Earlier today the news filtered out that Wiz and Check Point are going to team up:
The partnership between Check Point and Wiz addresses these issues head-on offering customers:
- Unified Security Insights: Check Point’s cloud network security controls integrated within Wiz’s CNAPP risk platform, enabling cloud security teams to automatically prevent attacks access real-time network-driven insights for smarter risk prioritization
- Enhanced Risk Context: Wiz’s advanced risk analysis feeds integrate directly into Check Point’s platform, providing network security teams with actionable recommendations to optimize security coverage and configurations
- Prioritization of Unsecured Assets: Cloud security teams are empowered to identify and address unsecured assets more effectively, leveraging network security data to guide decision-making
- Optimized Security Operations: Network security teams benefit from tailored recommendations generated by Wiz’s platform, enhancing operational efficiency across hybrid environments
The mutually beneficial partnership includes joint integration and the assisted migration of Check Point’s CNAPP customers to Wiz. Check Point expects to reallocate resources and make further investments across its Cloud Security business, including Cloud Network Security, Web Application Firewall (WAF), GenAI and other key Cloud technologies.
Marina Segal, CEO, Tamnoon highlights the risks associated with this team up:
“As organizations transition from Check Point CloudGuard to Wiz, under their newly announced partnership, it is critical to maintain continuous security operations while minimizing disruption. CNAPP migrations can take time and energy from already understaffed security teams. Our experience has shown that it is important to follow a proven process and make sure you have experts to guide every successful migration of any CNAPP.”
It will be interesting to see how organizations navigate this so that the best outcome possible is the one that they get.
Hackers Exploit Pandoc CVE to Steal EC2 IAM Credentials
Posted in Commentary with tags Wiz on September 24, 2025 by itnerdWiz has disclosed that attackers are actively exploiting CVE-2025-51591, an SSRF flaw in the Linux utility Pandoc, to target AWS Instance Metadata Service (IMDS). The vulnerability allows attackers to abuse iframe rendering to extract IAM credentials from IMDSv1, potentially enabling access to AWS services like S3, RDS, and DynamoDB.
Wade Ellery, Chief Evangelist and IAM Strategy Officer, Radiant Logic has this to say:
“What we have seen from the most recent breaches is that attackers keep finding ways to compromise account access. Token hijacking, credential stuffing, phishing, and now iframe rendering to extract valid IAM credentials. The conclusion we can draw is that the week link in the defenses remains the Authentication Layer. Given the likelihood of a successful compromise at the AuthN layer the next line of defense is the Authorization Layer. If an intruder gains access but is blocked from exploiting the compromised account, escalating privileges, or moving east to west then the attack is thwarted at the second wall. Security is strongest when it is layered. A robust, comprehensive, and real-time observability platform focused on identity data at the core of all Authorization decisions is critical to detect, obstruct, and remediate attacks that get past the Authentication layer. The screen door has been proven vulnerable, this mandate a steal door backing it up to protect the enterprise.”
There are prevention tips that are in the Wiz article. They are worth implementing if you are affected by this.
Leave a comment »