Check Point Software – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Wed, 23 Apr 2025 17:45:36 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png Check Point Software – Security Review Magazine https://securityreviewmag.com 32 32 Fuse Partners with Check Point Software https://securityreviewmag.com/?p=28105 Wed, 23 Apr 2025 17:45:36 +0000 https://securityreviewmag.com/?p=28105 Layer 2 payments blockchain Fuse has announced that it has partnered with Check Point Software Technologies to develop and deploy a real-time threat prevention security layer protecting its entire blockchain. Fuse’s commitment to integrate a best-in-class web3 security layer has been driven by a desire to lead by example and to prevent hacks and other incidents that are a constant threat across the omnichain landscape. The partnership will furnish Fuse with an advanced blockchain security layer that can identify and mitigate threats before they have had a chance to develop, moving blockchain defense from detection to real-time prevention

Through working closely with Check Point, Fuse will foster a safer ecosystem for all users and developers, accelerating its goal of mainstreaming crypto payments for B2B and B2C applications. Check Point’s technology is capable of preventing malicious transactions in real-time, leveraging advanced AI-powered threat engines that draw from more than 30 years of global cyber intelligence. The collaboration with Check Point extends beyond smart contract-level audits. With real-time threat detection coming soon, the integration will offer comprehensive protection across the entire network, reinforcing Fuse’s commitment to safeguarding user funds and trust, while establishing new standards for blockchain security infrastructure

Fuse CEO Mark Smargon said, “Prevention is always better than a cure, particularly with crypto networks that serve as the backbone for global payments. With Check Point providing a dedicated security layer, we’re confident that we can not only deter hackers, who are becoming increasingly sophisticated, but pioneer a cybersecurity model that will become the gold standard for protecting web3 protocols.”

“We’re proud to partner with Fuse and bring Check Point’s real-time threat prevention to Web3. By applying our leading threat intelligence, we’re setting a new standard for blockchain security—protecting users, wallets, and dApps,” says Dan Danay, Head of Web 3.0 Security at Check Point Software Technologies. “Just as robust cybersecurity powered the rise of Web 2.0, real-time prevention will be key to Web3’s mainstream adoption.”

Fuse recently launched Ember Nodes with support from leading partners including Collider Ventures, Tectona, Spark, TRGC, and Blockchain Founders Fund. It attracted broad community support, giving users an opportunity to acquire nodes and participate in network governance and validation. Just as it pioneered network firewall technology for Web 2.0, Check Point is now supporting the evolution of Web 3.0 by tackling its most critical barrier—security. The Check Point partnership will support Fuse in its quest to become the preeminent web3 network for stablecoin payments. In the process, it will champion better blockchain security for all users across its ecosystem.

]]>
Check Point Software’s 2025 Cyber Security Predictions: Emerging Tech and Advanced Criminal Tactics to Redefine Global Threats https://securityreviewmag.com/?p=27410 Tue, 19 Nov 2024 15:06:57 +0000 https://securityreviewmag.com/?p=27410 Check Point Software Technologies has announced its cyber security predictions for 2025, outlining key security challenges that organisations will face in the coming year. As businesses embrace new technologies, AI-driven attacks, quantum threats, and cloud vulnerabilities will redefine the digital threat landscape.

Key highlights from the 2025 global cyber security predictions report include:

