Enterprise organizations are rapidly adopting AI tools to accelerate productivity, unlock fresh business insights, gain new competitive advantages, and drive revenue growth. But this transformation is bringing with it new and complex security challenges that introduce previously unseen risk. AI…
Tag: Check Point Blog
You Built the Brain. Now Protect It.
A Blueprint Architecture for Securing the AI Data Center & AI Factory As enterprises turn traditional data centers into AI factories powered by LLMs, they unlock new revenue streams, competitive differentiation, and operational efficiencies—but also expose themselves to unprecedented risk.…
The Agentic Era Arrives: How AI Is Transforming the Cyber Threat Landscape
The cyber security landscape is undergoing a significant shift. Between January and February 2026, we observed a major evolution in how threat actors adopt, weaponize, and operationalize AI. What was once experimental is now mature. What once required coordinated teams can now be executed…
Telegram’s Crackdown in 2026 and Why Cyber Criminals Are Still Winning
If you’ve been following the Telegram crackdown news, then you’ll know that Telegram entered 2026 under significant pressure. After years of being a largely permissive environment, the platform dramatically increased enforcement following the arrest of CEO Pavel Durov in late 2024…
Check Point Accelerates the Rollout of Secure AI Data Centers with NVIDIA DSX Air
Check Point is proud to integrate with NVIDIA DSX Air’s testing environment, enabling organizations to pre-validate their security aware AI data center designs before ever deploying their first piece of hardware in production to build and run their own AI. …
Augmented Phishing: Social Engineering in the Age of AI
The rise of GenAI has pushed social engineering and phishing to new levels. What once required manual effort can now be generated in seconds, resulting in hyper-personalized messages, cloned executive voices, and even realistic video impersonations. Deepfake incidents have already moved from online curiosity to real business risk,…
Global Cyber Attacks Remain Near Record Highs in February 2026 Despite Ransomware Decline
Global Attack Volumes Remain Elevated Worldwide In February 2026, global cyber attack activity remained near record levels, confirming that elevated attack volumes are becoming the new normal for organizations worldwide. The average number of weekly cyber attacks per organization reached 2,086, representing a 9.6% increase year over year, while remaining essentially…
China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions
Key Findings Since the recent escalation in the Middle East, Check Point Research has observed increased activity by Chinese-nexus APT actors in the region, particularly targeting Qatar The Chinese-nexus threat actor Camaro Dragon attempted to deploy a variant of PlugX…
Introducing CPR Act: A Unified Approach for a Full‑Lifecycle Security
Fragmented products and solutions sprawled across multiple environments create significant visibility gaps, which attackers look for to exploit. To close these gaps, Check Point Services has now introduced CPR Act, an expert‑led unit that covers the entire security lifecycle with…
Powering Cyber Resilience Across APAC: Celebrating Check Point’s APAC FY25 Partner Award Winners
Recognizing Excellence, Innovation, and Impact Across the Region Check Point Software Technologies recognized the top partners across the Asia Pacific region, during the Check Point Software Technologies Sales Kickoff APAC event in Bangkok, Thailand, attended by almost 1,000 employees and partners. These awards are handed out to outstanding partners across Asia Pacific who…
The Whitelist Illusion – When Your Trusted List Becomes a Billion Dollar Attack Path
Your whitelist is not a wall. For nation-state attackers, it’s a map, showing exactly who to compromise to get to your assets. $1,788,000,000 STOLEN FROM INSTITUTIONS WITH WHITELISTS, MULTISIGS, AND HARDWARE WALLETS IN PLACE TL;DR When you hold significant assets…
Silver Dragon: China Nexus Cyber Espionage Group Targeting Governments in Asia and Europe
Silver Dragon is a China nexus cyber espionage group targeting government ministries and public sector organizations across Southeast Asia, with additional victims identified in Europe The group gains initial access through exploitation of public-facing servers and targeted phishing campaigns aimed…
How Threat Intelligence and Multi-Source Data Drive Smarter Vulnerability Prioritization
The CVSS Blind Spot For years, CVSS scores have been the default metric for vulnerability severity. But severity does not equal risk. A CVSS 9.8 vulnerability that is never exploited is less dangerous than a CVSS 6.5 actively used in…
What Defenders Need to Know about Iran’s Cyber Capabilities
With the current Iran crisis at its peak, cyber activity is a relevant part of the threat picture alongside kinetic and political pressure. Iran’s ecosystem includes multiple clusters aligned with state entities, the Islamic Revolutionary Guard Corps (IRGC) and the Ministry of Intelligence and…
National Cyber Resilience in the AI Era
A Practical Q&A Guide for Leaders Navigating NIST, Zero Trust, and AI Governance Q1. Why does national cyber security feel more urgent than ever? Answer: Cyber security is no longer something that happens quietly in server rooms or security operations centers. It…
Check Point Researchers Expose Critical Claude Code Flaws
Critical vulnerabilities, CVE-2025-59536 and CVE-2026-21852, in Anthropic’s Claude Code enabled remote code execution and API key theft through malicious repository-level configuration files, triggered simply by cloning and opening an untrusted project Built-in mechanisms—including Hooks, MCP integrations, and environment variables—could be…
Two Types of Threat Intelligence That Make Security Work
The problem isn’t that we lack threat intelligence. It’s that we lack the right kind of intelligence, intelligence that connects what’s happening inside your environment with what attackers are planning outside it. That’s why two types of threat intelligence matter:…
Check Point Named Leader in GigaOm Radar for Cloud Network Security For 3 Years in a Row – Protects 22 Cloud Vendors
In today’s multi-cloud world, businesses deploy workloads across dozens of public and private clouds, each with their own network topology, security controls, and operational quirks. Over time this flexibility comes at a cost of increasing complexity and risk. How can…
Unzipping the Threat: How to Block Malware Hidden in Password-Protected ZIP Files
As malware evades detection by hiding inside password-protect zip files, new Threat Emulation capabilities enable inspecting and blocking malicious ZIP files without requiring their password. As cyber defenses evolve, so do attacker tactics. One of the most persistent evasion techniques…
Securing Your AI Transformation: How Check Point Is Helping Security Teams Keep Control in an AI-First World
AI is moving faster than most security teams can keep up with. As AI reshapes how work gets done, and how attacks are carried out, Check Point believes organizations need to rewire security for the AI era: not by adding…