Cyber Attack Surge: In Q1 2025, cyber attacks per organization increased by 47%, reaching an average of 1,925 weekly attacks. Sectors Most Affected: Education saw the highest number of attacks, with 4,484 weekly, followed by government and telecommunications with 2,678…
Category: Check Point Blog
Check Point and Fuse to Deliver First Real-Time Blockchain Firewall
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn’t kept pace. In 2024 alone, crypto platforms lost over $2.2 billion to cyber attacks, with sophisticated exploits…
Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy
Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced Persistent Threat (APT) 29, a Russian-linked threat group. The operation targeted diplomatic organizations throughout Europe. The campaign appears to continue a previous operation called Wineloader,…
Infinity Global Services’ Cyber Park Launches “Beacon in the Dark” – A New Cyber Security Escape Room Adventure
Step into the shadows and sharpen your digital instincts—Beacon in the Dark, the latest escape room experience in Check Point’s IGS Cyber Park, is now live. First launched at CPX and now available for free on Cyber Park, the game…
Collateral Damage: The Hidden Cost of Cyber Risks
Unanticipated cyber threats can rapidly exhaust cyber security budgets and derail carefully planned strategies. Among these challenges, distributed denial of service (DDoS) attacks stand out as a prime example of how unexpected risks can disrupt even the most secure systems.…
Smart Buses, Smarter Threats | Securing the Future of Connected Transit
As public transportation evolves, bus systems face new risks. Many systems still rely on older technology (outdated OT devices – such as standalone diagnostic tools), which wasn’t built to handle today’s complex cyber attacks. While modern buses use technologies like…
Harmony SaaS Delivers Next-Level SaaS Security for Google Cloud Customers
Your organization relies on a growing portfolio of SaaS applications to drive productivity. But this shift has brought with it a shadow of complexity and risk. Shadow IT, misconfigured apps, and third-party integrations now form a fragmented, often-invisible attack surface—one…
Securing a Hyperconnected World: The Case for Check Point’s Hybrid Mesh Security Architecture
Introduction: AI is reshaping cybersecurity—accelerating both innovation and attack sophistication. As enterprises expand across cloud, remote, and on-prem environments, cybercriminals are leveraging generative AI to launch faster, more convincing, and more damaging campaigns. Traditional firewalls and siloed solutions cannot keep…
March 2025: Malware Spotlight – FakeUpdates and RansomHub Ransomware Group Dominate Cyber Threats
Our latest Global Threat Index for March 2025 shows the continued dominance of FakeUpdates, a downloader malware that remains the most prevalent cyber threat worldwide. This sustained threat comes as RansomHub ransomware campaigns gain traction, marking a growing concern in…
Check Point Cloud Firewalls Achieve Industry Best 100% Block Rate and Accuracy: CyberRatings.Org Test Results Confirm
Organizations demand uncompromising protection against today’s sophisticated threats while ensuring minimal disruption to legitimate business operations. Check Point CloudGuard Network Security has just set a new industry benchmark—achieving a 100% exploit block rate including evasions in independent testing conducted by…
6 Reasons to Visit Check Point at RSAC 2025
The RSA Conference is where the cyber security world comes together, and this year, Check Point’s presence will be greatly felt. From breakthrough AI defenses to exclusive executive gatherings, we’re bringing innovation, insight, and hands-on experiences to the show floor.…
World Health Day 2025: When Cyber Security Fails, So Does Public Health
On World Health Day 2025, we are reminded that health is not only about biology and behavior—it’s about infrastructure, access, and now, cyber security. As this important critical sector grows increasingly digital, it also becomes increasingly vulnerable. Patient lives, sensitive…
Why AI-Powered Cyber Security is Essential in a Hyperconnected World
In today’s digital landscape, the boundaries of the corporate network have expanded far beyond the traditional data center. The rapid adoption of cloud, remote work, IoT, and mobile devices has reshaped how organizations operate—and how they must defend themselves against…
Tax Season Scams: How to Protect Yourself from Cyber Security Threats
Tax season is a critical time of year, not only for tax authorities but also for cyber criminals who seize the opportunity to launch targeted attacks. Individuals filing their taxes or dealing with tax-related matters become easy targets for attackers…
Celebrate World Cloud Security Day with our new Zero Trust and Hybrid Cloud Security eBook
Today, we recognize the value of cloud security. As more and more of our daily lives, business processes, and critical infrastructure are mediated by the cloud, ensuring ironclad cloud security takes on critical importance. From email and data storage to…
The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat. Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide…
The Weaponization of PDFs : 68% of Cyberattacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat. Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide…
Employee Spotlight: Getting to Know Vanessa Johnson
Vanessa, can you tell us a bit about yourself? I’m a proud Texas native with a passion for learning and helping others grow. I have a Bachelor’s degree in Marketing and a Master’s in Management and Administrative Sciences, which led…
What’s Next For Attack Surface Management? Perspectives From The Market Leader
We are delighted to announce that Cyberint, a Check Point company, was recently named a Leader and an Outperformer in the GigaOm Attack Surface Management Radar report. To read the full analysis, download the report here. In light of this…
Advanced Network Security with Check Point CloudGuard and Nutanix Cloud Platform
As businesses continue to migrate to the cloud, delivering the highest level of network security becomes increasingly challenging due to infrastructure and workload complexity. Check Point CloudGuard Network Security offers a comprehensive solution with Nutanix Cloud Platform to support advanced…