IcedID banking Trojan joins most wanted list
IcedID makes use of other malware to proliferate and has been used in several ransomware operations.
Companies can’t avoid mobile malware attacks
In 2020, 97% of businesses experienced a mobile malware attack, according to Check Point.
Emotet remains top malware threat
The malware has now been updated with new malicious payloads and more effective detection evasion capabilities.
Cyber attacks spike in healthcare amid COVID-19 second wave
Check Point finds a further 45% increase in attacks targeting healthcare organisations globally, since the start of November last year.
Apps still vulnerable to old bug in Google Play Core Library
Vulnerable apps include Microsoft's Edge, Grindr, OKCupid, and Cisco Teams.
Vulnerabilities found in Alexa subdomains
Smart speakers and virtual assistants can be entry points into peoples’ lives, warns Check Point.
Preventing unknown, zero-day attacks
Only organisations that stress preventing unknown, zero-day threats can win the cyber security battle.
Enterprise mobile security: The complete guide
Considerations when evaluating a mobile security solution for your business.
White paper: AI helps achieve best cyber threat prevention rates
Check Point incorporates artificial intelligence into its unified, multi-layered security architecture.
Joker variant uses old trick to hit Google Play
The spyware keeps worming its way into Google’s official application market, says Check Point.
White paper: Check Point secure cloud blueprint
Agile security architecture for the cloud.