Checkpoint

Intersection Cyber Security Software Repositories impact open-source software Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF

Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF

As the impact of the open-source software (OSS) community continues to expand, comprehending the interplay between OSS practices and cyber security standards has become paramount. Recentlythe Open Source Security Foundation (OpenSSF) and the National Institute of Standards and Technology (NIST)  established the roadmap for collective efforts toward enhancing open-source software security. This blog will explore the forward strides […]

Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF Read More »

Protecting the weakest link: how human errors can put a company in risk

Protecting the weakest link: how human errors can put a company in risk

In today’s digital age, cybersecurity has become a priority for businesses, as cyber attacks can damage their economy and reputation. According to Check Point, 71% of businesses were victims of ransomware attacks in 2023, with an average payout of $4.35 million. Employees are the first link in the cybersecurity chain and the most vulnerable entry

Protecting the weakest link: how human errors can put a company in risk Read More »

Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally

Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally

The realm of cyber security is an ever-evolving battlefield. As we step into 2024, the shadows of 2023’s massive cyber threats still loomed, setting a precedent for what was to come. The first quarter of 2024 has seen an intriguing shift in the landscape of cyber attacks, both in frequency and in the nature of

Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally Read More »

MalDocs in Word and Excel: A Persistent Cybersecurity Challenge

MalDocs in Word and Excel: A Persistent Cybersecurity Challenge

Persistent Threats from Old Vulnerabilities In the ever-evolving world of cybersecurity, new threats emerge daily. However, some old vulnerabilities, specifically in Microsoft Word and Excel, continue to pose significant risks. These include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802, which are still effectively used in cyberattacks despite not being zero-day vulnerabilities […] Click here to view original web page at www.checkpoint.com

MalDocs in Word and Excel: A Persistent Cybersecurity Challenge Read More »