Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • June 10, 2025

    Firebase CLI Installer Making Calls to Google Analytics

    Firebase is a mobile and web application development platform provided by Google. One of the tools available for the platform is the Firebase CLI tool (GitHub repo) which helps developers interact with the platform from command line. An automatic install script is offered among other options, which allows installation of the CLI tool via the…

    analytics, Cybersecurity, Cybersecurity awareness, firebase, Google, research, Security, Security Awareness
  • June 10, 2025

    New Tools for Addressing Supply Chain Attacks

    In the recent codecov.io security incident, an attacker modified a shell script used by a common software development tool for code coverage. This modification did not take place at the original source code repository where it would have been visible to others, but after the code was packaged and placed on the web server from…

    Cybersecurity, Cybersecurity awareness, research, Security, Security Awareness, supplychainattack, Tools
  • June 10, 2025

    No Excuses: Why Multi-Factor Authentication is Non-Negotiable

    Breaches are not a matter of if but when, which is why relying solely on passwords is a dangerous oversight. As the Product Security Manager for Harmony SASE, I’ve seen the destruction firsthand, and I’m here to tell you that MFA is not just “good practice” — it’s the absolute minimum standard of care. Why…

    Cybersecurity, Cybersecurity awareness, Harmony SASE, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    6 Key Insights from Check Point’s Cloud Security Report 2025

    Cloud environments are evolving faster than many security teams can adapt. As hybrid, multi-cloud, edge, and SaaS adoption accelerates, organizations face fragmented systems, inconsistent controls, and widening attack surfaces. Threat detection is often delayed, tools are overwhelmed, and many defenses have become outdated, all while attackers are scaling and automating attacks. Check Point commissioned a…

    Cybersecurity, Cybersecurity awareness, research, Securing the Cloud, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    Understanding Gartner Market Guide for Cloud Web Application and API Protection: How CloudGuard WAF Sets a New Standard in Web & API Protection

    How the market is evolving and why now, more than ever, you need an AI powered WAF What defines a next-generation web application and API protection (WAAP) platform? How can security teams keep pace with today’s fast-moving, API-driven threat landscape without slowing down innovation? According to the latest Gartner Market Guide for WAAP: “Security and…

    Cybersecurity, Cybersecurity awareness, innovation, Securing the Cloud, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    Lumma Infostealer – Down but Not Out?

    Key Findings: The takedown achieved a significant disruption to Lumma infostealers’ infrastructure, but likely didn’t permanently affect most of its Russia-hosted infrastructure. Lumma’s developers are undertaking significant efforts to reinstate the activity and to conduct business as usual. There seems to be a significant reputational damage to the Lumma infostealer, and the key factor for…

    Cybersecurity, Cybersecurity awareness, research, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    Quantum Force Firewalls Bring Lightning-Fast Cyber Security to the Branch Office

    Our hyperconnected world demands more from cyber security than ever before. Security leaders must prevent intrusions at the network level, but also protect a distributed, cloud-enabled workforce in hybrid roles and in branch offices with the same enterprise-grade security that protects a company’s headquarters.   A significant portion of work – and the workforce – resides…

    Artificial Intelligence, Cybersecurity, Cybersecurity awareness, innovation, Securing the Network, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    Accelerate your Operations with AI Powered Security Management and Quantum Smart-1 Management 700/7000 Series Appliances

    Check Point introduces powerful all-in-one Quantum Smart-1 700/7000 Security Management appliances to manage security policies for both on-premises and cloud firewalls, delivering consolidated visibility, logging, compliance, and auditing across enterprise networks. These new 7th generation Quantum Smart-1 Security Management appliances  boost efficiency by delivering 2X expansion in managed gateways, up to a 70% increase in…

    Artificial Intelligence, Cybersecurity, Cybersecurity awareness, innovation, Securing the Network, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    Employee Spotlight: Getting to Rolando Panez

    Rolando, can you tell us a bit about yourself? I’m a proud father of three beautiful girls. I was born and raised in Florida. I received a master’s degree in electrical engineering at the University of Florida. I worked on ASIC and board design for the space industry before transitioning to cyber security sales. What…

    Company and Culture, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Vulnerabilities
  • June 10, 2025

    Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments

    We’re excited to share that Check Point is acquiring Veriti, the first to introduce preemptive exposure management which automatically remediates threat exposures and prevents threat across complex multi-vendor estates.  In the era of hyperconnectivity and AI, reactive security is too slow  AI has brought cyber security to a tipping point, enabling the launch of attacks…

    Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Vulnerabilities
Previous Page
1 … 15 16 17 18 19 … 95
Next Page

Designed by Alireza Gharib