Category: Check Point Blog

June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats

Cyber criminals continue to innovate, with a recent innovation involving the hijacking of expired Discord vanity invite links to silently deliver malicious payloads. This new campaign, discovered by Check Point Research, delivers AsyncRAT, now ranked number 3 among Top Malware…

Employee Spotlight: Getting to Know Alon Kanat

Alon, can you tell us a bit about yourself? Well, I hold a Bachelor of Science and an MBA in Business Management from the University of Ben Gurion. Currently, I’m the Head of Data Engineering in the IT department, where…

BEYOND DEFENSE: Hong Kong’s New Era of Financial Cyber Resilience

Hong Kong, a key international financial hub, is confronting increasingly sophisticated cyber threats that demand strong cyber resilience to protect its financial stability and economic operations. The dependence on digital platforms by essential infrastructure providers increases the potential impact of…

The AI Arms Race: When Attackers Leverage Cutting-Edge Tech

For too long, the narrative around AI in cyber security has focused on its defensive capabilities. While AI is revolutionizing how organizations protect themselves – bringing unprecedented speed, accuracy, and automation – it’s crucial to acknowledge the other side of…

AI Evasion: The Next Frontier of Malware Techniques

Check Point Research identifies the first documented case of malware embedding prompt injection to evade AI detection. Check Point Research discovered the first known case of malware designed to trick AI-based security tools The malware embedded natural-language text into the…

Frost & Sullivan Report Validates Value of Consolidated Security

The endpoint security landscape is evolving faster than many security teams can keep up. While organizations are being overwhelmed with alert fatigue from multiple disconnected tools, a new Frost & Sullivan report underscores that the future of cyber security belongs…

PDFguard: AI Engine Against Growing Threats in PDFs

In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware through sophisticated social engineering tactics. Recognizing this escalating threat, Check Point introduces PDFguard, an advanced AI engine…

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned from intriguing gadgets to indispensable sidekicks for modern developers. A recent survey by Stack Overflow revealed that over 76% of developers now rely on these assistants, with…

Minecraft Players Targeted in Sophisticated Malware Campaign

Malicious Minecraft Mods Discovered: Check Point Research (CPR) uncovered a multistage malware campaign in which the malware itself was embedded within fake Minecraft mods, shared on GitHub to specifically target active players. Three-Stage Infection Chain: The attack involves a Java…

DMV-Themed Phishing Campaign Targeting U.S. Citizens

In May 2025, a sophisticated phishing campaign emerged, impersonating several U.S. state Departments of Motor Vehicles (DMVs). This campaign leveraged widespread SMS phishing (smishing) and deceptive web infrastructure to harvest personal and financial data from unsuspecting citizens. Victims received alarming…

Introducing the Ticket Enrichment AI Agent

Staying ahead of threats in the ever-evolving landscape of cyber security requires not only robust protection but also efficient and effective operational processes. At Check Point, we are committed to enhancing your security infrastructure with cutting-edge AI solutions. Today, we…

Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day

Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day Check Point Research (CPR) identified a previously unknown Windows vulnerability (CVE-2025-33053) being actively exploited in the wild. Following CPR’s responsible disclosure, Microsoft released a patch on its June 10th Patch Tuesday…

6 Key Insights from Check Point’s Cloud Security Report 2025

Cloud environments are evolving faster than many security teams can adapt. As hybrid, multi-cloud, edge, and SaaS adoption accelerates, organizations face fragmented systems, inconsistent controls, and widening attack surfaces. Threat detection is often delayed, tools are overwhelmed, and many defenses…

Lumma Infostealer – Down but Not Out?

Key Findings: The takedown achieved a significant disruption to Lumma infostealers’ infrastructure, but likely didn’t permanently affect most of its Russia-hosted infrastructure. Lumma’s developers are undertaking significant efforts to reinstate the activity and to conduct business as usual. There seems…

Accelerate your Operations with AI Powered Security Management and Quantum Smart-1 Management 700/7000 Series Appliances

Check Point introduces powerful all-in-one Quantum Smart-1 700/7000 Security Management appliances to manage security policies for both on-premises and cloud firewalls, delivering consolidated visibility, logging, compliance, and auditing across enterprise networks. These new 7th generation Quantum Smart-1 Security Management appliances…

Employee Spotlight: Getting to Rolando Panez

Rolando, can you tell us a bit about yourself? I’m a proud father of three beautiful girls. I was born and raised in Florida. I received a master’s degree in electrical engineering at the University of Florida. I worked on…

ThreatCloud AI Gives Harmony SASE Customers an Edge Against Cyber Threats

Today’s enterprise network faces an unprecedented barrage of advanced attacks designed to evade detection. Harmony SASE provides unmatched malware protection by leveraging the power of Check Point’s ThreatCloud AI, the brain behind our threat intelligence that delivers industry-leading protection against…

Harmony Mobile Leads in Miercom 2025 MTD Security Assessment

In today’s mobile-first world, where 75% of employees access sensitive corporate data through their smartphones, securing the mobile attack surface has become a critical priority for organizations. The challenge is distinguishing marketing claims from actual security performance. This is why…

Employee Spotlight: Getting to Know Jay Dave

Jay, can you tell us a bit about yourself? I’m passionate about cyber security and I am dedicated to creating a safer digital environment by breaking down complex risks into simple, manageable solutions. I strive to empower individuals and organizations…

AI, Agents, and the Future of Cyber Security

In just a few short years, the breakneck speed of advancements in AI have transformed nearly every industry, including cyber security. The pace of acceleration has forced IT and business leaders to rethink approaches to some of the most sensitive…

Ransomware Reloaded: Why 2025 Is the Most Dangerous Year Yet

May 12 marks Anti-Ransomware Day, a global awareness initiative created by INTERPOL and Kaspersky to commemorate the 2017 WannaCry outbreak. That infamous ransomware campaign crippled hundreds of thousands of systems worldwide, from UK hospitals to global logistics networks, and its…

Employee Spotlight: Getting to Know Tom De Laet

 Tom, can you tell us a bit about yourself? Currently I have the privilege of leading the Incident Response Team for EMEA at Check Point, based in Belgium, where I live with my wife and two daughters. My journey into…