Check Point’s Infinity Global Services (IGS) recently concluded its first ever Cyber Park World Championship, a global competition designed to challenge and inspire the next generation of cyber defenders. In partnership with CheckMates, Check Point’s community of cyber security professionals,…
Category: Check Point Blog
Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks
In November 2025, global cyber activity continued its upward trend, with organizations experiencing an average of 2,003 cyber-attacks per week. This represents a 3% increase from October, and a 4% rise compared to November 2024. Check Point Research data shows…
40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams
The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate,…
Cyber Threats to the U.S.: What Policymakers Need to Know for 2026
Cyber attacks against the United States are no longer isolated events or technical headaches. They are now powerful tools of national strategy used by foreign governments, criminal networks, and ideological groups. A new report explains how these attacks have changed…
What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF Customers Carried on with Their Day
Note: Before we dive in, Check Point CloudGuard WAF customers were proactively protected and not affected by React2Shell. In early December 2025, the team behind React—the most widely used technology powering today’s websites and digital services—announced a critical security…
The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back
When Senator Ben Ray Luján warned that the United States was facing “the largest telecommunications hack in our nation’s history,” it marked a turning point in how we understand national cyber risk. On December 4, 2024, the White House confirmed…
Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid Mesh Cloud and On-Prem Firewalls
As organizations adopt AI tools and Model Context Protocol (MCP) servers to implement AI applications, security teams face mounting pressure to protect sensitive data, applications, and distributed environments. Enterprises are looking for security solutions to help them safely adopt AI,…
Check Point Named a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security
We’re proud to announce that Gartner® has recognized Check Point as a Leader in the 2025 Magic Quadrant™ for Email Security (published December 2025). We believe that this independent evaluation from the industry’s most trusted research firm validates our commitment…
Employee Spotlight: Getting to Know Angel Salazar
Tell us your story — who you are, what drives you, and how your journey brought you to where you are today. I’m Angel Salazar, born in Guatemala, and my interest in technology began back in school when I studied…
AI Has Become the New Enterprise Perimeter — and Gemini 3 Pro Just Proved It
When Google unveiled Gemini 3 on 18 November 2025, most headlines focused on its leaps in reasoning, multimodality, and performance. But executives should look past the model-to-model comparisons. Gemini 3’s real significance is structural. Part of a Broader Trend —…
Shai-Hulud 2.0: Inside The Second Coming, the Most Aggressive NPM Supply Chain Attack of 2025
How attackers infiltrated the npm ecosystem, what Check Point researchers uncovered, and how organizations can protect their development pipelines. The Shai-Hulud 2.0 campaign, referred to by its operators as The Second Coming, is one of the most extensive and fast…
How CloudGuard WAF Lowers Risk and Total Cost of Ownership (TCO)
Security teams must protect apps and APIs without drowning in rule maintenance or false-positive triage. Many traditional WAFs pile on hidden expenses like manual tuning, lot of false-positives, and breach fallout that increase costs and drain resources. Check Point CloudGuard…
The 2026 Tech Tsunami: AI, Quantum, and Web 4.0 Collide
The year 2026 will not be defined by incremental upgrades. It will be shaped by an unprecedented collision of forces: next-generation computing, hyper-automation, and a global cyber security reckoning. Technological convergence and the rise of autonomous systems will redefine global…
GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users
Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts normal phone use through persistent background activity. During an internal threat-hunting investigation, Check Point Harmony Mobile Detection Team identified a network of Android applications on…
Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-Loss Products
The global appetite for GLP-1 medications like Ozempic, Wegovy and Mounjaro have created something far more dangerous than a cultural trend. It has created the perfect opening for cyber criminals who understand how desperation, scarcity and online misinformation intersect. As…
Cyber Insurance Won’t Save You from Bad Hygiene
Why foundational failures still cost companies, even when they’re insured Cyber insurance is no longer a luxury. It’s a boardroom staple, a checkbox on every enterprise risk register. But most organizations are betting on a safety net that may not…
The Black Friday Cyber Crime Economy: Surge in Fraudulent Domains and eCommerce Scams
Key findings Malicious activity is rising, with 1 in 11 newly registered Black Friday themed domains classified as harmful. Brand impersonation remains a primary tactic, with 1 in 25 new domains related to the reputable ecommerce marketplaces of Amazon, AliExpress,…
Check Point Launches Managed Rules for AWS Network Firewall
Managing network security is a critically important and challenging task, especially in cloud environments. Scaling firewalls across tens of subnets and VPCs can become challenging with creating, maintaining, and updating many custom rule sets. Depending on the how many firewalls…
Best-in-Class GenAI Security: When CloudGuard WAF Meets Lakera
Artificial intelligence is transforming every business process. From automating customer support to enabling autonomous decision-making, enterprises are rapidly embedding large language models (LLMs), generative AI, and intelligent agents into their core workflows. While AI accelerates innovation, it also expands the…
How CIOs Can Turn AI Visibility into Strategy
Generative AI is everywhere and it’s only growing. Whether you know it or not, tools such as ChatGPT, Claude, DeepSeek, and Gemini are being actively used in your office. A recent study from MIT’s Nanda Project found that 90% of…