Phosphorus and Check Point integrate to provide xIoT visibility and protection

Phosphorus has integrated with Check Point to provide the asset-centric xIoT visibility at the network level. Phosphorus’s Intelligent Active Discovery (IAD) engine and device posture assessment capabilities are able to enrich network-centric technolog… Continue reading Phosphorus and Check Point integrate to provide xIoT visibility and protection

7 free cyber threat maps showing attack intensity and frequency

Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on digital threats, showcasing the intensity and frequency of attacks as they happe… Continue reading 7 free cyber threat maps showing attack intensity and frequency

Iranian Cyber Spies Use ‘LionTail’ Malware in Latest Attacks

Check Point reports that an Iranian APT has been observed using a new malware framework in targeted attacks in the Middle East.
The post Iranian Cyber Spies Use ‘LionTail’ Malware in Latest Attacks appeared first on SecurityWeek.
Continue reading Iranian Cyber Spies Use ‘LionTail’ Malware in Latest Attacks

Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

A new study found that 4.31% of phishing attacks mimicked Microsoft, far ahead of the second most-spoofed brand PayPal. Continue reading Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

TP-Link routers implanted with malicious firmware in state-sponsored attacks

A Chinese state-sponsored APT group implanted malicious firmware into TP-Link routers as part of attack campaigns aimed at European foreign affairs entities, say Check Point researchers. Custom malicious firmware for TP-Link routers The malicious firmw… Continue reading TP-Link routers implanted with malicious firmware in state-sponsored attacks