Point Software/ returned 16 results

Sort Results:

Relevant Recent
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Network Security, Secondary Featured, Security News, Vulnerabilities

Microsoft sounds alarm to fix wormable bug “SIGRed”

Microsoft Corporation on Patch Tuesday addressed 123 vulnerabilities — 18 of them critical — including a “wormable” flaw in Windows DNS Service that could be leveraged to execute remote code in the context of the Local System Account and then spread malware across various network devices. Officially designated CVE-2020-1350, the wormable flaw is caused by…
Cybercrime, Malware, Retail, Security News, Web Services Security, E-Commerce Security, Website/Web Server Security

Magecart attack on e-commerce service impacts Sesame Street store and many more

Magecart hackers found out how to get to Sesame Street’s online store – and in all likelihood thousands more merchants – by initially compromising e-commerce and shopping cart service provider Volusion to deliver the credit card-skimming code. Israel-based security researcher Marcel Afrahim, who for his day job works as a research developer at Check Point…
Gaming, Network Security, Patch Management, Security News, Vulnerabilities

Fixed Fortnite flaws could have enabled account takeovers

A series of vulnerabilities in the hugely popular online survival game Fortnite could have allowed malicious actors to take over players’ accounts, prompting developer Epic Games to fix the issues before a major incident transpired, according to researchers who discovered the program. Had the flaws been exploited, attackers could have victimized gamers by viewing their…
Network Security, Security News, Vulnerabilities

Remote Desktop Protocol flaws could be exploited to attack RDP clients

A research firm has disclosed multiple vulnerabilities in the Remote Desktop Protocol that, if left unpatched, could allow compromised or infected machines to attack the RDP clients that remotely connect to them. In a blog post today, Check Point Software Technologies researcher Eyal Itkin refers to this scenario as a reverse RDP attack because the…
Next post in Vulnerabilities