Why the EU’s Crisis Preparedness Needs a Digital Backbone The European Union recently urged its citizens to stock up on essentials—water, food, torches, medicine—for at least 72 hours in case of a major disruption. The recommendation, outlined in a report…
Category: Check Point Blog
Backup Data Resiliency: Backups Alone Aren’t Enough
Every year, March 31st marks another World Backup Day—a timely reminder to check if our data protection strategies are truly ready for today’s volatile cyber landscape. It is an illusion to think that cyber attacks on any industry can be…
NIS2: What do we know so far about the EU’s expanded cyber security regulation?
When it comes to security, potent emerging threats on the horizon are causing regulators to be more proactive than ever. For organizations, this means constant reorientation to new compliance frameworks, obligations, and risks. At the forefront of this regulatory churn…
Transforming Security Management with AI Agents and Assistants
Attackers are already using AI, but you can return fire by deploying your own AI-powered cyber security tools. Turning to general use LLMs like ChatGPT or DeepSeek is not an option for security management as they are not specialized for…
Leveraging AI in Financial Services with Resilience and Security
The financial services sector is at a critical juncture as it faces increasing pressure to adopt cutting-edge technologies like AI to stay competitive and relevant. Financial services and financial technology companies are rapidly embracing AI advancements, particularly large language models…
Protecting the Unchangeable – 23andMe Bankruptcy and What It Means for Data Privacy
The recent bankruptcy filing by 23andMe isn’t just another financial crisis – it’s a stark warning for the cyber security community. When a company entrusted with immutable, sensitive genetic data collapses, it forces us to reexamine how we protect data…
The Rise of VanHelsing RaaS: A New Player in the Ransomware Landscape
VanHelsing RaaS is a burgeoning ransomware-as-a-service (RaaS) platform that launched on March 7, 2025. Participants, from seasoned hackers to beginners, can join with a $5,000 deposit. Affiliates retain 80% of ransom payments, while core operators take 20%. The only stipulation…
Getting to Know Julio Lemus
Julio, can you tell us a bit about yourself? My name is Julio Lemus and I’m from Guatemala, but am currently living in Panamá. I’m part of the Check Point team for LATAM, covering the territory of Panamá, Venezuela, and…
Keeping Your Head Above Water: Cyber Security and Water
Water is the essence of life, but in today’s digital world, it’s also an increasingly attractive target for cyber criminals. Water treatment plants and distribution systems rely on digital controls, which, if compromised, can lead to disastrous consequences, including contamination,…
Zero Trust in the Era of Generative AI: Securing Information with Innovative Approaches
Introduction: Increasing Demand for AI-Enhanced Cybersecurity Enterprise security programs are evolving rapidly by embracing the new-generation AI technologies, including generative AI (GenAI) which offer numerous benefits, but also present new risks and threats. This two-sided sword has become a major…
Securing NVIDIA AI Cloud Data Centers with the Next Wave in Real-Time Runtime Security
The explosive growth of AI is transforming enterprises and cloud providers alike, creating unprecedented demand for secure, high-performance AI infrastructure. At NVIDIA GTC 2025, Check Point will share how it is integrating the NVIDIA Cybersecurity AI platform to secure the…
Check Point Accelerates Site-to-Site VPN for Azure Virtual WAN
As organizations seek to accelerate their cloud operations, ensuring secure and fast network performance to Azure Virtual WAN has become critically important. Check Point CloudGuard Network Security has now made available enhanced site-to-site VPN that simplifies Azure Virtual WAN network…
Is Firebase Phishing a Threat to Your Organization?
Check Point researchers have uncovered a sophisticated credential harvesting attack that leverages Firebase, a popular web application hosting service. This attack involves the creation of highly convincing and professionally designed phishing web pages that impersonate well-known services. The attackers also…
How Manufacturers Can Turn Security Into a Competitive Advantage
Digitization has significantly changed manufacturing over the past 25 years. The benefits include reducing inventory costs and machine downtime, and boosting throughput and forecasting accuracy. But as digitization has grown in prevalence, so have the security challenges facing manufacturers. This…
Check Point Named Gold Winner for Cloud Security in 2025 Globee Cybersecurity Awards
Check Point is honored to be featured as a Gold Winner for Cloud Security in the 2025 Globee Cybersecurity Awards. Check Point’s CloudGuard platform distinguished itself for its preventive approach to cloud security, focusing on stopping cyber attacks before they…
Beyond the Cloud | How Edge Computing is Unlocking IoT’s Full Potential
The Internet of Things (IoT) is transforming industries like healthcare, manufacturing, smart cities, and even autonomous vehicles—making our daily lives hyperconnected. But as more devices come online, relying solely on cloud computing can lead to slow response times, high bandwidth…
A Milestone in Hands-On Cyber Security Training: SecureAcademy’s First Global Cyber Range Challenge
SecureAcademy recently hosted its first-ever Global Cyber Range Challenge, a virtual event designed to provide cyber security students and enthusiasts with real-world, hands-on experience. With participants from 11 countries and 12 academic institutions, the event showcased the power of immersive…
The Role of WAF in Fintech & Financial Services
The financial sector serves as the backbone of the global economy, making it one of the most targeted industries for cyber attacks. As online banking, mobile transactions, and fintech innovations expand, cyber threats continue to evolve. Cyber criminals continuously exploit…
Dark Storm Team Claims Responsibility for Cyber Attack on X Platform – What It Means for the Future of Digital Security
In a stark reminder of the growing threat posed by hacktivist groups, the pro-Palestinian Dark Storm Team has taken credit for a major distributed denial-of-service (DDoS) attack on X (formerly Twitter). This attack underscores the vulnerability of even the most…
February 2025’s Malware Spotlight: AsyncRAT Emerges, Targeting Trusted Platforms
Check Point’s latest threat index highlights a new campaign involving the malware, AsyncRAT, a remote access trojan targeting Windows systems since 2019. The fourth most prevalent malware of the month, AsyncRAT, enables data theft, command execution, and system compromise. The…