How attackers infiltrated the npm ecosystem, what Check Point researchers uncovered, and how organizations can protect their development pipelines. The Shai-Hulud 2.0 campaign, referred to by its operators as The Second Coming, is one of the most extensive and fast…
Category: Check Point Blog
How CloudGuard WAF Lowers Risk and Total Cost of Ownership (TCO)
Security teams must protect apps and APIs without drowning in rule maintenance or false-positive triage. Many traditional WAFs pile on hidden expenses like manual tuning, lot of false-positives, and breach fallout that increase costs and drain resources. Check Point CloudGuard…
The 2026 Tech Tsunami: AI, Quantum, and Web 4.0 Collide
The year 2026 will not be defined by incremental upgrades. It will be shaped by an unprecedented collision of forces: next-generation computing, hyper-automation, and a global cyber security reckoning. Technological convergence and the rise of autonomous systems will redefine global…
GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users
Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts normal phone use through persistent background activity. During an internal threat-hunting investigation, Check Point Harmony Mobile Detection Team identified a network of Android applications on…
Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-Loss Products
The global appetite for GLP-1 medications like Ozempic, Wegovy and Mounjaro have created something far more dangerous than a cultural trend. It has created the perfect opening for cyber criminals who understand how desperation, scarcity and online misinformation intersect. As…
Cyber Insurance Won’t Save You from Bad Hygiene
Why foundational failures still cost companies, even when they’re insured Cyber insurance is no longer a luxury. It’s a boardroom staple, a checkbox on every enterprise risk register. But most organizations are betting on a safety net that may not…
The Black Friday Cyber Crime Economy: Surge in Fraudulent Domains and eCommerce Scams
Key findings Malicious activity is rising, with 1 in 11 newly registered Black Friday themed domains classified as harmful. Brand impersonation remains a primary tactic, with 1 in 25 new domains related to the reputable ecommerce marketplaces of Amazon, AliExpress,…
Check Point Launches Managed Rules for AWS Network Firewall
Managing network security is a critically important and challenging task, especially in cloud environments. Scaling firewalls across tens of subnets and VPCs can become challenging with creating, maintaining, and updating many custom rule sets. Depending on the how many firewalls…
Best-in-Class GenAI Security: When CloudGuard WAF Meets Lakera
Artificial intelligence is transforming every business process. From automating customer support to enabling autonomous decision-making, enterprises are rapidly embedding large language models (LLMs), generative AI, and intelligent agents into their core workflows. While AI accelerates innovation, it also expands the…
How CIOs Can Turn AI Visibility into Strategy
Generative AI is everywhere and it’s only growing. Whether you know it or not, tools such as ChatGPT, Claude, DeepSeek, and Gemini are being actively used in your office. A recent study from MIT’s Nanda Project found that 90% of…
The State of Ransomware in Q3 2025
The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law enforcement takedowns earlier in the year, ransomware attacks remain at historically high levels. Check Point Research tracked 1,592 new victims across 85 active extortion groups,…
Payroll Pirates: One Network, Hundreds of Targets
Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since mid-2023, a financially motivated network has been quietly hijacking payroll systems, credit unions, and trading platforms across the U.S. Their method? Malvertising. Their goal? Money.…
Global Cyber Attacks Surge in October 2025 Amid Explosive Ransomware Growth and Rising GenAI Threats
Global Overview In October 2025, the global volume of cyber attacks continued its upward trajectory. Organizations worldwide experienced an average of 1,938 cyber attacks per week, marking a 2% increase from September and a 5% rise compared to October 2024.…
New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond
With more than 5.4 billion users worldwide (according to Statista), Facebook remains the world’s most influential social platform and a critical marketing channel for small and medium-sized businesses. Its vast reach and trusted brand make it a prime target for…
Expanding CloudGuard: Our Journey to Secure GenAI Apps
When we first launched CloudGuard WAF, our mission to deliver the best web and API security in the world in terms of threat prevention rate, accuracy, and ease of management. Unlike traditional WAFs built on static signatures, CloudGuard WAF was…
We See Threats Before They Hit: How AI and Human Intelligence Are Rewriting Cyber Defense
In the cyber security community, the ability to see a threat before it strikes defines who stays safe and who gets hit. This was the central theme of Check Point’s recent Threat Intelligence live AMA Reddit webinar, where leading experts…
Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test
As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition. Enterprises around the world are rapidly adopting AI, and it is providing significant productivity and efficiency gains. While AI provides amazing productivity…
Inside the Rise of AI-Powered Pharmaceutical Scams
Introduction Over the past few months, we identified an emerging online threat that combines fraud, social engineering, and genuine health risks. Scammers are now impersonating licensed physicians and medical clinics to promote counterfeit or unsafe medications, frequently leveraging AI and…
Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered
Trust alone isn’t a security strategy. That’s the key lesson from new research by Check Point Research, which uncovered multiple vulnerabilities in Microsoft Teams that could allow attackers to impersonate executives, manipulate messages, and spoof notifications. With more than 320…
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
Key Highlights XLoader 8.0 malware is one of the most evasive and persistent information stealers in the wild, using multi-layer encryption, fake domains, and constant updates to avoid detection. Check Point Research used AI-assisted malware analysis to understand it faster…