-
CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise
CISA adds four new vulnerabilities to its catalog, urging agencies to remediate risks. Learn about the latest exploits and how they impact enterprise security. Go to Source
-
How to Add Fingerprint Authentication to Your Windows 11 Computer
You can easily add a fingerprint reader to your computer if one isn’t already built in. Go to Source
-
21% of CISOs Have Been Pressured Not to Report a Compliance Issue, Research Finds
CISOs face growing boardroom pressure, compliance challenges, and cyber threats. Discover key insights from Splunk’s latest report on cybersecurity leadership. Go to Source
-
New Facebook Copyright Infringement Phishing Campaign
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to Sprout Social, Facebook is the third-most visited website following Google and YouTube. Thus, when a phishing campaign leverages the Facebook brand, the implications are particularly consequential. Email researchers at Check Point have…
-
CPR Finds Threat Actors Already Leveraging DeepSeek and Qwen to Develop Malicious Content
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms to develop malicious content. Threat actors are sharing how to manipulate the models and show uncensored content, ultimately allowing hackers and criminals to use AI to create malicious content. Called jailbreaking,…
-
Check Point Software Collaborates with AppDirect to Offer Streamlined Cyber Security Solutions
Check Point Software and AppDirect, a B2B subscription commerce platform, have unveiled a strategic collaboration, allowing businesses to effortlessly obtain Check Point’s AI-powered cyber security solutions through the AppDirect marketplace. This partnership offers a unified procurement experience, ensuring more customers have access to the highest level of security they deserve. According to Check Point Research’s…
-
AI-Powered Security Management for the Hyperconnected World
Today’s security approach is siloed. Each deployed security tool is designed to provide a specific type of protection across different areas like the network, endpoints, email, and cloud environments. This hybrid methodology, often requiring dozens of systems, leads to several security and operational challenges for security operations center (SOC) and network operations center (NOC) teams.…
-
Check Point Ranks #1 in Threat Prevention Testing: Miercom 2025 Enterprise & Hybrid Mesh Firewall Report
For the third consecutive year, Check Point ranked #1 for security effectiveness in all categories of the Miercom Enterprise and Hybrid Mesh Firewall Report. This report includes two new metrics: SSE/SASE Threat Prevention and Known Exploited Vulnerabilities (KEVs). Miercom’s independent, head-to-head stress testing establishes how well a platform can detect and block the latest generations…
-
Protect Your Organization from GenAI Risks with Harmony SASE
Love it or hate it, large language models (LLMs) like ChatGPT and other AI tools are reshaping the modern workplace. As AI becomes a critical part of daily work, establishing guardrails and deploying monitoring tools for these tools is critical. That’s where Check Point’s Harmony SASE comes in. We’ve already talked about Browser Security and…