Global Attack Volumes Begin to Moderate In March 2026, global cyber attack activity showed early signs of moderation while remaining at historically elevated levels. The average number of weekly cyber-attacks per organization reached 1,995, representing a 4% decrease month over month and a 5% decline compared to March 2025. Despite this…
Category: Check Point Blog
PS Private Training: Turning Cyber Complexity into Operational Control
The World Economic Forum’s Global Cybersecurity Outlook 2025 concurred that cyber risk is increasingly driven by operational complexity rather than lack of technology. As security environments expand, many organizations struggle with hands‑on skill gaps, slow issue resolution, and training that does not reflect…
Tax Season 2026: How Cyber Criminals Are Preparing Their Attacks Months in Advance
Tax season remains one of the most attractive periods of the year for cyber criminals. As individuals and organizations exchange sensitive financial and identity data online, attackers take advantage of increased tax‑related activity to launch phishing campaigns, fraudulent websites, and…
Claude Mythos Wake-Up Call: What AI Vulnerability Discovery Means for Cyber Defense
Last week, the industry learned that Anthropic was developing Claude Capybara, also called Mythos, a powerful new AI model with substantially improved capabilities in vulnerability discovery, exploit development, and multi-step attack reasoning. While the details emerged through a data leak…
When Trusted Software Updates Become the Attack Vector: Inside Operation TrueChaos and a New Zero Day Vulnerability in a Popular Collaboration Tool
A zero day flaw in a trusted supply chain software turned a legitimate government collaboration tool into a malware delivery platform. Operation TrueChaos at a Glance Zero day vulnerability discovered in the TrueConf client update mechanism (CVE20263502, CVSS 7.8) In the wild…
Uncovering ROI of a Hybrid Mesh Architecture – 2026 IDC Business Value Study
To move fast without losing control, enterprises need a Hybrid Mesh Network Security architecture. But for CISOs and CIOs, the challenge is clear: How do you demonstrate measurable business value from adopting hybrid mesh security? Analyst firm IDC interviewed security leaders from global business organizations to uncover the…
Iran-nexus Password Spray Campaign Targeting Cloud Environments, with a Focus on the Middle East
Key Findings Check Point Research (CPR) has been tracking an ongoing password-spraying campaign targeting Microsoft 365 environments across the Middle East, conducted by an Iran-linked threat actor. The campaign was carried out in three distinct waves of attacks, which took…
When AI Trust Breaks: The ChatGPT Data Leakage Flaw That Redefined AI Vendor Security Trust
AI assistants like ChatGPT have quickly become trusted environments for handling some of the most sensitive data people own. Users discuss medical symptoms, upload financial records, analyze contracts, and paste internal documents—often assuming that what they share remains safely contained within the platform. That assumption was challenged when…
Spring Cleaning Has Arrived: Meet the New Check Point Portal Experience
We’ve been busy behind the scenes, and the results are here. The Check Point Portal just got its biggest visual refresh yet – brighter, cleaner, and more modern than ever before. Think of it as a thorough spring cleaning: everything…
North America’s Cyber Security Threat Reality in 2026
The North America cyber security statistics are out. Cyber risk in North America accelerated, concentrated, and repeated itself at scale in 2025. Data from the 2025 North America Threat Landscape Report shows a threat environment defined less by surprise and more by pressure. The same attack types,…
Check Point at RSAC – How We’re Helping Our Customers Secure their AI Transformation
Enterprise organizations are rapidly adopting AI tools to accelerate productivity, unlock fresh business insights, gain new competitive advantages, and drive revenue growth. But this transformation is bringing with it new and complex security challenges that introduce previously unseen risk. AI…
You Built the Brain. Now Protect It.
A Blueprint Architecture for Securing the AI Data Center & AI Factory As enterprises turn traditional data centers into AI factories powered by LLMs, they unlock new revenue streams, competitive differentiation, and operational efficiencies—but also expose themselves to unprecedented risk.…
The Agentic Era Arrives: How AI Is Transforming the Cyber Threat Landscape
The cyber security landscape is undergoing a significant shift. Between January and February 2026, we observed a major evolution in how threat actors adopt, weaponize, and operationalize AI. What was once experimental is now mature. What once required coordinated teams can now be executed…
Telegram’s Crackdown in 2026 and Why Cyber Criminals Are Still Winning
If you’ve been following the Telegram crackdown news, then you’ll know that Telegram entered 2026 under significant pressure. After years of being a largely permissive environment, the platform dramatically increased enforcement following the arrest of CEO Pavel Durov in late 2024…
Check Point Accelerates the Rollout of Secure AI Data Centers with NVIDIA DSX Air
Check Point is proud to integrate with NVIDIA DSX Air’s testing environment, enabling organizations to pre-validate their security aware AI data center designs before ever deploying their first piece of hardware in production to build and run their own AI. …
Augmented Phishing: Social Engineering in the Age of AI
The rise of GenAI has pushed social engineering and phishing to new levels. What once required manual effort can now be generated in seconds, resulting in hyper-personalized messages, cloned executive voices, and even realistic video impersonations. Deepfake incidents have already moved from online curiosity to real business risk,…
Global Cyber Attacks Remain Near Record Highs in February 2026 Despite Ransomware Decline
Global Attack Volumes Remain Elevated Worldwide In February 2026, global cyber attack activity remained near record levels, confirming that elevated attack volumes are becoming the new normal for organizations worldwide. The average number of weekly cyber attacks per organization reached 2,086, representing a 9.6% increase year over year, while remaining essentially…
China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions
Key Findings Since the recent escalation in the Middle East, Check Point Research has observed increased activity by Chinese-nexus APT actors in the region, particularly targeting Qatar The Chinese-nexus threat actor Camaro Dragon attempted to deploy a variant of PlugX…
Introducing CPR Act: A Unified Approach for a Full‑Lifecycle Security
Fragmented products and solutions sprawled across multiple environments create significant visibility gaps, which attackers look for to exploit. To close these gaps, Check Point Services has now introduced CPR Act, an expert‑led unit that covers the entire security lifecycle with…
Powering Cyber Resilience Across APAC: Celebrating Check Point’s APAC FY25 Partner Award Winners
Recognizing Excellence, Innovation, and Impact Across the Region Check Point Software Technologies recognized the top partners across the Asia Pacific region, during the Check Point Software Technologies Sales Kickoff APAC event in Bangkok, Thailand, attended by almost 1,000 employees and partners. These awards are handed out to outstanding partners across Asia Pacific who…