-
New Facebook Copyright Infringement Phishing Campaign
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to Sprout Social, Facebook is the third-most visited website following Google and YouTube. Thus, when a phishing campaign leverages the Facebook brand, the implications are particularly consequential. Email researchers at Check Point have…
-
Check Point Software Collaborates with AppDirect to Offer Streamlined Cyber Security Solutions
Check Point Software and AppDirect, a B2B subscription commerce platform, have unveiled a strategic collaboration, allowing businesses to effortlessly obtain Check Point’s AI-powered cyber security solutions through the AppDirect marketplace. This partnership offers a unified procurement experience, ensuring more customers have access to the highest level of security they deserve. According to Check Point Research’s…
-
CPR Finds Threat Actors Already Leveraging DeepSeek and Qwen to Develop Malicious Content
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms to develop malicious content. Threat actors are sharing how to manipulate the models and show uncensored content, ultimately allowing hackers and criminals to use AI to create malicious content. Called jailbreaking,…
-
Check Point Ranks #1 in Threat Prevention Testing: Miercom 2025 Enterprise & Hybrid Mesh Firewall Report
For the third consecutive year, Check Point ranked #1 for security effectiveness in all categories of the Miercom Enterprise and Hybrid Mesh Firewall Report. This report includes two new metrics: SSE/SASE Threat Prevention and Known Exploited Vulnerabilities (KEVs). Miercom’s independent, head-to-head stress testing establishes how well a platform can detect and block the latest generations…
-
AI-Powered Security Management for the Hyperconnected World
Today’s security approach is siloed. Each deployed security tool is designed to provide a specific type of protection across different areas like the network, endpoints, email, and cloud environments. This hybrid methodology, often requiring dozens of systems, leads to several security and operational challenges for security operations center (SOC) and network operations center (NOC) teams.…
-
Protect Your Organization from GenAI Risks with Harmony SASE
Love it or hate it, large language models (LLMs) like ChatGPT and other AI tools are reshaping the modern workplace. As AI becomes a critical part of daily work, establishing guardrails and deploying monitoring tools for these tools is critical. That’s where Check Point’s Harmony SASE comes in. We’ve already talked about Browser Security and…
-
Accelerate Your Journey with the Microsoft End Customer Investment Funds (ECIF) Program
As a long-time Microsoft partner, Trustwave is well-positioned to help an organization tap into the Microsoft End Customer Investment Funds (ECIF) Program. Go to Source
-
How Trustwave’s Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview
Trustwave SpiderLabs has multiple methods and tools available to keep its teams apprised of the tactics, techniques, and procedures (TTPs) threat groups utilize during an attack, but perhaps the most useful is our cloud-native Fusion dashboard. Go to Source
-
Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats
This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. Go to Source
-
Friday Squid Blogging: On Squid Brains
Interesting. Blog moderation policy. Interesting. Blog moderation policy. Go to Source