Category: Check Point Blog

The Alarming Surge in Compromised Credentials in 2025

One of the most pressing cyber threats businesses face today is the rampant rise in compromised credentials. Data from Check Point External Risk Management (previously known as Cyberint), reveals a staggering 160% increase in compromised credentials so far in 2025…

Check Point Deploys Real-Time Threat Detection on Cardano Mainnet

Major banks are adopting public blockchains at an accelerating pace. Financial institutions are moving beyond pilot programs on private networks to live deployments on permissionless blockchains. Today, major financial institutions are issuing stablecoins and tokenizing real world assets (stocks, bonds,…

Cursor IDE: Persistent Code Execution via MCP Trust Bypass

CVE-2025-54136 –  MCPoison Key Insights Critical RCE Flaw in Popular AI-powered IDE Check Point Research uncovered a persistent remote code execution vulnerability in Cursor, a fast-growing AI-powered coding platform trusted by developers worldwide. MCP Vulnerability Cursor allows attackers to gain…

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve become fully weaponized, commercially available, and dangerously scalable. What began as clever video edits…

Employee Spotlight: Getting to Know Sandy Venkataraman

 Sandy, can you tell us a bit about yourself? I’m someone who loves making people laugh, growing stronger every day—mentally and professionally—and leading a team I genuinely care about at Check Point. What led to your decision to join Check…