-
How to prove false statements? (Part 1)
Trigger warning: incredibly wonky theoretical cryptography post (written by a non-theorist)! Also, this will be in two parts. I plan to be back with some more thoughts on practical stuff, like cloud backup, in the near future. If you’ve read my blog over the years, you should understand that I have basically two obsessions. One…
-
New Facebook Copyright Infringement Phishing Campaign
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to Sprout Social, Facebook is the third-most visited website following Google and YouTube. Thus, when a phishing campaign leverages the Facebook brand, the implications are particularly consequential. Email researchers at Check Point have…
-
Check Point Software Collaborates with AppDirect to Offer Streamlined Cyber Security Solutions
Check Point Software and AppDirect, a B2B subscription commerce platform, have unveiled a strategic collaboration, allowing businesses to effortlessly obtain Check Point’s AI-powered cyber security solutions through the AppDirect marketplace. This partnership offers a unified procurement experience, ensuring more customers have access to the highest level of security they deserve. According to Check Point Research’s…
-
CPR Finds Threat Actors Already Leveraging DeepSeek and Qwen to Develop Malicious Content
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms to develop malicious content. Threat actors are sharing how to manipulate the models and show uncensored content, ultimately allowing hackers and criminals to use AI to create malicious content. Called jailbreaking,…
-
Check Point Ranks #1 in Threat Prevention Testing: Miercom 2025 Enterprise & Hybrid Mesh Firewall Report
For the third consecutive year, Check Point ranked #1 for security effectiveness in all categories of the Miercom Enterprise and Hybrid Mesh Firewall Report. This report includes two new metrics: SSE/SASE Threat Prevention and Known Exploited Vulnerabilities (KEVs). Miercom’s independent, head-to-head stress testing establishes how well a platform can detect and block the latest generations…
-
AI-Powered Security Management for the Hyperconnected World
Today’s security approach is siloed. Each deployed security tool is designed to provide a specific type of protection across different areas like the network, endpoints, email, and cloud environments. This hybrid methodology, often requiring dozens of systems, leads to several security and operational challenges for security operations center (SOC) and network operations center (NOC) teams.…
-
Protect Your Organization from GenAI Risks with Harmony SASE
Love it or hate it, large language models (LLMs) like ChatGPT and other AI tools are reshaping the modern workplace. As AI becomes a critical part of daily work, establishing guardrails and deploying monitoring tools for these tools is critical. That’s where Check Point’s Harmony SASE comes in. We’ve already talked about Browser Security and…
-
Trump Should Increase High-Skilled Immigration
Elon Musk’s and Vivek Ramaswamy’s support for increasing high-skilled immigration visas has stirred up a political storm within conservative circles. Although Trump has supported Musk’s and Ramaswamy’s comments, his words conflict with his first-term immigration policies. If his change in rhetoric is matched by a change in policy, it would help make America great. Musk…
-
Is America Poised to Overreact to DeepSeek?
The last several days have been dubbed a “Sputnik moment” for Americans, who are discovering that foreign software engineers are much further ahead than previously thought. On January 20th, the Chinese company DeepSeek announced the release of their newest large language model (LLM) “DeepSeek R1.” Reportedly trained for just $6 million, DeepSeek R1 achieves capabilities…
-
DeepSeek, AppleCare, and Did Apple Approve a Porn App in the EU?
A change may be coming in the way you’ll be paying for Apple Care. Apple doesn’t approve of an app that it has approved—semantics are at the heart of a porn app problem. DeepSeek is this past week’s big artificial intelligence story. What’s different about this new AI contender? Does it secure your data? And…