  1. The Rise of AI-Powered Attacks: AI will become a core enabler of cybercrime in 2025. Threat actors will use AI to generate highly personalised phishing attacks and adaptive malware that can learn from real-time data to avoid detection. Smaller hacker groups will also use AI tools to launch large-scale operations without needing advanced expertise, democratising cybercrime.
  2. Ransomware Hits Supply Chains Hard: Ransomware will grow even more targeted and automated, with attacks on critical supply chains, with possibly large-scale attacks becoming more common, affecting entire industries, with attackers using AI-enhanced phishing emails and deepfake impersonations to bypass defences.
  3. Improper AI Usage Increases Data Breaches: With AI tools like ChatGPT becoming integral to business processes, accidental data exposure will become a key concern. Employees may inadvertently share sensitive data with external AI platforms, causing unintentional breaches. Organisations will need to establish governance frameworks to monitor AI usage and ensure data privacy.
  4. Quantum Computing Poses New Threats to Encryption: Quantum computing will soon challenge existing encryption methods. Although large-scale quantum attacks are still years away, industries like finance and healthcare must begin adopting quantum-safe encryption to stay ahead of this looming threat.
  5. Social Media Exploitation and Deepfakes Become Commonplace: Cybercriminals will increasingly target social media platforms, using personal data for targeted scams and impersonations. AI-powered deepfakes will become more convincing, posing threats to financial transactions and corporate security. Detecting and countering these sophisticated attacks will require real-time AI defences.
  6. AI-Driven SOC Co-Pilots Revolutionise Security Operations: Security Operations Centers (SOCs) will use AI co-pilots to process large volumes of data and prioritise threats, enabling faster response times. These AI-driven tools will help automate threat detection and reduce false positives, boosting the efficiency of security teams.
  7. CIO and CISO Roles Converge as AI Adoption Grows: As businesses adopt AI and hybrid-cloud environments, the roles of CIO and CISO will converge, shifting towards integrated risk management. The report predicts that CIOs will increasingly oversee cybersecurity operations, fostering tighter alignment between IT and security functions.
  8. Cloud Security Platforms Dominate the Landscape: Organisations will migrate towards integrated cloud security platforms, leveraging tools like CNAPP to monitor and secure multi-cloud environments. AI will play a crucial role in automating threat prevention, shifting the focus from reactive security to proactive defences.
  9. IoT Expansion Increases Attack Surface: With 32 billion IoT devices expected by 2025, securing these interconnected systems will become critical. Attackers will exploit poorly secured IoT devices to breach cloud networks. To mitigate these risks, organisations must adopt zero-trust architectures and AI-powered threat detection tools.

“In 2025, AI will drive both attacks and protections. Security teams will rely on AI-powered tools tailored to their unique environments, but adversaries will respond with increasingly sophisticated, AI-driven phishing and deepfake campaigns,” said Dr. Dorit Dor, Chief Technology Officer at Check Point.

“Meanwhile, attackers will exploit overlooked vulnerabilities as well as service accounts and machine-to-machine access keys for lateral movement within networks, further complicating defences. As cyber conflicts extend to social platforms and even the battlefield, organisations must use more preventative methods and adapt quickly to safeguard their operations from emerging threats.”

]]>
Check Point Software to Emphasise its Prevention-First Approach to Cyber Security https://securityreviewmag.com/?p=27243 Tue, 08 Oct 2024 07:30:42 +0000 https://securityreviewmag.com/?p=27243 Ram Narayanan, the Country Manager at Check Point Software Technologies for the Middle East, says the company will introduce Check Point Infinity XDR/XPR in the UAE

Tell us about your participation at GITEX 2024. Which products and solutions will you be showcasing at the event?
At GITEX 2024, Check Point Software will emphasise its prevention-first approach to cyber security, designed to effectively counter sophisticated cyber threats. A key highlight will be the demonstration of the Infinity AI Copilot, which leverages Gen AI to streamline security operations and enhance threat detection.

We are excited to introduce Check Point Infinity XDR/XPR in the UAE, providing customers with 360-degree visibility and seamless integration with third-party solutions. Additionally, our booth will showcase an enhanced Security Operations Center (SOC) offering, developed after our acquisition of Cyberint, which comprehensively addresses both external and internal threats, further reinforcing our commitment to protecting digital infrastructures.

