Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived,…
Category: Check Point Blog
Iranian Threat Actor Nimbus Manticore Expands Campaigns into Europe with Advanced Malware and Fake Job Lures
Key Highlights Check Point Research is actively tracking Iranian threat actor Nimbus Manticore. Our latest findings show it is expanding operations into Europe and now targeting the defense, telecom, and aerospace sectors. The group uses fake job portals and spear‑phishing…
Don’t Get Rekt: The NFT Security Handbook That Could Save Your Digital Fortune
Picture this: You’ve just minted what you think is the next Bored Ape, only to discover you’ve actually given a hacker permission to drain your entire wallet. Or maybe you’ve proudly displayed your new 10 ETH NFT purchase, only to…
Check Point Celebrates Partner Excellence at the 2025 Check Point Software Technologies Asia Pacific Partner Conference in Hanoi
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, proudly recognised the top-performing partners across Asia Pacific at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held from 8th -11th September…
Reading Between the Lines: Satisfaction Analysis from Untagged Chatbot Conversations
Understanding user satisfaction in conversational AI In the rapidly evolving landscape of artificial intelligence, chatbots have become a cornerstone of customer service, support, and engagement across various industries. Despite their widespread adoption, one of the persistent challenges remains: accurately gauging…
Check Point to Acquire Lakera, Redefining Security for the AI era
We’re excited to share the Check Point is acquiring Lakera to deliver a full AI security stack for AI-powered enterprises AI is the new frontier of the IT revolution As organizations seek to modernize operations and unlock new business potential, AI-driven…
Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…
Check Point Named a Leader in the 2025 IDC MarketScape Report for Worldwide Enterprise Hybrid Firewalls.
The 2025 IDC MarketScape Report for Worldwide Enterprise Hybrid Firewalls, has named Check Point a Leader. We believe this recognition reflects the maturity of our Hybrid Mesh Firewall capabilities and the focus we’ve placed on unifying, automating and simplifying security operations…
Meet Yurei: The New Ransomware Group Rising from Open-Source Code
New Group, Fast Growth: Yurei ransomware first appeared on September 5, already listing three victims in Sri Lanka, India, and Nigeria within its first week. Copy-Paste Malware: The ransomware is largely based on the open-source Prince-Ransomware project, showing how attackers…
Global Cyber Threats August 2025: Agriculture in the Crosshairs
In August 2025, the global cyber threat landscape presented a complex interplay of stability and alarming new challenges. Organizations around the world confronted an average of nearly 2,000 cyber attacks each week—a slight 1% decrease from July but a stark…
The Great NPM Heist – September 2025
On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.…
The Networking and Security Shifts Fueling the Rise of SASE
Today’s workplace is no longer defined by office walls. Consequently, IT and security teams must rethink their approach to access and security. Enter Secure Access Service Edge (SASE), an architecture that merges network and security services into a unified, cloud-delivered…
Passing the Security “Vibe” Check
Imagine walking into a kitchen where you can shout out recipes and a robot instantly cooks up a meal. You ask for pasta, and within minutes you have a steaming plate in front of you. The speed and convenience are…
Resilient by Design: Network Security for the Next Disruption
Whether it’s a pandemic, war, or natural disaster, one thing is certain: disruption is inevitable. For information security professionals, the important question is whether your network is ready to keep operations running securely. There are two essential tactics you can…
Hexstrike-AI: When LLMs Meet Zero-Day Exploitation
Key Findings: Newly released framework called Hexstrike-AI provides threat actors with an orchestration “brain” that can direct more than 150 specialized AI agents to autonomously scan, exploit, and persist inside targets. Within hours of its release, dark web chatter shows…
The Drift–Salesforce Attack: Time to Rethink Your SaaS Security
A SaaS Security nightmare for IT managers everywhere recently came true. Attackers leveraged legitimate OAuth tokens from Salesloft’s Drift chatbot integration with Salesforce to silently exfiltrate customer data from the popular CRM platform, according to Google Threat Intelligence Group. The…
Employee Spotlight: Getting to Know Julia Rabinovich
Julia, can you tell us a bit about yourself? I’m a system architect in the Quantum Network Security Products department. My main responsibilities focus on building system solutions and related architectural work, but I’m also very passionate about promoting a…
Cyber Attacks Surge Against Education Sector Ahead of Back-to-School Season
As millions of students return to classrooms and campuses, schools are facing another challenge: a sharp rise in cyber attacks. According to Check Point Research, from January through July 2025, the education sector continued its streak as the most targeted…
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewalls
Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats Check Point is named a Leader in the 2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall. Gartner recognized Check Point for ability to execute and completeness…
ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing
ZipLine is one of the most advanced social engineering phishing campaigns seen by Check Point Research. Attackers reverse the usual phishing flow by starting contact through a company’s public “Contact Us” form, tricking victims into initiating email correspondence. They exchange…