Check Point Software Feeds

Fileless ransomware attacks are on the rise. Read how #ransomware like GandCrab take advantage of existing system tools such as Windows Management Instrumentation (WMI) or PowerShell, and how it can be stopped by Check Point #SandBlast Agent’s behavioral detection tool. bit.ly/2QBotPu #Gandcrab ...

View on Facebook

Headphones are a common item on Christmas and holiday wish lists. But like most things these days, they could be conduits to phishing and malware attacks. A recent vulnerability with Sennheiser headphones software brought this concern into focus. bit.ly/2SNYVv0 #CyberTalk #vulnerability ...

View on Facebook

Dunkin’ Donuts’ loyalty program, DD Perks, was hacked by a third party, Forbes reported recently. Approximately 9 million members, whose personal data was jeopardized, including information such as full names, email addresses, and DD Perks account numbers. via Cyber Talk: bit.ly/2zZ1T94 ...

View on Facebook

Glenn Gauvin, technical marketing engineer at Check Point, highlights CloudGuard Controller – Check Point’s adaptive could security enabler. For more information visit: bit.ly/2Bd8Sg5 ...

View on Facebook

Older sizing and testing tools of firewalls did little to forecast the capability to truly meet customers’ security requirements in today's conditions. Find out how Check Point’s enterprise security testing and sizing tool has evolved to accurately help customers choose the security appliance to meet their objectives and grow requirements. bit.ly/2GiWFul #enterprise #firewall #performance ...

View on Facebook