How has the regional tech landscape evolved in the past couple of years?
The regional tech landscape has transformed significantly in the past few years, driven by rapid digital transformation initiatives and the increased adoption of cloud technologies and IoT solutions. However, these advancements have also led to a surge in cyber threats, as the region experiences an 18 per cent year-over-year increase in cyberattacks, according to Check Point Research’s cyber-attack trends report for Q2 2024.

Organizations are increasingly focused on strengthening their security posture, adopting AI-powered solutions that can pre-emptively detect and mitigate sophisticated, multi-vector attacks. The emphasis on smart cities and digital infrastructure has made cybersecurity a top priority for businesses and governments alike.

What are your expectations from the event this year?
This year at GITEX, Check Point is excited to be joined by several key partners for the first time, showcasing our unified efforts to enhance cyber security in the region. These partnerships emphasize our commitment to fostering strong collaborations within the GCC and delivering tailored cybersecurity solutions that address the specific needs of local businesses. Through engaging demonstrations and informative sessions, we aim to highlight our strategic initiatives and reaffirm Check Point’s dedication to empowering organizations against evolving threats while enhancing their digital resilience.

What will be your theme of participation at GITEX 2024?
At GITEX 2024, Check Point Software will focus on integrating advanced cybersecurity solutions tailored to the diverse needs of organizations across various sectors. Collaborating with regional partners at our booth reinforces our commitment to building strong partnerships in the GCC.

This collaboration will showcase how our AI-powered, cloud-delivered security solutions effectively prevent threats and provide comprehensive security management. Our approach highlights the importance of localized expertise in addressing the evolving cybersecurity challenges faced by businesses of all sizes in the region.

Do you plan to run any online engagements such as webinars and offline engagements such as tech talks, demos, keynotes, and so on, alongside GITEX 2024?
At GITEX 2024, we plan to unveil the Check Point Infinity XDR/XPR solution in the UAE, highlighting its advanced capabilities. Additionally, we plan to host live demonstrations, interactive launch sessions, and technical briefings at our booth, providing attendees with firsthand insights into our latest offerings and effective strategies for combating the evolving landscape of cyber threats.

How have your regional strategies changed in recent months?
In recent months, Check Point has intensified its focus on enhancing its presence in the GCC market by expanding its cyber security offerings and fostering strategic partnerships. The company has been actively collaborating with regional partners to deliver tailored solutions that effectively address the specific security challenges faced by businesses in the region.

By prioritising an AI-powered, prevention-first approach, Check Point is committed to adapting to the growing threat landscape while ensuring that its solutions seamlessly integrate with existing security systems. This approach reinforces the company’s dedication to enhancing digital resilience and delivering comprehensive threat protection across various sectors in the GCC.

How do your regional strategies align with regional development initiatives run by various governments?
At Check Point, our regional strategies are aligned with various governmental development initiatives aimed at enhancing digital security and resilience across multiple sectors. We recognize that as organizations embark on their digital transformation journeys, robust cybersecurity solutions are essential for navigating the ever-evolving technological landscape securely.

By integrating AI and cloud technologies into our offerings, we support broader efforts to establish secure and innovative digital ecosystems. For instance, initiatives like UAE Vision 2030 underscore the importance of strong cyber security in driving sustainable growth and fostering innovation. We are dedicated to contributing to these regional objectives.

An example of this commitment is the UAE Infinity Portal, which we launched last year. This unified security management platform is specifically tailored for businesses operating in the UAE, providing organizations of all sizes with advanced tools for threat prevention and security management, all while fully complying with local data privacy regulations. Through these efforts, we aim to not only enhance our customers’ security posture but also support the region’s overall growth and innovation goals.

]]>
Check Point Software Launches New MSSP Portal for Partners https://securityreviewmag.com/?p=27132 Thu, 05 Sep 2024 07:40:14 +0000 https://securityreviewmag.com/?p=27132 Check Point has unveiled its innovative Portal designed for both managed security service providers (MSSPs) and distributors. This platform significantly simplifies service delivery and enhances the ease of doing business with Check Point. According to Canalys, the global MSSP market is projected to grow by 14.2% annually, driven by increasing cyber threats and the need for specialized security services.

