BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Check Point
2:10
Wednesday

IcedID banking Trojan joins most wanted list

IcedID makes use of other malware to proliferate and has been used in several ransomware operations.

2:10

Companies can’t avoid mobile malware attacks

In 2020, 97% of businesses experienced a mobile malware attack, according to Check Point.

2:40
Jan 11, 2021

Emotet remains top malware threat

The malware has now been updated with new malicious payloads and more effective detection evasion capabilities. 

2:30
Jan 11, 2021

Cyber attacks spike in healthcare amid COVID-19 second wave

Check Point finds a further 45% increase in attacks targeting healthcare organisations globally, since the start of November last year.

3:20
Dec 4, 2020

Apps still vulnerable to old bug in Google Play Core Library

Vulnerable apps include Microsoft's Edge, Grindr, OKCupid, and Cisco Teams.

2:30
Aug 14, 2020

Vulnerabilities found in Alexa subdomains

Smart speakers and virtual assistants can be entry points into peoples’ lives, warns Check Point.

1:10
Jul 27, 2020

Preventing unknown, zero-day attacks

Only organisations that stress preventing unknown, zero-day threats can win the cyber security battle.

1:10
Jul 20, 2020

Enterprise mobile security: The complete guide

Considerations when evaluating a mobile security solution for your business.

1:10
Jul 13, 2020

White paper: AI helps achieve best cyber threat prevention rates

Check Point incorporates artificial intelligence into its unified, multi-layered security architecture.

3:00
Jul 10, 2020

Joker variant uses old trick to hit Google Play

The spyware keeps worming its way into Google’s official application market, says Check Point.

0:50

White paper: Check Point secure cloud blueprint

Agile security architecture for the cloud.

0:40
Jun 29, 2020

Check Point introduces 1500 Series Security Gateways

Next-generation firewall solutions for small and mid-sized business.

Related topics