Phishing continues to be a powerful tool in the cyber criminal arsenal. In the second quarter of 2025, attackers doubled down on impersonating the world’s most trusted brands—those that millions of people rely on every day. From tech giants to…
Category: Check Point Blog
SharePoint Zero-Day CVE-2025-53770 Actively Exploited: What Security Teams Need to Know
Key findings : A critical zero-day vulnerability (CVE-2025-53770 ) in SharePoint on-prem is actively being exploited in the wild. Dubbed “ToolShell,” the campaign enables unauthorized access to on-prem SharePoint servers, posing a serious risk to corporate environments Check Point Research identified…
Independent Tests Prove It: Check Point’s SASE Excels in Security & User Experience
With employees working in the office, from home, and points beyond, securing the hybrid workforce requires more than just a VPN replacement in the cloud, or a scattered mix of point solutions. Organizations need a cloud-delivered platform that combines secure…
Employee Spotlight: Getting to Know Sandy Venkataraman
Sandy, can you tell us a bit about yourself? I’m someone who loves making people laugh, growing stronger every day—mentally and professionally—and leading a team I genuinely care about at Check Point. What led to your decision to join Check…
Corporate blog: Employee Spotlight: Getting to Know Sandy Venkataraman
Sandy, can you tell us a bit about yourself? I’m someone who loves making people laugh, growing stronger every day—mentally and professionally—and leading a team I genuinely care about at Check Point. What led to your decision to join Check…
Global Cyber Attacks Surge 21% in Q2 2025 — Europe Experiences the Highest Increase of All Regions
Global Attacks Continued to Rise, But the Details Tell a Bigger Story Every quarter, Check Point Research publishes the threats of the past three months, gathering intelligence from our ThreatCloud AI platform, which analyzes millions of indicators of compromise (IoCs)…
Introducing Check Point Quantum Spark 2500: Smarter Security, Faster Connectivity, and Simpler MSP Management
Helping MSPs Protect SMBs at Scale Without Complexity Cyber attacks are hitting small and medium-sized businesses (SMBs) harder than ever. According to Check Point Research, weekly attacks on SMBs have increased by 61 percent, outpacing trends in large enterprises. As…
FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild
Check Point Research identifies how the new social engineering technique, FileFix, is being actively tested by threat actors in the wild. Attackers have long exploited human trust as a primary attack surface, and they’re doing it again with a new…
From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture and Scalability in Under a Week
For a California-based fintech company, rapid growth has been the norm. Over the past four years, the company has expanded from 80 to more than 450 employees, including a globally dispersed team of over 100 developers. Their mission? To build…
AI Shield: How Artificial Intelligence Protects Your Digital Life
Artificial intelligence, the unsung hero of modern cyber security, works tirelessly to protect our digital world. While AI’s creative capabilities are well-known, its most critical role is safeguarding data, privacy, and infrastructure from sophisticated cyber threats. As Albert Einstein wisely…
Cyber Security Starts with People: Smarter Training, Stronger Defense
Cyber threats are advancing rapidly, with over 75% of attacks starting via email. Traditional defenses alone are no longer sufficient, which is why SmartAwareness by Check Point, part of Infinity Global Services (IGS), offers a modern, AI-powered approach to security…
Check Point Named a Leader in the 2025 Forrester Wave™: Zero Trust Platforms Evaluation
Recognized for our prevention-first network security platform across hybrid environments. The 2025 Forrester Wave™: Zero Trust Platforms, Q3 2025, has named Check Point a Leader. For us, this recognition reflects the maturity of our Zero Trust capabilities and the focus…
Now Live: Infinity Global Services Offering on AWS Marketplace—A Seamless Way to Secure the Future
Infinity Global Services (IGS) offerings are now available on Amazon Web Services (AWS) Marketplace. These expert-led cyber security services offerings mark a significant advancement in delivering enterprise-grade cyber security that is accessible, scalable, and cost-effective. Whether you’re using Check Point…
Latin America 2025 Mid-Year Cyber Snapshot Reveals 39% Surge in Attacks as AI Threats Escalate Regional Risk
Latin America is grappling with an elevated rate of cyber attacks in the first half of 2025. Organizations in the region are being targeted by an average of 2,716 attacks per week, which is 39% higher than the global weekly…
June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats
Cyber criminals continue to innovate, with a recent innovation involving the hijacking of expired Discord vanity invite links to silently deliver malicious payloads. This new campaign, discovered by Check Point Research, delivers AsyncRAT, now ranked number 3 among Top Malware…
Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation
Check Point Research identifies phishing domain patterns, offering actionable insights to proactively counter threats from the notorious cyber group behind recent airline attacks Scattered Spider, a sophisticated cyber threat group known for aggressive social engineering and targeted phishing, is broadening…
Employee Spotlight: Getting to Know Alon Kanat
Alon, can you tell us a bit about yourself? Well, I hold a Bachelor of Science and an MBA in Business Management from the University of Ben Gurion. Currently, I’m the Head of Data Engineering in the IT department, where…
How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two)
In Part 1 we covered the basics and how a fragmented approach can have a higher MTTD and MTTR. In part two we highlight five critical ways a hybrid mesh approach uniquely disrupts the ransomware lifecycle. How a Hybrid Mesh…
Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation
In today’s evolving threat landscape, proactive security measures are more critical than ever. Penetration Testing (PT) – a core service within Infinity Global Services (IGS) – plays a vital role in uncovering vulnerabilities before they can be exploited. Delivered by…
BEYOND DEFENSE: Hong Kong’s New Era of Financial Cyber Resilience
Hong Kong, a key international financial hub, is confronting increasingly sophisticated cyber threats that demand strong cyber resilience to protect its financial stability and economic operations. The dependence on digital platforms by essential infrastructure providers increases the potential impact of…