• Bhubaneswar India
  • Contact+ 91-9938772605
  • Mon - Sat : 10:00AM - 6:00PM

Tag: Check Point Software Technologies Ltd.

Stay Secure This Holiday Season: Device Protection While You Take a Break

India, August 17, 2024 – With the arrival of the holiday season in India, it is to be expected that the use of mobile devices for outdoor activities as well as holiday travel increases. Check Point® Software Technologies Ltd.  a leading AI-powered, cloud-delivered cyber security platform provider, warns that hackers take advantage of the higher usage of smartphones during vacations. In fact, according to the latest data from the Check Point Software Threat Intelligence Report for July 2024, 1 out of every 4 organizations suffered from a malicious incident, with 179 different fraudulent applications and 16,777 risky apps identified. In fact, an organization in India is being attacked on average 3163 times per week in the last 6 months, compared to 1587 attacks per organization globally and it is expected to rise even more as the holiday season approaches.

Mr. Sundar Balasubramanian

Additionally, the Global Threat Index for June 2024 revealed that Joker, an Android spyware on Google Play designed to steal SMS messages, contact lists, and device information, ranked first as the most widespread mobile malware, followed by Anubis (a banking trojan malware designed for Android mobile phones) and AhMyth (a remote access trojan).

Cybercriminals take advantage of this time of year when security measures are also relaxed. They use phishing websites that appear legitimate, such as those of banks, to steal personal information by tricking users into entering their data. Additionally, connecting to public Wi-Fi networks in places like hotels and cafes can be dangerous, as criminals can intercept and modify communications to access sensitive data. It is also important to be cautious when downloading applications from unofficial sources, as they may contain malware designed to steal information or control the device without the user knowing.

Therefore, Check Point Software wants to point out some essential tips to keep your devices protected while enjoying your vacation:

Protect your Wi-Fi network like you protect your skin: Just as it is not advisable to expose yourself to the sun without sunscreen, you should avoid connecting to open and unprotected Wi-Fi networks. Cybercriminals use public networks, such as those in cafes, hotels, and airports, to intercept a user’s personal information. It is important to use only Wi-Fi networks that require a password and ensure the connection is encrypted. Additionally, always keep in mind that it is better to use a VPN (Virtual Private Network) to add an extra layer of protection, keeping data safe from prying eyes.

Safe selfies on the beach: Sharing photos and selfies on the beach is a fun part of the holidays, but be careful with the apps you use. Nowadays, it is essential for a user’s social networks to have two-factor authentication enabled. This security measure requires a second verification step, such as a code sent to the mobile, in addition to the usual password.

Keep your device cool and secure: Extreme heat can damage electronic devices, reducing their performance and lifespan. Therefore, do not leave them exposed directly to the sun; always look for cool and shaded places to store them. Additionally, another important point is to have a security solution installed that can detect and eliminate threats before they harm your device. Regular software and application updates not only introduce new features but also fix vulnerabilities that cybercriminals could exploit.

Beware of digital sharks: During vacations, when we are more relaxed, it is easier to fall into phishing traps. These attacks come through emails, text messages, or even social networks, pretending to be from trusted sources. Even in summer, it is essential not to let your guard down and never click on links or download files from unknown senders. If something seems suspicious, you can verify the authenticity of the message before interacting with it. To do this, go to the sender’s original website through the internet search engine to check if the information received is real.

Strengthen your security with constant updates: One of the keys to security that many people overlook is keeping all devices updated with the latest patches and software updates. Each update improves security by fixing possible flaws and vulnerabilities that cybercriminals could exploit. To achieve this, it is best to set devices to update automatically, ensuring they are always protected against the latest threats. This simple practice can make a big difference in protection.

“Summer is a time to relax, but we cannot let our guard down when it comes to cyber security. Keeping our devices secure is essential to enjoy our vacation without worries. By following a few simple protection steps, we can prevent most cyberattacks and keep our information safe,” warns Sundar Balasubramanian, Managing Director at Check Point Software Technologies, India & SAARC

Check Point Software is Named a Leader in Mobile Threat Defense Solutions report by Independent Research Firm

India, July 31th, 2024 – Check Point Software Technologies Ltd., a leading AI-powered, cloud-delivered cyber security platform provider, today announced that it has received a Leader ranking in the latest The Forrester Wave™: Mobile Threat Defense Solutions, Q3 2024 report. Check Point believes this recognition highlights Check Point’s pioneering approach to delivering robust mobile security solutions, an integral component of its comprehensive Infinity Platform. Harnessing the power of Harmony Mobile’s advanced threat defense, Check Point demonstrates its commitment to protecting organization in the face of modern threats.

In today’s rapidly evolving digital era, remote employees increasingly rely on their smartphones to manage corporate emails and access essential files. Safeguarding access to this information is crucial. According to the Forrester report, “Check Point Harmony Mobile provides superior mobile application protection, network defense, and vulnerability mitigation” providing prevention-first, multilayered Mobile protection with advanced capabilities.

