Small and medium-sized businesses (SMBs) are the backbone of the global economy. And to be successful, they rely on technology. In this blog we explore top technology trends affecting SMBs and how they can survive and thrive in a hyperconnected…
Category: Check Point Blog
The AI Arms Race: When Attackers Leverage Cutting-Edge Tech
For too long, the narrative around AI in cyber security has focused on its defensive capabilities. While AI is revolutionizing how organizations protect themselves – bringing unprecedented speed, accuracy, and automation – it’s crucial to acknowledge the other side of…
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
Modern cyber attacks move faster than ever before. While your security team is analyzing one threat, attackers are already spreading across your network, exploiting the gaps between siloed security tools and manual response processes. To stop threats, your security measures…
Educated Manticore Reemerges: Iranian Spear-Phishing Campaign Targeting High-Profile Figures
Amid growing warnings from agencies like the FBI and DHS about Iranian cyber activity, Check Point Research is sharing fresh, real-world examples from the past few days to shed light on how these threats are playing out in practice. We’ve…
AI Evasion: The Next Frontier of Malware Techniques
Check Point Research identifies the first documented case of malware embedding prompt injection to evade AI detection. Check Point Research discovered the first known case of malware designed to trick AI-based security tools The malware embedded natural-language text into the…
Frost & Sullivan Report Validates Value of Consolidated Security
The endpoint security landscape is evolving faster than many security teams can keep up. While organizations are being overwhelmed with alert fatigue from multiple disconnected tools, a new Frost & Sullivan report underscores that the future of cyber security belongs…
PDFguard: AI Engine Against Growing Threats in PDFs
In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware through sophisticated social engineering tactics. Recognizing this escalating threat, Check Point introduces PDFguard, an advanced AI engine…
The illusion of control: Can we ever fully secure autonomous industrial systems?
In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven decision-making into operational technology (OT) systems has created the impression of tighter control, smarter response times and predictive efficiency. This feeling of having control might actually be…
Defeating PumaBot: How Check Point Quantum IoT Protect Nano Agent Shields Surveillance Devices
The threat at a glance Darktrace researchers have identified PumaBot, a Go-based Linux botnet that focuses on embedded surveillance cameras and other IoT devices.Unlike spray-and-pray botnets that scan the whole internet, PumaBot pulls a curated IP list from its C2…
Third-Party Access: The Cyber Risk Manufacturers Can’t Afford to Ignore
Nearly 20% of all data breaches in recent years involved a third-party vendor, and they weren’t minor. According to IBM’s Cost of a Data Breach Report, breaches tied to third-party access took an average of 26 days longer to identify…
The Hidden AI Threat to Your Software Supply Chain
AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned from intriguing gadgets to indispensable sidekicks for modern developers. A recent survey by Stack Overflow revealed that over 76% of developers now rely on these assistants, with…
Minecraft Players Targeted in Sophisticated Malware Campaign
Malicious Minecraft Mods Discovered: Check Point Research (CPR) uncovered a multistage malware campaign in which the malware itself was embedded within fake Minecraft mods, shared on GitHub to specifically target active players. Three-Stage Infection Chain: The attack involves a Java…
Without automation, external attack surface management misses the point
In cyber security, external attack surface management (ASM) is like tending a garden, helping you keep track of plants (your assets) as they grow. It enables you to monitor your assets and quickly identify risks to them—like pests attacking the…
DMV-Themed Phishing Campaign Targeting U.S. Citizens
In May 2025, a sophisticated phishing campaign emerged, impersonating several U.S. state Departments of Motor Vehicles (DMVs). This campaign leveraged widespread SMS phishing (smishing) and deceptive web infrastructure to harvest personal and financial data from unsuspecting citizens. Victims received alarming…
Introducing the Ticket Enrichment AI Agent
Staying ahead of threats in the ever-evolving landscape of cyber security requires not only robust protection but also efficient and effective operational processes. At Check Point, we are committed to enhancing your security infrastructure with cutting-edge AI solutions. Today, we…
Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users
In February 2025, our detection engines identified a SpyLoan application on a victim’s device. The detected sample belonging to the “RapiPlata” application, which was available on Google Play (GP) and downloaded by over 100K victims. We estimate that around 150K…
Discover Check Point’s AI-powered, cloud-delivered security solutions at AWS re:Inforce 2025
Check Point continues to grow our offerings and capabilities for the Amazon Web Services (AWS) cloud. Over the last year, we’ve expanded our capabilities with AWS Gateway Load Balancers and AWS Cloud WAN, and we’ve launched CloudGuard WAF-as-a-Service on AWS…
Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks
Attackers took advantage of a Discord feature that lets expired or deleted invite links be reused, allowing them to hijack trusted community links and redirect users to harmful servers. The attack tricks users with a fake verification bot and phishing…
Check Point Research Warns of Holiday-Themed Phishing Surge as Summer Travel Season Begins
Over 39,000 new vacation-related domains registered in May 2025, with 1 in 21 flagged as malicious or suspicious—cyber criminals target travel enthusiasts and property owners through phishing scams mimicking popular platforms like Airbnb and Booking.com. As summer travel season kicks…
Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs
Managed service providers (MSPs) are facing a pivotal moment. As businesses of all sizes continue to adopt cloud platforms, hybrid work models, and mobile-first strategies, MSPs are being tasked with delivering stronger, faster, and more comprehensive cyber security services, many…