Category: Check Point Blog

Global Cyber Threats August 2025: Agriculture in the Crosshairs

In August 2025, the global cyber threat landscape presented a complex interplay of stability and alarming new challenges. Organizations around the world confronted an average of nearly 2,000 cyber attacks each week—a slight 1% decrease from July but a stark…

The Great NPM Heist – September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.…

The Networking and Security Shifts Fueling the Rise of SASE

Today’s workplace is no longer defined by office walls. Consequently, IT and security teams must rethink their approach to access and security. Enter Secure Access Service Edge (SASE), an architecture that merges network and security services into a unified, cloud-delivered…

Passing the Security “Vibe” Check

Imagine walking into a kitchen where you can shout out recipes and a robot instantly cooks up a meal. You ask for pasta, and within minutes you have a steaming plate in front of you.  The speed and convenience are…

Resilient by Design: Network Security for the Next Disruption

Whether it’s a pandemic, war, or natural disaster, one thing is certain: disruption is inevitable. For information security professionals, the important question is whether your network is ready to keep operations running securely. There are two essential tactics you can…

Hexstrike-AI: When LLMs Meet Zero-Day Exploitation

Key Findings: Newly released framework called Hexstrike-AI provides threat actors with an orchestration “brain” that can direct more than 150 specialized AI agents to autonomously scan, exploit, and persist inside targets. Within hours of its release, dark web chatter shows…

The Drift–Salesforce Attack: Time to Rethink Your SaaS Security

A SaaS Security nightmare for IT managers everywhere recently came true. Attackers leveraged legitimate OAuth tokens from Salesloft’s Drift chatbot integration with Salesforce to silently exfiltrate customer data from the popular CRM platform, according to Google Threat Intelligence Group. The…

Employee Spotlight: Getting to Know Julia Rabinovich

Julia, can you tell us a bit about yourself? I’m a system architect in the Quantum Network Security Products department. My main responsibilities focus on building system solutions and related architectural work, but I’m also very passionate about promoting a…

CloudGuard WAF-as-a-Service now Live on AWS Marketplace

We are excited to announce that CloudGuard WAF-as-a-Service (WAFaaS) is now available on Amazon Web Services (AWS) Marketplace and verified as a “Deployed on AWS” solution. This release simplifies application and API protection for AWS customers. CloudGuard WAF was recognized…

AI-Driven Visibility with the Harmony SASE MCP

Enterprise security and networking teams need details fast, and we work hard to make sure your SASE admin experience is as streamlined as possible. But sometimes it’s better to integrate data into the tools you already use. Introducing the Harmony…

EchoLink and the Rise of Zero-Click AI Exploits

In an increasingly AI-powered enterprise landscape, the recent discovery of a zero-click vulnerability in Microsoft 365 Copilot, dubbed EchoLink, should come as a stark warning for cyber security leaders. This isn’t just another flaw – it’s a new class of…

The Brain Behind Next-Generation Cyber Attacks

Introduction Last week, researchers at Carnegie Mellon University (CMU) revealed a finding that caught the attention of both the AI and cybersecurity worlds. Their work tackled a lingering challenge: whether today’s leading large language models (LLMs) can independently carry out…

GitHub Abuse Engine: Stay One Step Ahead

In the dynamic world of cyber security, staying ahead of malicious actors is paramount. We are thrilled to introduce the GitHub Abuse Engine, a cutting-edge engine of ThreatCloud AI designed to detect and mitigate malicious abuse on GitHub. This engine leverages…

Microsoft Vulnerabilities Exposed by Check Point Research

Check Point Research uncovered six fresh vulnerabilities in Microsoft Windows, including one critical flaw with potential for wide-reaching impact. These weaknesses could trigger system crashes, enable arbitrary code execution, or expose sensitive data across networks. Following a responsible disclosure process,…

The Alarming Surge in Compromised Credentials in 2025

One of the most pressing cyber threats businesses face today is the rampant rise in compromised credentials. Data from Check Point External Risk Management (previously known as Cyberint), reveals a staggering 160% increase in compromised credentials so far in 2025…

Check Point Deploys Real-Time Threat Detection on Cardano Mainnet

Major banks are adopting public blockchains at an accelerating pace. Financial institutions are moving beyond pilot programs on private networks to live deployments on permissionless blockchains. Today, major financial institutions are issuing stablecoins and tokenizing real world assets (stocks, bonds,…

Cursor IDE: Persistent Code Execution via MCP Trust Bypass

CVE-2025-54136 –  MCPoison Key Insights Critical RCE Flaw in Popular AI-powered IDE Check Point Research uncovered a persistent remote code execution vulnerability in Cursor, a fast-growing AI-powered coding platform trusted by developers worldwide. MCP Vulnerability Cursor allows attackers to gain…

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve become fully weaponized, commercially available, and dangerously scalable. What began as clever video edits…

Employee Spotlight: Getting to Know Sandy Venkataraman

 Sandy, can you tell us a bit about yourself? I’m someone who loves making people laugh, growing stronger every day—mentally and professionally—and leading a team I genuinely care about at Check Point. What led to your decision to join Check…

AI Shield: How Artificial Intelligence Protects Your Digital Life

Artificial intelligence, the unsung hero of modern cyber security, works tirelessly to protect our digital world. While AI’s creative capabilities are well-known, its most critical role is safeguarding data, privacy, and infrastructure from sophisticated cyber threats. As Albert Einstein wisely…