However, MSSPs and channel partners today face a range of challenges—from efficiently scaling their services, managing multiple customers across disparate security solutions, ensuring compliance with evolving industry regulations, to balancing operational costs with profitability. The Check Point MSSP Portal offers a powerful solution to overcome these hurdles, enhancing security and streamlining operations.

Francisco Criado, Check Point’s VP of Global Partner Ecosystem Organization, said, “Our new Portal is here to make life easier for our valued partners, enhancing efficiency and driving business growth. We are deeply committed to our partner ecosystem, and this Portal stands as a testament to our dedication, serving as a powerful ally in the fight against cybersecurity threats.”

At the core of these advancements is a meticulously designed, user-centric Portal that enables effortless onboarding of partners—a process that previously took as long as a week and now takes only two minutes. This efficiency not only saves time but also reduces operational costs for MSSPs. The Portal seamlessly integrates MSSPs into the Check Point Infinity Platform, marking a significant achievement in Check Point’s MSSP program and transforming business operations.

The Check Point MSSP Portal is not just about enhancing operational efficiency; it’s about transforming the way MSSPs engage with technology, manage services, and ultimately, how they meet the evolving security needs of their clients. It features a range of enhancements including:

  1. Effortless Onboarding: New capabilities empower distributors to onboard MSSPs with the click of a button
  2. Diverse Security Portfolio: Effortlessly deploy an array of services in minutes, such as endpoint, email, mobile, SASE, and cloud
  3. Profitability with Minimal Risk: Flexible billing, predictable revenue, no long-term commitments, or upfront investment
]]>
Check Point Software Boosts API Security, Supporting Enterprise Digital Transformation https://securityreviewmag.com/?p=26789 Wed, 29 May 2024 08:18:19 +0000 https://securityreviewmag.com/?p=26789 Check Point Software Technologies has reinforced its Web Application Firewall with the powerful API Discovery feature, aimed at strengthening organizations’ cloud assets. This innovative tool, combined with its cloud-native prevention first capabilities, has positioned Check Point as a leading performer in GigaOm’s latest Radar for Application and API Security.

Amidst mounting concerns regarding cloud security, Check Point continues to focus on preventing cyber threats and safeguarding digital assets through a prominent Cloud Native Application Protection Platform (CNAPP) solution. Check Point CloudGuard WAF is an integral part of the CNAPP platform, offering robust cloud web application and API security and effectively preventing attacks from infiltrating the cloud environment. Unlike traditional Web Application Firewalls (WAFs), CloudGuard WAF leverages advanced machine learning instead of relying on traditional signatures to block known and unknown attacks, ensuring real-time threat detection and protection against zero-day attacks such as Log4j and MOVEit.

For two consecutive years, Check Point has been selected as a leader. This year, GigaOm analyst Don MacVittie notes that “the biggest strength for Check Point CloudGuard WAF/open-appsec solution is API protection earning the highest score due to its innovative API import and API discovery.” MacVittie also highlights that “Check Point is one of several vendors that flipped from Feature Play to Platform Play,” emphasizing our collaborative Infinity Platform.

The new API discovery feature provides organizations with comprehensive insight into their API inventory across cloud environments. It enables security teams to effortlessly identify publicly exposed or vulnerable APIs. Leveraging its AI-optimized Schema, CNAPP empowers organizations to access and enforce API security effectively, thereby reducing the risk of unauthorized access and data breaches. The significance of these capabilities is clear, as Check Point’s 2024 Cloud Security Report revealed a significant increase in cloud security incidents, from 24% in 2023 to 61% in 2024 (a 154% increase), highlighting the increasing complexity and frequency of cloud threats.

