Category: Check Point Blog

AI 2030: The Coming Era of Autonomous Cyber Crime

Organizations around the world are rapidly adopting AI, including across the enterprise, where it is already providing significant efficiency gains. As a result, cyber security is entering a turning point where AI fights AI. The phishing scams and deepfakes of…

LockBit Returns — and It Already Has Victims

Key Takeaways LockBit is back. After being disrupted in early 2024, the ransomware group has resurfaced and is already extorting new victims. New version, new victims. Check Point Research identified a dozen organizations hit in September 2025, half by the…

ChatGPT Atlas: The First Step Toward AI Operating Systems

The Big Picture OpenAI’s ChatGPT Atlas browser is the prototype for how we’ll use computers in the future. Within a few years, operating systems will be powered by AI as users interact through prompts instead of clicking applications. You’ll describe…

AI-Powered Phishing Detection: The Next Generation Security Engine

Check Point is thrilled to introduce a continuously-trained AI-engine designed to analyze key information about websites, achieving remarkable results in detecting phishing attempts. Integrated with our ThreatCloud AI, it offers comprehensive protection across Quantum gateways, Harmony Email, Endpoint, and Harmony…

Microsoft Dominates Phishing Impersonations in Q3 2025

Cyber criminals are sticking with familiar names, and Microsoft remains their favorite disguise. According to Check Point Research’s Brand Phishing Report for Q3 2025, Microsoft accounted for 40% of all brand impersonation attempts this quarter, holding its place as the…

Zero Trust Access Made Simple for Contractors

Third-party contractors are critical for many organizations. They bring specialized skills, help scale projects quickly, and support both short-term initiatives and long-term business needs. Yet contractors also introduce unique security and operational challenges. Whether it’s a quick project or a…

Rhadamanthys 0.9.2: A Stealer That Keeps Evolving

Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…

Amazon Prime Day 2025: The Dark Side of Deals

Amazon’s Fall Prime Day not only kicks off the holiday shopping season with deals too good to ignore, it also creates one of the biggest opportunities of the year for cyber criminals. As millions of consumers flock online for deals,…

5 Essential Cyber Security Tips for Cyber Security Awareness Month

October marks Cybersecurity Awareness Month, an annual initiative designed to help everyone stay safer and more secure online. In today’s digital landscape, cyber threats are constantly evolving, targeting individuals and organizations alike with increasingly sophisticated tactics. Whether you’re scrolling social…

Self-Driving IT Security: The Road Ahead

Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived,…