‘By moving to remote access, companies open huge amounts of holes in their security. The corporate network is now open in ways it wasn’t before, and hackers are going to exploit it,’ says Check Point ...
Threat actors have been exploiting a high-severity Check Point Remote Access VPN zero-day since at least April 30, stealing Active Directory data needed to move laterally through the victims' networks ...
The cybersecurity vendor says that a now-fixed VPN vulnerability has been exploited in attacks. Check Point has released emergency patches for a VPN vulnerability that the cybersecurity vendor said ...
A vulnerability in Check Point virtual private network (VPN) products could potentially leak information to malicious actors. In recent months, Check Point researchers have observed an increase in ...
Check Point and its hardware partners — Crossbeam, IBM and Nokia– each submitted different hardware platforms for this test running a common application: Check Point’s VPN-1 software. Likewise, we ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results