“API Discovery completes our CloudGuard CNAPP and WAF solution, offering an impressive level of protection for cloud-native applications,” said Oded Gonda, VP Technology & Innovation at Check Point Software Technologies. “By focusing on the needs of modern enterprises, Check Point provides both API Discovery and protection for known attacks as well as pre-emptive protection countering future attacks.”

]]>
Check Point Software Announces 2024 Cloud Security Report https://securityreviewmag.com/?p=26714 Tue, 07 May 2024 09:14:54 +0000 https://securityreviewmag.com/?p=26714 Check Point Software Technologies Ltd. has today unveiled its 2024 Cloud Security Report. The report exposes a critical surge in cloud security incidents, marking a significant increase from 24% in 2023 to 61% in 2024 (a 154% increase), highlighting the escalating complexity and frequency of cloud threats. The latest survey from Check Point reveals a concerning trend: while most organizations continue to prioritize threat detection and monitoring, focusing on known vulnerabilities and patterns of malicious behaviour, only a mere 21% emphasize prevention. This is particularly alarming as companies struggle to keep pace with rapid technological advancements, including the speed of DevOps and the deployment of new codes and applications in the cloud.

The survey underscores a daunting reality— although cloud attacks are on the rise, only 4% of organizations disclosed that they can mitigate risks easily and quickly. An overwhelming 96% have expressed concern about their ability to handle such risks. In addition, 91% of respondents are alarmed by the surge in more sophisticated cyber threats, including unknown risks and zero-day attacks, which cannot be detected using conventional security tools.

“The data speaks volumes about the urgent need for organizations to shift their focus towards implementing AI-powered threat prevention measures,” states Itai Greenberg, Chief Strategy Officer at Check Point Software Technologies. “By adopting a consolidated security architecture and enhancing collaborative security operations, businesses can preemptively tackle emerging threats, ensuring a more secure and resilient cloud environment.”

Other insights from the 2024 Cloud Security Report:

  1. Escalation of Cloud Incidents: There has been a 154% increase in cloud security incidents compared to last year, with 61% of organizations reporting significant disruptions.
  2. Deep Concerns Over Risk Management: An overwhelming 96% of respondents reported concerns about their ability to effectively manage cloud risks, reflecting a considerable escalation from previous years.
  3. Rapid Adoption of AI Technologies: With 91% of organizations now prioritizing AI to enhance their security posture, the focus has shifted towards leveraging AI for proactive threat prevention.
  4. CNAPP for Enhanced Prevention: Despite the growing threat landscape, only 25% of organizations have fully implemented Cloud Native Application Protection Platforms (CNAPP). This underscores the urgent need for comprehensive solutions that go beyond traditional tooling.
  5. Complexity in Cloud Security Integration: Despite the potential for streamlined solutions, 54% of respondents face challenges in maintaining consistent regulatory standards across multi-cloud environments. Additionally, 49% struggle with integrating cloud services into legacy systems, often complicated by limited IT resources.

The report advises organizations to embrace a more comprehensive, collaborative, and AI-driven cybersecurity framework.

]]>
Check Point Software Launches New Partner Program https://securityreviewmag.com/?p=26436 Tue, 13 Feb 2024 08:55:58 +0000 https://securityreviewmag.com/?p=26436 Check Point Software Technologies has announced the launch of its innovative new Partner Program. Amidst an ever-evolving cybersecurity landscape, this program aims to strengthen partner capabilities and fuel growth. The cyber security sector is experiencing rapid growth and transformation. According to Canalys, cyber security spending hit $19 billion recently, reflecting the increasing need for collaborative security solutions. As technology evolves, so too do cyber threats, prompting an increased need for a unified cyber security platform that protects edge to network to cloud and beyond.

Organizations worldwide are increasingly turning to the channel for guidance not only on their cyber security solutions but also for regulations and building cyber resilience. Channel partners are well positioned to effectively communicate the value of cyber security solutions while addressing specific needs and concerns regarding existing and future threats.

