Google Docs Phishing

Using the comment feature in Google Docs represents another instance in the evolution of BEC 3.0. Utilizing legitimate sites makes it easy for hackers to end up in t...

Read more

URL-Based Phishing: Fake Louis Vuitton

Phishing through URL-based scams is a deceitful tactic used by hackers to obtain confidential information from users by creating fake links that mimic legitimate one...

Read more

30 Years of Cyber Leadership

This month, Check Point celebrated 30 years as a company. This is an incredible achievement for any company.

Read more

Teams Attacks Continue to Spread

Last week, we wrote about a new Teams malware variant making the rounds. As we wrote, the vulnerability essentially allows hackers to bypass all security measures an...

Read more

Finding Phishing Help via Facebook

Cybercriminals have a sneaky technique up their sleeves - brand phishing, also known as brand impersonation or brand spoofing. This tactic involves assuming the iden...

Read more

New Teams Attack Delivers Instant Malware

A recently discovered vulnerability in Microsoft Teams has opened the door for non-employees to effortlessly send harmful files to employees without undergoing any s...

Read more

Phorm Phishing: Using Form Service APIs to Steal Credentials

In recent months, Check Point Research has observed a surge in phishing attacks that exploit reputable online form builder services like Formspark, Formspree, EmailJ...

Read more

The Unified Quarantine: Saving the SOC Team Time and Frustration

It is widely acknowledged in the market that organizations require an extra layer of email security to complement Microsoft's existing protection.

Read more

PDF-Based Attacks on the Rise: Here's How Deep Learning Can Prevent Them

In June, 43% of all malicious files were PDFs, indicating a significant rise in their use for malicious purposes.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial