Alon, can you tell us a bit about yourself? Well, I hold a Bachelor of Science and an MBA in Business Management from the University of Ben Gurion. Currently, I’m the Head of Data Engineering in the IT department, where…
Tag: Check Point Blog
How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two)
In Part 1 we covered the basics and how a fragmented approach can have a higher MTTD and MTTR. In part two we highlight five critical ways a hybrid mesh approach uniquely disrupts the ransomware lifecycle. How a Hybrid Mesh…
Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation
In today’s evolving threat landscape, proactive security measures are more critical than ever. Penetration Testing (PT) – a core service within Infinity Global Services (IGS) – plays a vital role in uncovering vulnerabilities before they can be exploited. Delivered by…
BEYOND DEFENSE: Hong Kong’s New Era of Financial Cyber Resilience
Hong Kong, a key international financial hub, is confronting increasingly sophisticated cyber threats that demand strong cyber resilience to protect its financial stability and economic operations. The dependence on digital platforms by essential infrastructure providers increases the potential impact of…
World SMB Day: Eight Network Tech Essentials Every Small Business Needs
Small and medium-sized businesses (SMBs) are the backbone of the global economy. And to be successful, they rely on technology. In this blog we explore top technology trends affecting SMBs and how they can survive and thrive in a hyperconnected…
The AI Arms Race: When Attackers Leverage Cutting-Edge Tech
For too long, the narrative around AI in cyber security has focused on its defensive capabilities. While AI is revolutionizing how organizations protect themselves – bringing unprecedented speed, accuracy, and automation – it’s crucial to acknowledge the other side of…
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
Modern cyber attacks move faster than ever before. While your security team is analyzing one threat, attackers are already spreading across your network, exploiting the gaps between siloed security tools and manual response processes. To stop threats, your security measures…
Educated Manticore Reemerges: Iranian Spear-Phishing Campaign Targeting High-Profile Figures
Amid growing warnings from agencies like the FBI and DHS about Iranian cyber activity, Check Point Research is sharing fresh, real-world examples from the past few days to shed light on how these threats are playing out in practice. We’ve…
AI Evasion: The Next Frontier of Malware Techniques
Check Point Research identifies the first documented case of malware embedding prompt injection to evade AI detection. Check Point Research discovered the first known case of malware designed to trick AI-based security tools The malware embedded natural-language text into the…
Frost & Sullivan Report Validates Value of Consolidated Security
The endpoint security landscape is evolving faster than many security teams can keep up. While organizations are being overwhelmed with alert fatigue from multiple disconnected tools, a new Frost & Sullivan report underscores that the future of cyber security belongs…
PDFguard: AI Engine Against Growing Threats in PDFs
In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware through sophisticated social engineering tactics. Recognizing this escalating threat, Check Point introduces PDFguard, an advanced AI engine…
The illusion of control: Can we ever fully secure autonomous industrial systems?
In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven decision-making into operational technology (OT) systems has created the impression of tighter control, smarter response times and predictive efficiency. This feeling of having control might actually be…
Defeating PumaBot: How Check Point Quantum IoT Protect Nano Agent Shields Surveillance Devices
The threat at a glance Darktrace researchers have identified PumaBot, a Go-based Linux botnet that focuses on embedded surveillance cameras and other IoT devices.Unlike spray-and-pray botnets that scan the whole internet, PumaBot pulls a curated IP list from its C2…
Third-Party Access: The Cyber Risk Manufacturers Can’t Afford to Ignore
Nearly 20% of all data breaches in recent years involved a third-party vendor, and they weren’t minor. According to IBM’s Cost of a Data Breach Report, breaches tied to third-party access took an average of 26 days longer to identify…
The Hidden AI Threat to Your Software Supply Chain
AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned from intriguing gadgets to indispensable sidekicks for modern developers. A recent survey by Stack Overflow revealed that over 76% of developers now rely on these assistants, with…
Minecraft Players Targeted in Sophisticated Malware Campaign
Malicious Minecraft Mods Discovered: Check Point Research (CPR) uncovered a multistage malware campaign in which the malware itself was embedded within fake Minecraft mods, shared on GitHub to specifically target active players. Three-Stage Infection Chain: The attack involves a Java…
Without automation, external attack surface management misses the point
In cyber security, external attack surface management (ASM) is like tending a garden, helping you keep track of plants (your assets) as they grow. It enables you to monitor your assets and quickly identify risks to them—like pests attacking the…
DMV-Themed Phishing Campaign Targeting U.S. Citizens
In May 2025, a sophisticated phishing campaign emerged, impersonating several U.S. state Departments of Motor Vehicles (DMVs). This campaign leveraged widespread SMS phishing (smishing) and deceptive web infrastructure to harvest personal and financial data from unsuspecting citizens. Victims received alarming…
Introducing the Ticket Enrichment AI Agent
Staying ahead of threats in the ever-evolving landscape of cyber security requires not only robust protection but also efficient and effective operational processes. At Check Point, we are committed to enhancing your security infrastructure with cutting-edge AI solutions. Today, we…
Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users
In February 2025, our detection engines identified a SpyLoan application on a victim’s device. The detected sample belonging to the “RapiPlata” application, which was available on Google Play (GP) and downloaded by over 100K victims. We estimate that around 150K…