With a partner-dedicated business model, Check Point’s new Partner Program strengthens the company’s commitment to partners while maximizing opportunities for joint growth. It is tailored to enhance partner performance and satisfaction. It focuses on boosting deal closure rates, which drives business growth, and streamlines quoting processes for quicker customer response. The program strengthens Check Point’s partnership engagement and encourages partners to develop specialized expertise, adding more value to their services. It also provides easier access to essential tools and resources, improving operational efficiency for partners.

“For over 30 years, Check Point has blazed the path for innovation in cyber security. In light of the current climate and increasing rate of cyber threats, we are launching a new, partner program to help our partners accelerate their efforts in providing the best cyber security,” said Francisco Criado, Check Point’s VP of Global Partner Ecosystem Organization. “We are excited to continue this journey with our partners, providing them with the best tools, resources, and support they need to thrive in our dynamic industry.”

The enhanced Partner Program is strategically aligned with Check Point’s comprehensive platform, focusing on its end-to-end AI-powered, cloud-delivered security. This program enables partners to effectively cross-sell and up-sell advanced security solutions from Check Point’s comprehensive portfolio, covering a broad spectrum of attack surfaces, and addressing needs in SASE, email security, cloud environments, SD-WAN, and mobile security. The program’s upgrades are geared toward leveraging these cutting-edge technologies, ensuring partners are equipped to meet diverse cybersecurity challenges. It features a range of enhancements including:

  • Simplification and tier progression: A new, consolidated tiering model to help increase participation across all levels. Partners are now given an Advanced, Professional, Premier and Elite status depending on the size of the business opportunity.
  • New pricing Model: Customer-focused pricing framework that is not only predictable and market-aligned, but also features the most significant discount structure ever offered by Check Point. Deal registrations have been increased by 100%, with a new incumbent partner program that delivers deal protection on renewals
  • Free Certification: Free certifications to meet partner-level compliance. Introducing customized tracks based on how the partner goes to market
  • Specialization: Additional training & certification to unlock additional benefits associated with specialisation that can lead to an additional 20% discount
  • App relaunch: A new and improved app, which has increased usage fivefold. New use cases provide access to training and enablement, subject matter experts and instantaneous deal registrations

“We are thrilled about the launch of Check Point’s new Partner Program, which represents a significant leap forward in enhancing our capabilities and driving growth,” said Pramod Nair, Sales Director at Cyberwise Middle East. “The refined tiering approach, along with transparent pricing, cumulative discounts and elevated deal registration incentives, creates a conducive environment for our business growth. The program’s emphasis on free certifications and specialization complements our efforts in delivering top-notch cybersecurity solutions to our customers. We look forward to leveraging the enhanced program’s resources and tools, ensuring our commitment to providing robust protection to our clients alongside Check Point.”

]]>
Check Point Software Completes Acquisition of Perimeter 81 https://securityreviewmag.com/?p=25951 Mon, 18 Sep 2023 12:52:26 +0000 https://securityreviewmag.com/?p=25951 Check Point Software Technologies has announced the completion of its acquisition of Perimeter 81, a pioneering Security Service Edge (SSE) company, with a team of over 200 employees that serves more than 3,000 customers worldwide. As hybrid work and cloud migration continue to be the norm, this acquisition reinforces Check Point’s dedication to ensuring fast and secure access for remote users, sites, data centres, and the internet.

“Welcoming Perimeter 81 into the Check Point family fortifies our position in the SASE market,” stated Gil Shwed, CEO at Check Point Software Technologies. “Their unique suite, which offers Zero-Trust Access, full mesh connectivity, and swift one-hour deployment, aligns perfectly with our vision of delivering the industry’s fastest, most secure SASE solution.”

