Category: Check Point Blog

Rhadamanthys 0.9.2: A Stealer That Keeps Evolving

Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…

Amazon Prime Day 2025: The Dark Side of Deals

Amazon’s Fall Prime Day not only kicks off the holiday shopping season with deals too good to ignore, it also creates one of the biggest opportunities of the year for cyber criminals. As millions of consumers flock online for deals,…

5 Essential Cyber Security Tips for Cyber Security Awareness Month

October marks Cybersecurity Awareness Month, an annual initiative designed to help everyone stay safer and more secure online. In today’s digital landscape, cyber threats are constantly evolving, targeting individuals and organizations alike with increasingly sophisticated tactics. Whether you’re scrolling social…

Self-Driving IT Security: The Road Ahead

Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived,…

Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…

The Great NPM Heist – September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.…

The Networking and Security Shifts Fueling the Rise of SASE

Today’s workplace is no longer defined by office walls. Consequently, IT and security teams must rethink their approach to access and security. Enter Secure Access Service Edge (SASE), an architecture that merges network and security services into a unified, cloud-delivered…

Passing the Security “Vibe” Check

Imagine walking into a kitchen where you can shout out recipes and a robot instantly cooks up a meal. You ask for pasta, and within minutes you have a steaming plate in front of you.  The speed and convenience are…