{
	"id": "6a113a68-a7f3-4c91-ae66-ac7377124cac",
	"created_at": "2026-04-06T00:19:35.913228Z",
	"updated_at": "2026-04-10T13:12:38.642421Z",
	"deleted_at": null,
	"sha1_hash": "7fbfa9453206cfee53c31ff4cfab963289280940",
	"title": "Check Point Software: Leader in Cyber Security Solutions",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 37727,
	"plain_text": "Check Point Software: Leader in Cyber Security Solutions\r\nArchived: 2026-04-05 17:41:34 UTC\r\nSecure Your AI Transformation\r\nJoin us Thursday, April 9th 2026\r\nPictured (left to right): David Haber, AI Security, Eyal Manor, Hybrid Mesh Network Security, Nataly Kremer,\r\nChief Product Officer\r\nPictured (left to right): Gil Friedrich, Workspace Security, Yochai Corem, VP External Risk Management\r\nProtecting Everything That's Connected\r\nHelping you secure AI where you use it. Everywhere.\r\nHybrid Mesh Network Security\r\nHybrid Mesh Network Security\r\nZero Trust security on-premises, in the cloud, and at the coffee shop.\r\nWorkspace Security\r\nWorkspace Security\r\nProtect your people, their devices, and their apps wherever they are.\r\nExposure Management\r\nExposure Management\r\nTurn intelligence into action, now.\r\nAI Security\r\nAI Security\r\nBuild your AI-first enterprise, safely.\r\nProtecting Customers Around the Globe\r\nWe help our customers safeguard their IT estate, their data, their brand, and their reputation.\r\nSetting New Industry Standards\r\nhttps://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/\r\nPage 1 of 2\n\nBuilding on our legacy of cyber security leadership every day.\r\nGet the Latest Security Insights and Innovations\r\nStaying ahead requires trustworthy insights you can count on.\r\nKeep One Step Ahead of Cyber Threats\r\nReal-time insight into global attacks, vulnerabilities, and risks.\r\nAnimated Threat Map\r\nTest Drive Check Point Today\r\nDiscover how our innovations secure your network, cloud, and user/access.\r\nSource: https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/\r\nhttps://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/"
	],
	"report_names": [
		"march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance"
	],
	"threat_actors": [],
	"ts_created_at": 1775434775,
	"ts_updated_at": 1775826758,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7fbfa9453206cfee53c31ff4cfab963289280940.pdf",
		"text": "https://archive.orkl.eu/7fbfa9453206cfee53c31ff4cfab963289280940.txt",
		"img": "https://archive.orkl.eu/7fbfa9453206cfee53c31ff4cfab963289280940.jpg"
	}
}