Perimeter 81’s technology offers a unique suite of capabilities:

  1. Fast and secure Internet access for remote users and branch offices
  2. Cloud delivery with on-device network protection; avoiding latency, complexity and privacy concerns
  3. Zero-Trust with full mesh connectivity among users, branches and applications
  4. Simple and fast one-hour deployment
  5. Intuitive administration that reduces day-to-day overhead

“Check Point Infinity, the industry’s only consolidated cybersecurity architecture, shields enterprises across networks, endpoints, cloud, and mobile devices. This robust system not only meets the challenges posed by expanding connectivity and security gaps but also ensures collaborative threat intelligence sharing. The incorporation of Perimeter 81 into Check Point Infinity will heighten security precautions from the initial development phase, pinpoint vulnerabilities, and guide the necessary rectifications,” the company said.

Complementing this move, Check Point’s recent acquisition of Atmosec, a company specializing in the rapid discovery and disconnection of malicious SaaS applications, stands as a testament to the company´s proactive stance to enhance its SaaS security offering and bridge security gaps in SaaS applications. The inclusion of both Perimeter 81 and Atmosec with Check Point Infinity’s architecture will deliver a complete SASE offering across internet access, Zero-Trust private access, SaaS security and SD-WAN. This positions Check Point to lead in delivering unparalleled security solutions tailored to intricate cloud environments.

]]>
Check Point Software Launches Infinity Spark to Protect Small and Medium Businesses https://securityreviewmag.com/?p=25352 Thu, 16 Feb 2023 06:23:21 +0000 https://securityreviewmag.com/?p=25352 Check Point Software Technologies has today introduced Check Point Infinity Spark, a threat prevention solution that delivers AI security and integrated connectivity to small and medium-sized businesses (SMBs). Infinity Spark offers enterprise-grade security across networks, email, office, endpoint, and mobile devices. With a 99.7% malware catch rate, it protects SMBs against advanced threats including phishing, ransomware, credential theft, and DNS attacks.

“SMBs have shown a willingness to invest in cybersecurity to safeguard and support business growth especially as they adapt to the hybrid working model. However, with a growing shortage of skilled cyber professionals, these businesses need a solution that offers full coverage protection without complicated onboarding processes. Infinity Spark addresses this opportunity in the market by consolidating security into an ‘all-in-one’ platform with a simple monthly price plan,” said Eyal Manor, Vice President of Product Management at Check Point Software.

The Check Point Infinity Spark suite delivers:

  • Industry-Leading Threat Prevention: Check Point Infinity Spark provides a 99.7% prevention catch rate to protect SMBs against phishing, ransomware, credential theft, and DNS attacks.
  • Enterprise-grade all-in-one SMB Security Suite: SMBs are struggling to properly secure their critical assets, making them a growing target for cybercriminals. Designed to protect SMBs across the network, mobile, endpoint, email, and office.
  • New Quantum Spark SMB Next Generation Firewalls: Infinity Spark features Check Point’s Quantum Spark 1500 Pro Series, the industry’s first gateway with integrated artificial intelligence security, 5G, SD-WAN, and Wi-Fi 6. Check Point Quantum Spark Pro delivers 3 times faster Wi-Fi, high-speed 1 Gbps WAN connection with 5G, and integrated SD-WAN for better application performance and maximum uptime.

Eyal added: “In some cases, an SMB may turn to a Managed Service Provider (MSP) to defend them against cyberattacks, with many paying a premium for their cybersecurity services. Infinity Spark can decrease MSP operational costs by 50% through unified multi-tenant management, integrating four consoles into a single dashboard with zero-touch provisioning and scalable cloud services to support an unlimited number of SMBs.”

“Hybrid work has complicated SMB security and created a demand for a simplified and consolidated security platform.  Check Point Software offers a unique comprehensive security suite specifically built to enable SMBs and MSSPs to protect networks, devices, and applications against cyber-attacks while reducing the complexity of deployment and management. The Infinity Spark security suite is designed to provide SMBs with a simple, affordable, and integrated security solution right out of the box. This solution spans network, cloud, mobile, and endpoint security, including advanced threat prevention to make it easy to protect SMBs from security risks.”, said Pete Finalle, Security Research Manager, IDC

“Infinity Spark is a great and affordable way to offer end-to-end security for our small and midsized business customers. It provides complete protection for their employees both in and outside of the office. We have seen a significant reduction in our operational overhead with Check Point’s unified management console.” Said Emiel Harbers, CTO at Harbers ICT, The Netherlands.