“We believe that this analyst recognition further cements our status as a leading choice for advanced mobile threat defense, both as part of an integrated security platform and as an independent mobile security solution,” said Ofir Israel, VP of Threat Prevention at Check Point Software Technologies. “We are proud that the Forrester report finds that Check Point Harmony Mobile ’should be the go-to choose for existing Check Point customers looking to protect mobile endpoints but is equally capable as a standalone’.”

The Forrester report stated that Check Point offers the ability to maintain personally identifiable information (PII) collected from mobile devices on-premises and not uploaded into the cloud. This capability is especially significant as Check Point has identified more than 18,000 high-risk mobile applications in the past month. In our view, Check Point Harmony Mobile distinguishes itself by offering comprehensive protection against all types of attacks—whether through apps, files, networks, or operating systems—while maintaining user privacy and device performance.

Global customers agree as they emphasize Check Point Harmony Mobile’s robust security noting that, “Since implementing Check Point Harmony, we have experienced zero security incidents, highlighting the reliability and effectiveness of this solution. Our BYOD network poses unique security challenges, but Check Point Harmony Mobile has proven to be highly effective in protecting our mobile endpoints. We are extremely satisfied with the product and its ability to secure our diverse range of devices, ensuring our operations run smoothly and securely,” said Anthony DiSanti, Chief Technology Officer at Shift Markets.

The report also states the following:

  • Highest possible score in 14 criteria, including application integrity, network defense, and vulnerability mitigation, among others
  • Check Point’s vision of aligning mobile threat defense with the Zero Trust Model is solid
  • Flexible deployment and purchasing options
  • Reference customers appreciated the security capabilities and were complimentary of the vendor’s support and account management teams

With nearly ten years of expertise in mobile threat defense, we believe that Check Point stands as a seasoned authority. The latest Forrester Wave on mobile threat defense underscores for us the increasing relevance of mobile security as emerging threats continue to soar. Nonetheless, Check Point has long recognized the importance of this attack vector and has already thwarted millions of attacks over the years.

India’s Healthcare Sector Battling 6,953 Weekly Cyberattacks: Report

India, June 28, 2024- Check Point Software Technologies Ltd., a leading AI-powered, cloud-delivered cyber security platform provider, has unveiled its latest Threat Intelligence Report for the Indian market revealing cyber numbers for the last six months. The report reveals that the Indian healthcare sector has become a major target for cybercriminals, experiencing an average of 6,935 cyberattacks per week over the past six months, compared to 1,821 attacks per organization globally. This alarming trend highlights the increased attack surface due to the rapid adoption of technologies such as electronic health records (EHRs), telemedicine, and Internet of Things (IoT) devices.

image001 (9)

The report also highlights that Indian organizations, on average, were targeted 2,924 times per week over the past six months, compared to 1,401 attacks per organization globally. The most prevalent malware in India is FakeUpdates, accompanied by other malicious software such as botnets and a Remote Access Trojan (RAT) named Remcos. Information disclosure is the most commonly exploited vulnerability in India, affecting 72% of organizations, followed by Remote Code Execution impacting 62%, and Authentication Bypass affecting 52%.

In the past 30 days, 63% of malicious files in India were delivered via email, while 37% were delivered through the web. Notably, 58% of the top malicious files delivered via email were executable files, while 59% of malicious files delivered via the web were PDF files.

Sundar Balasubramanian, Managing Director for India and SAARC at Check Point Software Technologies, commented, “The simplicity of spoofing email addresses and the capability to deliver weaponized content make email a powerful tool for spreading malware, stealing credentials, and executing social engineering attacks. Check Point urges users to avoid opening unverified email attachments, use strong passwords, enable multi-factor authentication, and exercise caution with unsolicited or suspicious emails.”

Balasubramanian emphasized the need for a proactive approach to cybersecurity, stating, “Preventive measures, such as regular software updates, employee training, and the deployment of advanced security solutions, are essential to mitigate the growing threat landscape. By staying vigilant and adopting a comprehensive security strategy, organizations can safeguard their assets and maintain the trust of their stakeholders.

The report also highlighted several major cyber-attacks and data breaches like

In March 2024, researchers uncovered a sophisticated cyber espionage campaign named SPIKEDWINE, targeting European diplomats through a malicious PDF disguised as an invitation from the Ambassador of India. This campaign, believed to be orchestrated by a nation-state actor, employs a previously undocumented backdoor called WINELOADER and advanced Tactics, Techniques, and Procedures (TTPs), exploiting geopolitical relations.

In January 2024, the ransomware-as-a-service group Medusa breached the nonprofit organization Water for People, which works to improve access to clean water in countries including Guatemala, Honduras, Mozambique, and India. The cybercriminals demanded a $300K extortion fee to avoid leaking stolen data, although the organization’s financial systems and business operations were not impacted.

In the same month, India’s National Aerospace Laboratories suffered a ransomware attack by the LockBit ransomware group, which leaked several documents allegedly exfiltrated during the breach.

In March 2023, an analysis revealed a campaign targeting Indian and Pakistani Android users through romance scams on messaging apps, which lured victims into downloading a remote access Trojan under the guise of a secure app.