Check Point Research (CPR) reports that a malware strain has evolved to steal the information of MacOS users. For as low as $49 on the Darknet, hackers can buy licenses for the new malware, enabling capabilities to harvest log-in credentials, collect screenshots, log keystrokes, and execute malicious files. Check PointRead More…

Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has expanded the capabilities of its unified Cloud Native Security Platform, to deliver application-first workload protection with Check Point CloudGuard Workload Protection. This fully automated cloud workload security solution empowers security teams with tools to automate security across applications,Read More…

Check Point Research (CPR) found a security vulnerability in Qualcomm’s mobile station modem (MSM), the chip responsible for cellular communication in nearly 40% of the world’s phones. If exploited, the vulnerability would have allowed an attacker to use Android OS itself as an entry point to inject malicious and invisibleRead More…

Omar Hofman, Malware analyst at Check Point elaborates on how remote access trojan exploits Telegram communications to steal data from victims and update itself to perform additional malicious activities. Telegram, the cloud-based IM platform has enjoyed a surge in popularity this year because of controversial changes to its rival, WhatsApp’sRead More…

Check Point Software Technologies announced its results from the MITRE ATT&CK Endpoint Protection Product Evaluation. The company’s complete endpoint security solution, Check Point Harmony Endpoint, successfully detected 100% of the unique techniques used during the evaluations. Furthermore, Check Point Harmony Endpoint achieved the highest technique detection level for 96% ofRead More…