]]>
ChatGPT is Being Used for Cyber Attacks https://securityreviewmag.com/?p=25185 Mon, 09 Jan 2023 08:45:00 +0000 https://securityreviewmag.com/?p=25185 Check Point Research (CPR) is seeing the first instances of cybercriminals using ChatGPT to develop malicious tools. In underground hacking forums, threat actors are creating infostealers, encryption tools and facilitating fraud activity. CPR warns of the fast-growing interest in ChatGPT by cybercriminals and shares three recent cases, with screenshots, of the development and sharing of malicious tools using ChatGPT.

Case 1: Threat actor recreates malware strains for an infostealer
Case 2: Threat actor creates multi-layer encryption tool
Case 3: Threat actor shows how to create a Dark Web marketplace script for trading illegal goods using ChatGPT

CPR is sharing three cases of recent observations to warn the public of the growing interest by cybercriminals in ChatGPT to scale and teach the malicious activity.

Case 1: Creating Infostealer

Figure 1. Cybercriminal showing how he created infostealer using ChatGPT

On December 29, 2022, a thread named “ChatGPT – Benefits of Malware” appeared on a popular underground hacking forum. The publisher of the thread disclosed that he was experimenting with ChatGPT to recreate malware strains and techniques described in research publications and write-ups about common malware.

In actuality, whilst this individual could be a tech-oriented threat actor, these posts seemed to be demonstrating less technically capable cybercriminals how to utilise ChatGPT for malicious purposes, with real examples they can immediately use.

Case 2: Creating a Multi-Layered Encryption Tool

Figure 2. Cybercriminal dubbed USDoD posts multi-layer encryption tool

On December 21, 2022, a threat actor dubbed USDoD posted a Python script, which he emphasized was the ‘first script he ever created’. When another cybercriminal commented that the style of the code resembles openAI code, USDoD confirmed that the OpenAI gave him a “nice [helping] hand to finish the script with a nice scope.”

Figure 3. Confirmation that the multi-layer encryption tool was created using Open AI

This could mean that potential cybercriminals who have little to no development skills at all, could leverage ChatGPT to develop malicious tools and become a fully-fledged cybercriminals with technical capabilities.

All of the aforementioned code can of course be used in a benign fashion. However, this script can easily be modified to encrypt someone’s machine completely without any user interaction. For example, it can potentially turn the code into ransomware if the script and syntax problems are fixed.

Case 3: Facilitating ChatGPT for Fraud Activity

Figure 4. Threat actor using ChatGPT to create DarkWeb Market scripts

A cybercriminal shows how to create a Dark Web marketplace scripts using ChatGPT. The marketplace’s main role in the underground illicit economy is to provide a platform for the automated trade of illegal or stolen goods like stolen accounts or payment cards, malware, or even drugs and ammunition, with all payments in cryptocurrencies.

Figure 5. Multiple threads in the underground forums on how to use ChatGPT for fraud activity

Sergey Shykevich, Threat Intelligence Group Manager at Check Point Software, says, “Cybercriminals are finding ChatGPT attractive. In recent weeks, we’re seeing evidence of hackers starting to use it to write malicious code. ChatGPT has the potential to speed up the process for hackers by giving them a good starting point. Just as ChatGPT can be used for good to assist developers in writing code, it can also be used for malicious purposes. Although the tools that we analyze in this report are pretty basic, it’s only a matter of time until more sophisticated threat actors enhance the way they use AI-based tools. CPR will continue to investigate ChatGPT-related cybercrime in the weeks ahead.”

]]>