<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Email attachment still remains major source of zero-day attacks in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-attachment-still-remains-major-source-of-zero-day-attacks/m-p/3266#M14240</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;A recent survey examined thousands of office workers across the U.S. to determine their email security awareness, specially about attachments. It was found that not only the casual approach but insufficient awareness and older security technology are exposing organizations to zero-day attacks and ransomware using email attachment as major source. There is no doubt that employees need to trust their emails to accomplish their duties at work, therefore vast majority of targeted cyber-attacks begin with malicious code hidden in an email attachment. In such situation, the security of organizations should no longer be the responsibility of individual employee. Conventional antivirus and sandboxing solutions are no longer effective, and expose a business to devastating cyber-attacks that can steal or encrypt precious data or hold the business to ransom.&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Email-security survey: &lt;A href="https://www.helpnetsecurity.com/2017/05/04/blindly-open-email-attachments/" title="https://www.helpnetsecurity.com/2017/05/04/blindly-open-email-attachments/"&gt;Majority of workers blindly open email attachments - Help Net Security&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;&lt;STRONG&gt;Check Point SandBlast&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt; solution includes &lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://www.checkpoint.com/products/threat-extraction/" style="font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;Threat Extraction&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt; capability, which removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;&lt;A href="https://www.checkpoint.com/products/sandblast-office365-security/"&gt;&lt;STRONG&gt;SandBlast Cloud&lt;/STRONG&gt; &lt;/A&gt;solution will also bring Threat Extraction capability to organizations using cloud-based email such as Office365. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/43123"&gt;Eytan Segal&lt;/A&gt;​ &lt;A href="https://community.checkpoint.com/migrated-users/45534"&gt;Yossi Hasson&lt;/A&gt;​ &lt;A href="https://community.checkpoint.com/migrated-users/43500"&gt;Jonathan Zelman&lt;/A&gt;​ &lt;A href="https://community.checkpoint.com/migrated-users/43544"&gt;Jony Fischbein&lt;/A&gt;​&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 May 2017 16:02:17 GMT</pubDate>
    <dc:creator>Kaushal_Varshne</dc:creator>
    <dc:date>2017-05-10T16:02:17Z</dc:date>
    <item>
      <title>Email attachment still remains major source of zero-day attacks</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-attachment-still-remains-major-source-of-zero-day-attacks/m-p/3266#M14240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;A recent survey examined thousands of office workers across the U.S. to determine their email security awareness, specially about attachments. It was found that not only the casual approach but insufficient awareness and older security technology are exposing organizations to zero-day attacks and ransomware using email attachment as major source. There is no doubt that employees need to trust their emails to accomplish their duties at work, therefore vast majority of targeted cyber-attacks begin with malicious code hidden in an email attachment. In such situation, the security of organizations should no longer be the responsibility of individual employee. Conventional antivirus and sandboxing solutions are no longer effective, and expose a business to devastating cyber-attacks that can steal or encrypt precious data or hold the business to ransom.&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Email-security survey: &lt;A href="https://www.helpnetsecurity.com/2017/05/04/blindly-open-email-attachments/" title="https://www.helpnetsecurity.com/2017/05/04/blindly-open-email-attachments/"&gt;Majority of workers blindly open email attachments - Help Net Security&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;&lt;STRONG&gt;Check Point SandBlast&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt; solution includes &lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://www.checkpoint.com/products/threat-extraction/" style="font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;Threat Extraction&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt; capability, which removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;&lt;A href="https://www.checkpoint.com/products/sandblast-office365-security/"&gt;&lt;STRONG&gt;SandBlast Cloud&lt;/STRONG&gt; &lt;/A&gt;solution will also bring Threat Extraction capability to organizations using cloud-based email such as Office365. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 30px; color: #333333; font-family: Roboto, sans-serif; font-size: 18px;"&gt;&lt;SPAN style="color: #222222; font-family: DIN, 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 12pt;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/43123"&gt;Eytan Segal&lt;/A&gt;​ &lt;A href="https://community.checkpoint.com/migrated-users/45534"&gt;Yossi Hasson&lt;/A&gt;​ &lt;A href="https://community.checkpoint.com/migrated-users/43500"&gt;Jonathan Zelman&lt;/A&gt;​ &lt;A href="https://community.checkpoint.com/migrated-users/43544"&gt;Jony Fischbein&lt;/A&gt;​&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 May 2017 16:02:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-attachment-still-remains-major-source-of-zero-day-attacks/m-p/3266#M14240</guid>
      <dc:creator>Kaushal_Varshne</dc:creator>
      <dc:date>2017-05-10T16:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: Email attachment still remains major source of zero-day attacks</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-attachment-still-remains-major-source-of-zero-day-attacks/m-p/3267#M14241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great piece! Thanks &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 May 2017 06:41:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-attachment-still-remains-major-source-of-zero-day-attacks/m-p/3267#M14241</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-05-11T06:41:49Z</dc:date>
    </item>
  </channel>
</rss>

