Enterprise security and networking teams need details fast, and we work hard to make sure your SASE admin experience is as streamlined as possible. But sometimes it’s better to integrate data into the tools you already use. Introducing the Harmony…
Category: Check Point Blog
EchoLink and the Rise of Zero-Click AI Exploits
In an increasingly AI-powered enterprise landscape, the recent discovery of a zero-click vulnerability in Microsoft 365 Copilot, dubbed EchoLink, should come as a stark warning for cyber security leaders. This isn’t just another flaw – it’s a new class of…
The Brain Behind Next-Generation Cyber Attacks
Introduction Last week, researchers at Carnegie Mellon University (CMU) revealed a finding that caught the attention of both the AI and cybersecurity worlds. Their work tackled a lingering challenge: whether today’s leading large language models (LLMs) can independently carry out…
Instagram Can Be Fun – Don’t Let It Become a Weapon: Behind Meta’s New Map Feature
When Instagram quietly rolled out its new “Friend Map” feature, it was billed as a fun way to see where friends are and discover shared hangouts. But the launch also sparked immediate concern, and for good reason. Location sharing isn’t…
GitHub Abuse Engine: Stay One Step Ahead
In the dynamic world of cyber security, staying ahead of malicious actors is paramount. We are thrilled to introduce the GitHub Abuse Engine, a cutting-edge engine of ThreatCloud AI designed to detect and mitigate malicious abuse on GitHub. This engine leverages…
Microsoft Vulnerabilities Exposed by Check Point Research
Check Point Research uncovered six fresh vulnerabilities in Microsoft Windows, including one critical flaw with potential for wide-reaching impact. These weaknesses could trigger system crashes, enable arbitrary code execution, or expose sensitive data across networks. Following a responsible disclosure process,…
New Data Reveals July’s Worst Ransomware Groups and Attack Surges
From critical infrastructure to classrooms, no sector is spared the risk of cyber threats. In July 2025, cyber attacks surged across nearly every industry and region, marking a sharp escalation in both scale and sophistication. This blog unpacks the latest…
The Alarming Surge in Compromised Credentials in 2025
One of the most pressing cyber threats businesses face today is the rampant rise in compromised credentials. Data from Check Point External Risk Management (previously known as Cyberint), reveals a staggering 160% increase in compromised credentials so far in 2025…
Check Point Deploys Real-Time Threat Detection on Cardano Mainnet
Major banks are adopting public blockchains at an accelerating pace. Financial institutions are moving beyond pilot programs on private networks to live deployments on permissionless blockchains. Today, major financial institutions are issuing stablecoins and tokenizing real world assets (stocks, bonds,…
Winning the Game You Didn’t Choose: The Case for External Cyber Defense in Government and Education
In today’s digital landscape, public sector organizations—particularly those in the State, Local, and Education (SLED) sectors—are contending with an unprecedented surge in cyber threats. Over the past several years, attacks against SLED institutions have been increasing not just steadily but…
Securing the Unmanaged: Check Point Enterprise Browser Delivers Zero Trust to Any Device
The modern workforce operates beyond traditional boundaries. Contractors use their own laptops, and hybrid employees embrace BYOD, to access critical systems with devices IT never touches. This flexibility powers business agility, but it also creates a massive security blind spot.…
Cursor IDE: Persistent Code Execution via MCP Trust Bypass
CVE-2025-54136 – MCPoison Key Insights Critical RCE Flaw in Popular AI-powered IDE Check Point Research uncovered a persistent remote code execution vulnerability in Cursor, a fast-growing AI-powered coding platform trusted by developers worldwide. MCP Vulnerability Cursor allows attackers to gain…
Real Enough to Fool You: The Evolution of Deepfakes
Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve become fully weaponized, commercially available, and dangerously scalable. What began as clever video edits…
CloudGuard WAF Expands Global Footprint with Eight New Points of Presence (PoPs)
Protect your applications and APIs with CloudGuard WAF — a unified, AI-driven security platform. We are excited to share that CloudGuard WAF global footprint has expanded with 8 new points of presence (PoPs) in recent months. This growth supports rising…
Ransomware in Q2 2025: AI Joins the Crew, Cartels Rise, and Payment Rates Collapse
Key Findings – Q2 2025 Ransomware Trends Ransomware-as-a-Service (RaaS) group disruptions: Several major ransomware groups have disappeared, leaving a fragmented ecosystem. Slight decline in public victim extortion: Fewer victims were named on data leak sites this quarter, likely due to…
Check Point Named Leader and Outperformer in 2025 GigaOm Radar for Anti-Phishing
We’re extremely excited to announce that Harmony Email & Collaboration was just named Leader and Outperformer in 2025 GigaOm Radar for Anti-Phishing, an enormous validation of our cyber security efficacy and block rate and one more proof point on how…
JSCEAL Targets Crypto App Users – A New Threat in the Cyber Security Landscape
Key Points: Check Point Research has discovered the JSCEAL campaign, which targets crypto app users by leveraging malicious advertisements The campaign uses fake applications impersonating popular cryptocurrency trading apps, with over 35,000 malicious ads served in the first half of…
Check Point Launches MDR 360° / MXDR 360°: Open, Vendor-Neutral Managed Detection and Response Services for Stronger Security
Check Point Software Technologies is proud to introduce MDR 360° / MXDR 360°, a new suite of managed detection and response service packages designed to simplify security operations, maximize visibility, and quickly contain threats across endpoint, identity, cloud, and network…
Proactive Security for MSPs: 4 Steps to Reduce Risk and Improve Margins
As an MSP, you’re increasingly expected to deliver more than just uptime and availability. Customers now rely on you for security, compliance, and risk reduction. That creates a tremendous opportunity: by evolving your offerings to include proactive security services, you…
Stopping Ransomware: How a Hybrid Mesh Architecture Disrupts the Attack Chain Part Three
In parts one and two, we explored the ransomware attack chain, the shortcomings of fragmented defenses, and the advantages of a unified hybrid mesh approach. In part three, Pete Nicoletti joins us to share practical steps CISOs can take right…