There’s a quiet revolution happening in cyber security. It isn’t unfolding in dark forums or exotic zero day markets. It’s happening in plain sight—inside large language models, voice cloning tools, and autonomous software agents. Generative AI and agentic systems are…
Category: Check Point Blog
Microsoft Dominates Phishing Impersonations in Q3 2025
Cyber criminals are sticking with familiar names, and Microsoft remains their favorite disguise. According to Check Point Research’s Brand Phishing Report for Q3 2025, Microsoft accounted for 40% of all brand impersonation attempts this quarter, holding its place as the…
Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware Surges 46%
In September 2025, the global cyber threat landscape reflected a temporary stabilization in overall attack volumes — yet beneath the surface, ransomware activity and data risks linked to generative AI (GenAI) surged to new highs. Organizations worldwide faced an average…
Check Point Partners with HackShield to Empower the Next Generation of Cyber Heroes
We couldn’t be more excited to announce our new partnership with HackShield, the award-winning cyber education platform for children. This collaboration will bring essential cyber awareness education to kids aged 8 to 12 through HackShield’s gamified learning experience. Our goal:…
Zero Trust Access Made Simple for Contractors
Third-party contractors are critical for many organizations. They bring specialized skills, help scale projects quickly, and support both short-term initiatives and long-term business needs. Yet contractors also introduce unique security and operational challenges. Whether it’s a quick project or a…
Rhadamanthys 0.9.2: A Stealer That Keeps Evolving
Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…
Amazon Prime Day 2025: The Dark Side of Deals
Amazon’s Fall Prime Day not only kicks off the holiday shopping season with deals too good to ignore, it also creates one of the biggest opportunities of the year for cyber criminals. As millions of consumers flock online for deals,…
5 Essential Cyber Security Tips for Cyber Security Awareness Month
October marks Cybersecurity Awareness Month, an annual initiative designed to help everyone stay safer and more secure online. In today’s digital landscape, cyber threats are constantly evolving, targeting individuals and organizations alike with increasingly sophisticated tactics. Whether you’re scrolling social…
The Rising Cyber Threat to Manufacturing: A Call to Action for Executives
Key Insights Manufacturing faces an average of 1,585 weekly attacks per organization, a 30% year-over-year increase. Ransomware remains the dominant threat, with incidents costing hundreds of millions in losses and in some cases forcing insolvency. Supply chain connectivity magnifies risk.…
How to Defend Against Credential Attacks with a Hybrid Mesh Architecture
Introduction Credential-based attacks have reached epidemic levels. The 2025 Verizon Data Breach Investigations Report (DBIR) underscores the trend: 22% of breaches now start with compromised credentials, while Check Point External Risk Management found that leaked credential volumes surged 160% year-over-year.…
Playing Offside: How Threat Actors Are Warming Up for FIFA 2026
Introduction Every four years, the World Cup captures the attention of billions. With that attention comes opportunity – not only for sponsors, broadcasters, and legitimate merchants, but also for adversaries who see in this spectacle a marketplace of deception. As…
Quantum-Safe Cyber Security: Current Capabilities and the Road Ahead
Quantum computing is moving from theory to reality. While largescale quantum computers are not yet available, their future impact on cyber security is clear: algorithms like RSA, Diffie–Hellman, and Elliptic Curve Diffie-Hellman which secure VPNs, TLS, and digital identities, will…
Self-Driving IT Security: The Road Ahead
Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived,…
Iranian Threat Actor Nimbus Manticore Expands Campaigns into Europe with Advanced Malware and Fake Job Lures
Key Highlights Check Point Research is actively tracking Iranian threat actor Nimbus Manticore. Our latest findings show it is expanding operations into Europe and now targeting the defense, telecom, and aerospace sectors. The group uses fake job portals and spear‑phishing…
Don’t Get Rekt: The NFT Security Handbook That Could Save Your Digital Fortune
Picture this: You’ve just minted what you think is the next Bored Ape, only to discover you’ve actually given a hacker permission to drain your entire wallet. Or maybe you’ve proudly displayed your new 10 ETH NFT purchase, only to…
Check Point Celebrates Partner Excellence at the 2025 Check Point Software Technologies Asia Pacific Partner Conference in Hanoi
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, proudly recognised the top-performing partners across Asia Pacific at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held from 8th -11th September…
Reading Between the Lines: Satisfaction Analysis from Untagged Chatbot Conversations
Understanding user satisfaction in conversational AI In the rapidly evolving landscape of artificial intelligence, chatbots have become a cornerstone of customer service, support, and engagement across various industries. Despite their widespread adoption, one of the persistent challenges remains: accurately gauging…
Check Point to Acquire Lakera, Redefining Security for the AI era
We’re excited to share the Check Point is acquiring Lakera to deliver a full AI security stack for AI-powered enterprises AI is the new frontier of the IT revolution As organizations seek to modernize operations and unlock new business potential, AI-driven…
Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…
Check Point Named a Leader in the 2025 IDC MarketScape Report for Worldwide Enterprise Hybrid Firewalls.
The 2025 IDC MarketScape Report for Worldwide Enterprise Hybrid Firewalls, has named Check Point a Leader. We believe this recognition reflects the maturity of our Hybrid Mesh Firewall capabilities and the focus we’ve placed on unifying, automating and simplifying security operations…