Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Check Point research discovers new variant of mobile malware
“Agent Smith” malware automatically replaces installed apps with malicious versions without a user’s knowledge or interaction.
Check Point releases report on public cloud security challenges
Unauthorised access, insecure interfaces, misconfigurations and account hijacking named as the biggest vulnerabilities in the public cloud.
Major vulnerability found Electronic Arts gaming client
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.
Quantum computing in the telecom sector and more cybersecurity trends
According to a new report, quantum computing will be a destabiliser for the telecom sector, making PKI obsolete in the near future.
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Check Point adds two new elements to partner program
Including extra rewards for customers’ CloudGuard IaaS purchases through AWS & Azure marketplaces.
Paranoid Android? Examining three key trends in Android malware
It definitely doesn’t mean you are paranoid if you’re worried about Android security: the threat landscape is growing in every dimension.
Check Point names February’s most disruptive malware
Check Point’s researchers confirm Coinhive holds the top position in February's Top Malware index for fifteenth successive month before it shut down, while GandCrab distribution campaigns increase.
Partners join The Wave: Westcon’s big beachy bash
Westcon’s beach-themed summer party invited partners in Christchurch, Wellington and Auckland to celebrate their success with a cheeky cocktail.
Check Point launches engagement-based partner programme
The new Check PointS partner programme directly rewards solution providers for activities that deepen customer relationships such as C-suite meetings.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Cybercrime tools and services becoming increasingly democratised
Findings from Check Point's new report reveal a concerning trend as cybercrime grows increasingly well-managed and accessible.
Cryptomining affected 37% of businesses last year
“From the meteoric rise in cryptomining to massive data breaches and DDoS attacks, there was no shortage of cyber-disruption."
Check Point launches hyperscale network security solution
With Check Point Maestro, organisations can scale up their existing Check Point security gateways on demand.
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Signs of erosion in Cisco’s IT infrastructure dominance
While still maintaining a significant lead, Cisco finished 2018 with a slightly smaller piece of the pie in the enterprise IT infrastructure market.
Check Point announces general availability for CloudGuard SaaS
CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email.
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Once legit site found to be cryptomining, 6,000 machines infected
Check Point researchers discovered a previously legitimate video software download site has moved into cryptomining, earning around US$700 a day.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested."
Gen V cyber attacks are here, but most firms are 10 years behind, says Check Point
Security vendor Check Point believes that the age of Gen V cyber threats is now upon us, but organisations’ security defences are 10 years behind.