Asia's leading source of security and threat news
These search results are from across the Techday network of sites
September’s top malware, Emotet botnet strikes again – Check Point
Check Point’s researchers report that the notorious botnet has been reactivated and is spreading active campaigns again.
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Banking malware grows 50% while cryptominers decline – Check Point
The report’s findings are based on data drawn from Check Point’s between January and June 2019, highlighting the key tactics cyber-criminals are using to attack businesses.
Family Zone & Check Point take cyber safety to schools
The two companies say there are more than 2500 private and independent schools across Australia, many of which are looking for cyber safety solutions.
Check Point unveils new security gateways for data centers
"These new appliances will allow organizations to safely and efficiently adopt cloud technologies as part of their digital transformation."
Check Point research discovers new variant of mobile malware
“Agent Smith” malware automatically replaces installed apps with malicious versions without a user’s knowledge or interaction.
Check Point releases report on public cloud security challenges
Unauthorised access, insecure interfaces, misconfigurations and account hijacking named as the biggest vulnerabilities in the public cloud.
Major vulnerability found Electronic Arts gaming client
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.
Quantum computing in the telecom sector and more cybersecurity trends
According to a new report, quantum computing will be a destabiliser for the telecom sector, making PKI obsolete in the near future.
Check Point launches cloud security analytics solution
CloudGuard Log.ic detects cloud anomalies, blocks threats and intrusions, and delivers context-rich visualisations.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Check Point adds two new elements to partner program
Including extra rewards for customers’ CloudGuard IaaS purchases through AWS & Azure marketplaces.
Paranoid Android? Examining three key trends in Android malware
It definitely doesn’t mean you are paranoid if you’re worried about Android security: the threat landscape is growing in every dimension.
Check Point names February’s most disruptive malware
Check Point’s researchers confirm Coinhive holds the top position in February's Top Malware index for fifteenth successive month before it shut down, while GandCrab distribution campaigns increase.
Partners join The Wave: Westcon’s big beachy bash
Westcon’s beach-themed summer party invited partners in Christchurch, Wellington and Auckland to celebrate their success with a cheeky cocktail.
Check Point launches engagement-based partner programme
The new Check PointS partner programme directly rewards solution providers for activities that deepen customer relationships such as C-suite meetings.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Cybercrime tools and services becoming increasingly democratised
Findings from Check Point's new report reveal a concerning trend as cybercrime grows increasingly well-managed and accessible.
Cryptomining affected 37% of businesses last year
“From the meteoric rise in cryptomining to massive data breaches and DDoS attacks, there was no shortage of cyber-disruption."
Check Point launches hyperscale network security solution
With Check Point Maestro, organisations can scale up their existing Check Point security gateways on demand.
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.