Cybercriminals have a sneaky technique up their sleeves - brand phishing, also known as brand impersonation or brand spoofing. This tactic involves assuming the iden...
Cybercriminals have a sneaky technique up their sleeves - brand phishing, also known as brand impersonation or brand spoofing. This tactic involves assuming the iden...
A recently discovered vulnerability in Microsoft Teams has opened the door for non-employees to effortlessly send harmful files to employees without undergoing any s...
In recent months, Check Point Research has observed a surge in phishing attacks that exploit reputable online form builder services like Formspark, Formspree, EmailJ...
It is widely acknowledged in the market that organizations require an extra layer of email security to complement Microsoft's existing protection.
In June, 43% of all malicious files were PDFs, indicating a significant rise in their use for malicious purposes.
Mark Ostrowski is Head of Engineering, US East, Check Point. He has 20 years’ experience in IT security and has helped design and support some of the largest securit...
URL-based phishing tricks users into providing sensitive information to hackers through fake links that imitate legitimate ones. We've been looking at some examples ...
A majority of our customers--90%--use our patented inline mode for email security.
One of the key capabilities of an email security solution is the ability to detect anomalies. When something happens that's out of the ordinary, it can be a sign tha...
One of the biggest problems with online security is URL-based phishing. These attacks involve fake links that mimic legitimate ones, tricking users into entering sen...