Check Point Abra suffers from multiple security vulnreabilities. Imperfect control modules and data monitoring allows you to run any file, bypassing the current policy around virtualization, and read/write data from an isolated Abra session directly into the PC operating system, conduct phishing attacks, etc.
fd38db2d9b2ab2fa942d55e39415191f7800d837620ebccc49fa1b3074ad2a6c