Helping MSPs Protect SMBs at Scale Without Complexity Cyber attacks are hitting small and medium-sized businesses (SMBs) harder than ever. According to Check Point Research, weekly attacks on SMBs have increased by 61 percent, outpacing trends in large enterprises. As…
Category: Check Point Blog
FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild
Check Point Research identifies how the new social engineering technique, FileFix, is being actively tested by threat actors in the wild. Attackers have long exploited human trust as a primary attack surface, and they’re doing it again with a new…
From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture and Scalability in Under a Week
For a California-based fintech company, rapid growth has been the norm. Over the past four years, the company has expanded from 80 to more than 450 employees, including a globally dispersed team of over 100 developers. Their mission? To build…
AI Shield: How Artificial Intelligence Protects Your Digital Life
Artificial intelligence, the unsung hero of modern cyber security, works tirelessly to protect our digital world. While AI’s creative capabilities are well-known, its most critical role is safeguarding data, privacy, and infrastructure from sophisticated cyber threats. As Albert Einstein wisely…
Cyber Security Starts with People: Smarter Training, Stronger Defense
Cyber threats are advancing rapidly, with over 75% of attacks starting via email. Traditional defenses alone are no longer sufficient, which is why SmartAwareness by Check Point, part of Infinity Global Services (IGS), offers a modern, AI-powered approach to security…
Check Point Named a Leader in the 2025 Forrester Wave™: Zero Trust Platforms Evaluation
Recognized for our prevention-first network security platform across hybrid environments. The 2025 Forrester Wave™: Zero Trust Platforms, Q3 2025, has named Check Point a Leader. For us, this recognition reflects the maturity of our Zero Trust capabilities and the focus…
Now Live: Infinity Global Services Offering on AWS Marketplace—A Seamless Way to Secure the Future
Infinity Global Services (IGS) offerings are now available on Amazon Web Services (AWS) Marketplace. These expert-led cyber security services offerings mark a significant advancement in delivering enterprise-grade cyber security that is accessible, scalable, and cost-effective. Whether you’re using Check Point…
Latin America 2025 Mid-Year Cyber Snapshot Reveals 39% Surge in Attacks as AI Threats Escalate Regional Risk
Latin America is grappling with an elevated rate of cyber attacks in the first half of 2025. Organizations in the region are being targeted by an average of 2,716 attacks per week, which is 39% higher than the global weekly…
June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats
Cyber criminals continue to innovate, with a recent innovation involving the hijacking of expired Discord vanity invite links to silently deliver malicious payloads. This new campaign, discovered by Check Point Research, delivers AsyncRAT, now ranked number 3 among Top Malware…
Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation
Check Point Research identifies phishing domain patterns, offering actionable insights to proactively counter threats from the notorious cyber group behind recent airline attacks Scattered Spider, a sophisticated cyber threat group known for aggressive social engineering and targeted phishing, is broadening…
Employee Spotlight: Getting to Know Alon Kanat
Alon, can you tell us a bit about yourself? Well, I hold a Bachelor of Science and an MBA in Business Management from the University of Ben Gurion. Currently, I’m the Head of Data Engineering in the IT department, where…
How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two)
In Part 1 we covered the basics and how a fragmented approach can have a higher MTTD and MTTR. In part two we highlight five critical ways a hybrid mesh approach uniquely disrupts the ransomware lifecycle. How a Hybrid Mesh…
Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation
In today’s evolving threat landscape, proactive security measures are more critical than ever. Penetration Testing (PT) – a core service within Infinity Global Services (IGS) – plays a vital role in uncovering vulnerabilities before they can be exploited. Delivered by…
BEYOND DEFENSE: Hong Kong’s New Era of Financial Cyber Resilience
Hong Kong, a key international financial hub, is confronting increasingly sophisticated cyber threats that demand strong cyber resilience to protect its financial stability and economic operations. The dependence on digital platforms by essential infrastructure providers increases the potential impact of…
World SMB Day: Eight Network Tech Essentials Every Small Business Needs
Small and medium-sized businesses (SMBs) are the backbone of the global economy. And to be successful, they rely on technology. In this blog we explore top technology trends affecting SMBs and how they can survive and thrive in a hyperconnected…
The AI Arms Race: When Attackers Leverage Cutting-Edge Tech
For too long, the narrative around AI in cyber security has focused on its defensive capabilities. While AI is revolutionizing how organizations protect themselves – bringing unprecedented speed, accuracy, and automation – it’s crucial to acknowledge the other side of…
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
Modern cyber attacks move faster than ever before. While your security team is analyzing one threat, attackers are already spreading across your network, exploiting the gaps between siloed security tools and manual response processes. To stop threats, your security measures…
Educated Manticore Reemerges: Iranian Spear-Phishing Campaign Targeting High-Profile Figures
Amid growing warnings from agencies like the FBI and DHS about Iranian cyber activity, Check Point Research is sharing fresh, real-world examples from the past few days to shed light on how these threats are playing out in practice. We’ve…
AI Evasion: The Next Frontier of Malware Techniques
Check Point Research identifies the first documented case of malware embedding prompt injection to evade AI detection. Check Point Research discovered the first known case of malware designed to trick AI-based security tools The malware embedded natural-language text into the…
Frost & Sullivan Report Validates Value of Consolidated Security
The endpoint security landscape is evolving faster than many security teams can keep up. While organizations are being overwhelmed with alert fatigue from multiple disconnected tools, a new Frost & Sullivan report underscores that the future of cyber security belongs…