Highlights: HTML files are being used in phishing attacks, mimicking trusted websites HT-ML Guard is designed to analyze HTML files and accurately determine whether they are malicious, enhancing cyber security defenses. Check Point Harmony Email and Collaboration customers remain protected…
Category: Check Point Blog
The 8 Things You Should Know About Cyber Attacks on the Education Sector and How to Prevent Them
2024 saw an escalation in cyber attacks on the critical Education Sector. Looking at overall numbers, cyber attacks are surging at an alarming rate, with organizations experiencing an average of 1,673 weekly attacks in 2024—a staggering 44% increase from the…
Expanding Cyber Security Education Globally: SecureAcademy Partners with Nonprofits
Cyber security education is not just a priority—it’s a necessity in today’s digital landscape. With cyber attacks on the rise globally, there is an unprecedented demand for skilled professionals to safeguard critical infrastructures, businesses, and individuals. To address this urgent…
Cyber Security Tips for Educators and Parents
The numbers are staggering: the average number of weekly cyber attacks per organization rose to 1,673 in 2024, a 44% increase compared to the previous year, according to Check Point’s The State of Cyber Security 2025 report. Among all sectors,…
Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback
Cyber criminals continue to refine their phishing tactics, targeting trusted global brands to deceive users and steal sensitive information. Check Point Research (CPR), the intelligence arm of Check Point® Software, has unveiled its latest findings for Q4 2024, revealing key…
How Grand Canyon Education Enhanced Their Cloud Security with CloudGuard
Educational institutions face unique challenges in maintaining robust cloud security. Grand Canyon Education (GCE) is a shared services partner dedicated to serving colleges and universities. GCE supports partner institutions’ students through operational functions that achieve organizational growth and student success.…
6 Cyber Security Challenges Emerge from World Economic Forum, Check Point Research on 2025 Threats
As we step into 2025, the cyber security landscape continues to be as complex as ever for security leaders looking to protect their organizations from increasingly injurious cyber threats. The World Economic Forum (WEF) detailed some of the most challenging…
AI Predictions for 2025: A Cyber Security Expert’s Perspective
As we approach 2025, the rapid evolution of artificial intelligence (AI) is set to dramatically reshape the cyber security landscape. As an AI and cyber security expert, I foresee several key developments that will significantly impact our digital world. The…
Check Point Heads to Davos 2025 to Discuss Advancing Cyber Security and Digital Trust in an Era of GenAI and Disinformation
Check Point’s Rupal Hollenbeck, President, and Dorit Dor, CTO, will be attending the World Economic Forum Annual Meeting 2025 next week from January 20-23. Rupal will speak at WEF Agenda sessions including “Democratizing Cybersecurity,” where she will discuss securing the…
Why Security Providers Choose Check Point
For 20 years, Network Technology Partners (NTP) has been protecting their customers from cyber attackers with cutting-edge, real-time cyber security and information technology. NTP gets to know its customers, ranging from SMBs to Fortune 500 enterprises, specializing in advanced security…
FunkSec: The Rising Yet Controversial Ransomware Threat Actor Dominating December 2024
As 2024 ended, a new name surged to the top of the cyber threat charts: FunkSec. Emerging as a leading ransomware-as-a-service (RaaS) actor, FunkSec made waves in December by publishing over 85 victim profiles on its Data Leak Site (DLS).…
5 Reasons You Won’t Want to Miss CPX 2025
As CPX 2025 approaches, the excitement is undeniable—and so is the opportunity. If you’re a security leader, cyber enthusiast, or someone who wants to stay current on the very latest in cyber threat prevention, CPX is the event you should…
5 Key Cyber Security Trends for 2025
As the digital world continues to evolve, threats to organizations are becoming more sophisticated, pervasive, and disruptive. Our annual 2025 State of Cyber Security Report is intended to provide cyber security leaders with critical insights into the evolving threat landscape…
3 CloudGuard Differentiators for Container Security
Kubernetes has become an enterprise’s go-to platform for orchestrating and managing container workloads for cloud-native software. As more organizations adopt it and cloud-native software scales and becomes more complex, the need for container security is high. Kubernetes and container workloads…
Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
Executive Summary: The FunkSec ransomware group emerged in late 2024 and published over 85 victims in December, surpassing every other ransomware group that month FunkSec operators appear to use AI-assisted malware development, which can enable even inexperienced actors to quickly…
Cracking the Code: How Banshee Stealer Targets macOS Users
Executive Summary: Since September, Check Point Research (CPR) has been monitoring a new version of the Banshee macOS Stealer, a malware that steals browser credentials, cryptocurrency wallets, and other sensitive data. Undetected for over two months, Banshee’s latest version introduced…
Fast Pace Health: Zero Phishing Incidents Since Harmony Email & Collaboration Implementation
Healthcare entities have a 51% probability of falling victim to phishing attacks. Successful incidents not only lead to control over systems, but can also expose patient health information, financial and insurance data. Healthcare providers are seeing an 81% uptick in…
Brand Impersonation Scam Hijacks Travel Agency Accounts
Recently, within the span of a week, a new and extensive phishing campaign compromised more than 7,300 businesses and 40,000 individuals around the world. The most heavily impacted regions are the United States (75%) and the European Union (10%). The…
Ensuring HIPAA Compliance with Secure Remote Access
When it comes to remote access, healthcare organizations must contend with the same challenges as their counterparts in many other industries: remote workers and third-party contractors need fast, reliable connections to enterprise resources. The security team also needs to defend…
Building Cyber Resilience with Trofi Security and Check Point
As the digital threat landscape grows increasingly complex, organizations are under mounting pressure to secure their environments against a variety of risks, from ransomware and phishing to sophisticated zero-day exploits. Businesses need security solutions that not only prevent breaches but…