Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…
Category: Check Point Blog
Amazon Prime Day 2025: The Dark Side of Deals
Amazon’s Fall Prime Day not only kicks off the holiday shopping season with deals too good to ignore, it also creates one of the biggest opportunities of the year for cyber criminals. As millions of consumers flock online for deals,…
5 Essential Cyber Security Tips for Cyber Security Awareness Month
October marks Cybersecurity Awareness Month, an annual initiative designed to help everyone stay safer and more secure online. In today’s digital landscape, cyber threats are constantly evolving, targeting individuals and organizations alike with increasingly sophisticated tactics. Whether you’re scrolling social…
The Rising Cyber Threat to Manufacturing: A Call to Action for Executives
Key Insights Manufacturing faces an average of 1,585 weekly attacks per organization, a 30% year-over-year increase. Ransomware remains the dominant threat, with incidents costing hundreds of millions in losses and in some cases forcing insolvency. Supply chain connectivity magnifies risk.…
How to Defend Against Credential Attacks with a Hybrid Mesh Architecture
Introduction Credential-based attacks have reached epidemic levels. The 2025 Verizon Data Breach Investigations Report (DBIR) underscores the trend: 22% of breaches now start with compromised credentials, while Check Point External Risk Management found that leaked credential volumes surged 160% year-over-year.…
Playing Offside: How Threat Actors Are Warming Up for FIFA 2026
Introduction Every four years, the World Cup captures the attention of billions. With that attention comes opportunity – not only for sponsors, broadcasters, and legitimate merchants, but also for adversaries who see in this spectacle a marketplace of deception. As…
Quantum-Safe Cyber Security: Current Capabilities and the Road Ahead
Quantum computing is moving from theory to reality. While largescale quantum computers are not yet available, their future impact on cyber security is clear: algorithms like RSA, Diffie–Hellman, and Elliptic Curve Diffie-Hellman which secure VPNs, TLS, and digital identities, will…
Self-Driving IT Security: The Road Ahead
Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived,…
Iranian Threat Actor Nimbus Manticore Expands Campaigns into Europe with Advanced Malware and Fake Job Lures
Key Highlights Check Point Research is actively tracking Iranian threat actor Nimbus Manticore. Our latest findings show it is expanding operations into Europe and now targeting the defense, telecom, and aerospace sectors. The group uses fake job portals and spear‑phishing…
Don’t Get Rekt: The NFT Security Handbook That Could Save Your Digital Fortune
Picture this: You’ve just minted what you think is the next Bored Ape, only to discover you’ve actually given a hacker permission to drain your entire wallet. Or maybe you’ve proudly displayed your new 10 ETH NFT purchase, only to…
Check Point Celebrates Partner Excellence at the 2025 Check Point Software Technologies Asia Pacific Partner Conference in Hanoi
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, proudly recognised the top-performing partners across Asia Pacific at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held from 8th -11th September…
Reading Between the Lines: Satisfaction Analysis from Untagged Chatbot Conversations
Understanding user satisfaction in conversational AI In the rapidly evolving landscape of artificial intelligence, chatbots have become a cornerstone of customer service, support, and engagement across various industries. Despite their widespread adoption, one of the persistent challenges remains: accurately gauging…
Check Point to Acquire Lakera, Redefining Security for the AI era
We’re excited to share the Check Point is acquiring Lakera to deliver a full AI security stack for AI-powered enterprises AI is the new frontier of the IT revolution As organizations seek to modernize operations and unlock new business potential, AI-driven…
Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…
Check Point Named a Leader in the 2025 IDC MarketScape Report for Worldwide Enterprise Hybrid Firewalls.
The 2025 IDC MarketScape Report for Worldwide Enterprise Hybrid Firewalls, has named Check Point a Leader. We believe this recognition reflects the maturity of our Hybrid Mesh Firewall capabilities and the focus we’ve placed on unifying, automating and simplifying security operations…
Meet Yurei: The New Ransomware Group Rising from Open-Source Code
New Group, Fast Growth: Yurei ransomware first appeared on September 5, already listing three victims in Sri Lanka, India, and Nigeria within its first week. Copy-Paste Malware: The ransomware is largely based on the open-source Prince-Ransomware project, showing how attackers…
Global Cyber Threats August 2025: Agriculture in the Crosshairs
In August 2025, the global cyber threat landscape presented a complex interplay of stability and alarming new challenges. Organizations around the world confronted an average of nearly 2,000 cyber attacks each week—a slight 1% decrease from July but a stark…
The Great NPM Heist – September 2025
On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.…
The Networking and Security Shifts Fueling the Rise of SASE
Today’s workplace is no longer defined by office walls. Consequently, IT and security teams must rethink their approach to access and security. Enter Secure Access Service Edge (SASE), an architecture that merges network and security services into a unified, cloud-delivered…
Passing the Security “Vibe” Check
Imagine walking into a kitchen where you can shout out recipes and a robot instantly cooks up a meal. You ask for pasta, and within minutes you have a steaming plate in front of you. The speed and convenience are…