Executive Summary Check Point Research (CPR) has uncovered a series of ongoing, targeted cyber campaigns by Blind Eagle (APT-C-36)—one of Latin America’s most dangerous threat actors Days after Microsoft released a fix for CVE-2024-43451, the group began employing a comparable…
Category: Check Point Blog
Check Point Real-Time Threat Prevention Solves Web3 and Blockchain Security Concerns
The world of Web3 and blockchain technology holds immense potential for revolutionizing industries, from finance to supply chain management. However, despite many business leaders realizing the potential, one critical barrier stands in the way of widespread blockchain adoption: many businesses…
Why a Value-Driven Approach Makes Women Strong Leaders
In business, the path to value creation requires more than strategic planning and execution—it demands an ability to connect the dots, anticipate needs, and understand the human elements that drive progress. Women often demonstrate these capabilities through their natural inclination…
Check Point Software Partners with Variscite: Embedding Security at the Core, Securing IoT Devices from Day One
The growing demand for securing IoT devices presents a significant challenge for developers and manufacturers. Many struggle to implement security measures that fall outside their core expertise, often addressing security concerns only in the later stages of development. As a…
Five Reasons Retail Chains Can’t Ignore SASE
Retailers have always relied on technology to improve operations and enhance many aspects of the shopping experience – and that’s truer than ever today. From AI-powered predictive analytics to automated customer service, retailers are increasingly using digital innovations to stay…
Five Reasons to Choose Secure SD-WAN from Check Point
In today’s fast-paced digital landscape, businesses are increasingly in need of reliable, secure, and high-performance connectivity. Check Point’s secure SD-WAN solutions offer a comprehensive approach by combining top-notch security with optimized internet and network connectivity, ensuring safe and uninterrupted operations.…
Migrating from Hub and Spoke Network to Azure Virtual WAN
Azure Virtual WAN is a robust network service that combines networking, security, and routing functionalities into a single operational interface. This innovative approach simplifies the complexity of managing multiple connectivity types such as VNet, VPN, remote user, and ExpressRoute connectivity.…
Bridging the Cyber Security Talent Gap with AI and Experts
The cyber security skills shortage has been a growing concern for more than a decade. And as the threat landscape continues to grow in complexity, too many organizations have been left vulnerable to the threat of breach. Recognizing the need…
Auto-Deploying Check Point Firewalls with AWS Gateway Load Balancers
The dynamic nature of cloud infrastructure can present unique challenges in managing network security. Fortunately, Check Point and AWS have a solution. Check Point integration with AWS Gateway Load Balancers (GWLBs) offers organizations the ability to enhance network security while…
Check Point Expands Partner and Customer Advocacy Management Services, Strengthening Cyber Security Collaboration and Operational Resilience
At CPX 2025 Vegas, Check Point has unveiled the expansion of its Partner and Customer Advocacy Management Services, providing direct access to advocacy experts. These services enhance stability, streamline engagement, and facilitate proactive collaboration between Check Point, its partners, and…
Securing Latin America in 2025: How AI and Cyber Threat Intelligence Are Reshaping the Cyber Security Landscape
Under the dazzling lights of Las Vegas, Check Point unveiled its forward-thinking strategy for safeguarding our interconnected world at CPX 2025, its flagship annual cyber security conference. The event drew thousands of participants from the United States, Canada, and Latin…
How hunting for vulnerable drivers unraveled a widespread attack
Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest permissions, to bypass security measures and facilitate further infections. To prevent the abuse of vulnerable drivers, Microsoft’s 2015 policy required new drivers to be signed…
What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection
Executive Summary: In one of the largest thefts in digital asset history, hackers gained access to an offline Ethereum wallet and stole $1.5 billion worth of digital assets, primarily consisting of Ethereum tokens. The recent incident with Bybit marks a…
Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware.…
Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware.…
Cyber Criminals Using URL Tricks to Deceive Users
Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically,…
The Future of Sustainability | Bacteria, Meet the Internet of Things
In an era of pressing ecological crises, innovative technologies are emerging to address challenges that traditional methods have struggled to solve. One of the new frontiers in this quest is microbial IoT, a revolutionary fusion of microbiology and IoT. With…
Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winners
At Check Point Software, our partners are at the core of our mission to deliver cutting-edge cyber security solutions worldwide. As cyber threats continue to evolve in complexity and frequency, our partners play a vital role in safeguarding businesses and…
Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platform
Check Point today unveiled its strategic vision for securing the hyper-connected world at CPX 2025 Bangkok, its premier annual cyber security event. With nearly 1,650 employees, customers and partners from across APAC in attendance, Check Point showcased how AI-driven security…
Check Point Software Announces Plans to Expand Global R&D Footprint with First Asia-Pacific Research & Development Centre in Bengaluru
Check Point has announced its plans to establish its first Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India, with a goal to drive innovation in cyber security solutions and strengthen global product development and talent growth. This strategic expansion,…