Posts

Showing posts with the label Check Point Blog

VMworld 2018: Possible begins with agile and automated security

It’s August in Vegas and things are really starting to heat up, especially now that VMworld 2018 (#VMworld) is right around the corner! Taking place on August 26 – 30, VMWorld is shaping up to be quite a showcase of all things virtual networking and beyond! We are thrilled to be returning as a Gold Sponsor for this year conference, and we’re excited to showcase our latest capabilities for helping organizations keep their virtual environments and mobile workforces protected from the latest fifth generation (GenV) cyber-attacks.   We’ve been a long-standing partner of VMware for many years; jointly developing leading solutions to help organizations securely transform their businesses to fully realize the benefits of the cloud and enterprise mobility. Over the past year, we’ve been hard at work enhancing our CloudGuard capabilities for VMware NSX as well as VMware Cloud on AWS and will be showcasing it all at our booth #1256. Our cloud and mobile security teams will be on hand and ...

VMworld 2018: Possible begins with agile and automated security

It’s August in Vegas and things are really starting to heat up, especially now that VMworld 2018 (#VMworld) is right around the corner! Taking place on August 26 – 30, VMWorld is shaping up to be quite a showcase of all things virtual networking and beyond! We are thrilled to be returning as a Gold Sponsor for this year conference, and we’re excited to showcase our latest capabilities for helping organizations keep their virtual environments and mobile workforces protected from the latest fifth generation (GenV) cyber-attacks.   We’ve been a long-standing partner of VMware for many years; jointly developing leading solutions to help organizations securely transform their businesses to fully realize the benefits of the cloud and enterprise mobility. Over the past year, we’ve been hard at work enhancing our CloudGuard capabilities for VMware NSX as well as VMware Cloud on AWS and will be showcasing it all at our booth #1256. Our cloud and mobile security teams will be on hand and ...

VMworld 2018: Possible begins with agile and automated security

It’s August in Vegas and things are really starting to heat up, especially now that VMworld 2018 (#VMworld) is right around the corner! Taking place on August 26 – 30, VMWorld is shaping up to be quite a showcase of all things virtual networking and beyond! We are thrilled to be returning as a Gold Sponsor for this year conference, and we’re excited to showcase our latest capabilities for helping organizations keep their virtual environments and mobile workforces protected from the latest fifth generation (GenV) cyber-attacks.   We’ve been a long-standing partner of VMware for many years; jointly developing leading solutions to help organizations securely transform their businesses to fully realize the benefits of the cloud and enterprise mobility. Over the past year, we’ve been hard at work enhancing our CloudGuard capabilities for VMware NSX as well as VMware Cloud on AWS and will be showcasing it all at our booth #1256. Our cloud and mobile security teams will be on hand and ...

Quickly Gauge Your Security’s Generation With This 5-Question Quiz

by Bob Matlow, Cyber Security Advocate   The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have adapted to this new reality by launching multi-vector, polymorphic, globally-scaled attacks – but IT professionals are lagging behind.  Only 3 percent of companies   have translated the new information into best practices that make their organizations more secure.   To bridge the gap between the visionary and the practical, Check Point has developed a five question security quiz –   an easy way for IT professionals to discover which of the five generations best describes their security. In addition, our experts offer advice on how to bring cyber security in each generation up to today’s standard of fifth- generation cyber security. It only takes moments to take the quiz and receive insightful feedback from world-class cyber security e...

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are relegated to cameo roles.   Nowadays, thought leaders in the security industry are shifting their views on sharing information after cyber attacks – instead of just shaming the victim, there’s an oppurtinity to safely share knowledge and intelligence for the greater good.   From the trenches of cyber-warfare, this blog is the first part of a regular series telling the Check Point incident response teams’ war stories. We hope that our experiences and insights can help the security community while educating the public on handling cyber attacks.   In the middle of April 2018, Check Point’s Managed Security Services (MSS) team and Check Point Incident Response noticed that something was amiss at a particular university in the Asia-Pacific region.   A PC in thei...

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are relegated to cameo roles.   Nowadays, thought leaders in the security industry are shifting their views on sharing information after cyber attacks – instead of just shaming the victim, there’s an oppurtinity to safely share knowledge and intelligence for the greater good.   From the trenches of cyber-warfare, this blog is the first part of a regular series telling the Check Point incident response teams’ war stories. We hope that our experiences and insights can help the security community while educating the public on handling cyber attacks.   In the middle of April 2018, Check Point’s Managed Security Services (MSS) team and Check Point Incident Response noticed that something was amiss at a particular university in the Asia-Pacific region.   A PC in thei...

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Image
Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of all organizations across the world were impacted by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May.  These vulnerabilities all enable attackers to execute malicious code and gain remote control of the target devices.   Known vulnerabilities offer cyber-criminals an easy and relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities, in particular, are often ‘the path of least resistance’, as once one device...

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Image
Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of all organizations across the world were impacted by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May.  These vulnerabilities all enable attackers to execute malicious code and gain remote control of the target devices.   Known vulnerabilities offer cyber-criminals an easy and relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities, in particular, are often ‘the path of least resistance’, as once one device...

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Image
Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of all organizations across the world were impacted by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May.  These vulnerabilities all enable attackers to execute malicious code and gain remote control of the target devices.   Known vulnerabilities offer cyber-criminals an easy and relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities, in particular, are often ‘the path of least resistance’, as once one device...

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Image
Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of all organizations across the world were impacted by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May.  These vulnerabilities all enable attackers to execute malicious code and gain remote control of the target devices.   Known vulnerabilities offer cyber-criminals an easy and relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities, in particular, are often ‘the path of least resistance’, as once one device...

July’s Most Wanted Malware: Attacks Targeting IoT and Networking doubled since May 2018

Image
Three IoT vulnerabilities entered July’s top ten most exploited vulnerabilities list, as threat actors have doubled their attacks on these Mirai and Reaper-related vulnerabilities since May 2018.   During July 2018, three IoT vulnerabilities entered the Top 10 most exploited list: MVPower DVR router Remote Code Execution at #5; D_Link DSL-2750B router Remote Command Execution at #7; and Dasan GPON router Authentication Bypass at #10. Together, 45% of all organizations across the world were impacted by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May.  These vulnerabilities all enable attackers to execute malicious code and gain remote control of the target devices.   Known vulnerabilities offer cyber-criminals an easy and relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities, in particular, are often ‘the path of least resistance’, as once one device...