Category: Check Point Blog

The State of Ransomware in Q3 2025

The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law enforcement takedowns earlier in the year, ransomware attacks remain at historically high levels. Check Point Research tracked 1,592 new victims across 85 active extortion groups,…

Payroll Pirates: One Network, Hundreds of Targets

Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since mid-2023, a financially motivated network has been quietly hijacking payroll systems, credit unions, and trading platforms across the U.S. Their method? Malvertising. Their goal? Money.…

Expanding CloudGuard: Our Journey to Secure GenAI Apps

When we first launched CloudGuard WAF, our mission to deliver the best web and API security in the world in terms of threat prevention rate, accuracy, and ease of management. Unlike traditional WAFs built on static signatures, CloudGuard WAF was…

Inside the Rise of AI-Powered Pharmaceutical Scams

Introduction Over the past few months, we identified an emerging online threat that combines fraud, social engineering, and genuine health risks. Scammers are now impersonating licensed physicians and medical clinics to promote counterfeit or unsafe medications, frequently leveraging AI and…

Hezi Rash: Rising Kurdish Hacktivist Group Targets Global Sites

A new ideologically-motivated threat actor has emerged and growing technical capabilities: Hezi Rash. This Kurdish nationalist hacktivist group, founded in 2023, has rapidly escalated its presence through a series of distributed denial-of-service (DDoS) attacks targeting countries perceived as hostile to…

How to Reduce Your TCO with Check Point’s SASE

Network security solutions can be complex and expensive to operate, especially when based on hardware appliances. Additionally, they can degrade performance, which can impact productivity. Adopting the right solution can help simplify the network, reduce costs, improve productivity and time…

How to reduce your TCO with Check Point’s SASE

Network security solutions can be complex and expensive to operate, especially when based on hardware appliances. Additionally, they can degrade performance, which can impact productivity. Adopting the right solution can help simplify the network, reduce costs, improve productivity and time…

AI 2030: The Coming Era of Autonomous Cyber Crime

Organizations around the world are rapidly adopting AI, including across the enterprise, where it is already providing significant efficiency gains. As a result, cyber security is entering a turning point where AI fights AI. The phishing scams and deepfakes of…

LockBit Returns — and It Already Has Victims

Key Takeaways LockBit is back. After being disrupted in early 2024, the ransomware group has resurfaced and is already extorting new victims. New version, new victims. Check Point Research identified a dozen organizations hit in September 2025, half by the…

ChatGPT Atlas: The First Step Toward AI Operating Systems

The Big Picture OpenAI’s ChatGPT Atlas browser is the prototype for how we’ll use computers in the future. Within a few years, operating systems will be powered by AI as users interact through prompts instead of clicking applications. You’ll describe…

AI-Powered Phishing Detection: The Next Generation Security Engine

Check Point is thrilled to introduce a continuously-trained AI-engine designed to analyze key information about websites, achieving remarkable results in detecting phishing attempts. Integrated with our ThreatCloud AI, it offers comprehensive protection across Quantum gateways, Harmony Email, Endpoint, and Harmony…