Category: Check Point Blog

DragonForce Ransomware: Redefining Hybrid Extortion in 2025

The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing more dangerous. In this volatile landscape, DragonForce is emerging as one of the most intriguing and threatening actors of 2025. Born from possible hacktivist roots and now fully immersed in…

Microsoft Dynamics 365 Customer Voice Phishing Scam

Overview: Check Point researchers have identified a new phishing campaign that exploits Microsoft’s “Dynamics 365 Customer Voice,” a customer relationship management software product. It’s often used to record customer calls, monitor customer reviews, share surveys and track feedback. Microsoft 365…

Secure Coding in DevOps: Shifting Left for Stronger Security

In today’s rapidly evolving DevOps environment, the drive for speed often inadvertently amplifies security risks, leaving applications exposed to costly breaches. With global breach costs averaging $4.8 million last year, according to IBM’s annual Cost of a Data Breach Report…

Employee Spotlight: Getting to Know Anthony Gallo

Anthony, can you tell us a bit about yourself? I am originally from New Jersey, but currently live in South Carolina. I am an attorney on the Check Point team covering the Americas, working closely with many different business units…

Introducing ATAM 360°: Your Comprehensive Cyber Security Package

At Check Point, comprehensive cyber security with unmatched support is a top priority. We’re excited to introduce ATAM 360°, Check Point’s newly enhanced Advanced Technical Account Management (ATAM), a subscription-based service customized to your organization’s needs, with a designated engineer…

Employee Spotlight: Getting to Know Henrique Sauer

Henrique, can you tell us a bit about yourself? I’m a Security Engineer based in Brazil, passionate about solving complex cyber security challenges and helping organizations stay ahead of evolving threats. My journey in cyber security started early, and since…

The Hidden Downside of a Cloud-only SASE Architecture

As enterprises accelerate their shift toward secure access service edge (SASE), many are tempted to implement cloud-only security service edge (SSE) solutions. And while SSE provides modular security services like SWG, CASB, and ZTNA, it also introduces hidden costs, scalability…