Leveraging the Traffic Light Protocol helps CISOs share threat data effectively
EXECUTIVE SUMMARY: As cyber threats continue to evolve and become increasingly sophisticated, it is critical for organizations to share threat…
EXECUTIVE SUMMARY: As cyber threats continue to evolve and become increasingly sophisticated, it is critical for organizations to share threat…
Wondering what is crypto-ransomware? You’ve come to the right place. Because of the cryptocurrency boom, cyber threat actors have begun…
Cybersecurity researchers recently discovered a new wave of ChromeLoader malware that threat actors are using to circumvent antivirus software and…
Welcome to our February 2023 list of data breaches and cyber attacks. Our research identified 106 publicly disclosed incidents accounting…
Threat actors exploited a compromised Kubernetes container to attempt privilege escalation into an AWS account. Operation Scarleteel, as it was…
Access control is an important security measure for organizations of all sizes. Without it, intruders can gain access to sensitive…
As a result of another attack on LastPass’s systems, the company disclosed a severe data breach in December 2022 that…
EXECUTIVE SUMMARY: In today’s digital landscape, corporations are tasked with the responsibility of safeguarding their data from ever-evolving cyber threats.…
By Pete Nicoletti, Check Point Field CISO, Americas. Nearly half of cyber security leaders will change jobs by 2025 due…
Liat Doron is the Vice President of Learning and Training at Check Point Software Technologies. In this exclusive CyberTalk.org interview,…