TP-Link routers implanted with malicious firmware in state-sponsored attacks

A Chinese state-sponsored APT group implanted malicious firmware into TP-Link routers as part of attack campaigns aimed at European foreign affairs entities, say Check Point researchers. Custom malicious firmware for TP-Link routers The malicious firmw… Continue reading TP-Link routers implanted with malicious firmware in state-sponsored attacks

Check Point expands Harmony Endpoint with automated patch management capabilities

Check Point has expanded its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vuln… Continue reading Check Point expands Harmony Endpoint with automated patch management capabilities

Revelstoke collaborates with Check Point to automate detection and response solutions

Revelstoke announced partnership with Check Point to enhance edge network security, endpoint and XDR with low-code, high-speed automation, and to empower SOC teams to work more accurately and efficiently. Cybersecurity professionals seek to overcome ch… Continue reading Revelstoke collaborates with Check Point to automate detection and response solutions

ChatGPT and other AI-themed lures used to deliver malicious software

“Since the beginning of 2023 until the end of April, out of 13,296 new domains created related to ChatGPT or OpenAI, 1 out of every 25 new domains were either malicious or potentially malicious,” Check Point researchers have shared on Tuesd… Continue reading ChatGPT and other AI-themed lures used to deliver malicious software

Microsoft patches zero-day exploited by attackers (CVE-2023-28252)

It’s April 2023 Patch Tuesday, and Microsoft has released fixes for 97 CVE-numbered vulnerabilities, including one actively exploited zero-day (CVE-2023-28252). About CVE-2023-28252 CVE-2023-28252 is a vulnerability in the Windows Common Log File… Continue reading Microsoft patches zero-day exploited by attackers (CVE-2023-28252)

Rorschach ransomware deployed by misusing a security tool

An unbranded ransomware strain that recently hit a US-based company is being deployed by attackers who are misusing a tool included in a commercial security product, Check Point researchers have found. The solution in question is Palo Alto Networks&#82… Continue reading Rorschach ransomware deployed by misusing a security tool

Three crucial moments when founding a cybersecurity startup

With 10% of startups failing in the first year, making wise and future-proof decisions for your new cybersecurity venture is essential. Building the perfect cybersecurity startup As society adapts to an increasingly digital world, opportunities for cyb… Continue reading Three crucial moments when founding a cybersecurity startup

Check Point’s annual cybersecurity event spotlights power of AI

The company showcased dozens of new security tools and services to detect and prevent malware, phishing, ransomware and other attacks, but AI took center stage.
The post Check Point’s annual cybersecurity event spotlights power of AI appeared first on… Continue reading Check Point’s annual cybersecurity event spotlights power of AI