As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition. Enterprises around the world are rapidly adopting AI, and it is providing significant productivity and efficiency gains. While AI provides amazing productivity…
Tag: Check Point Blog
Inside the Rise of AI-Powered Pharmaceutical Scams
Introduction Over the past few months, we identified an emerging online threat that combines fraud, social engineering, and genuine health risks. Scammers are now impersonating licensed physicians and medical clinics to promote counterfeit or unsafe medications, frequently leveraging AI and…
Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered
Trust alone isn’t a security strategy. That’s the key lesson from new research by Check Point Research, which uncovered multiple vulnerabilities in Microsoft Teams that could allow attackers to impersonate executives, manipulate messages, and spoof notifications. With more than 320…
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
Key Highlights XLoader 8.0 malware is one of the most evasive and persistent information stealers in the wild, using multi-layer encryption, fake domains, and constant updates to avoid detection. Check Point Research used AI-assisted malware analysis to understand it faster…
Hezi Rash: Rising Kurdish Hacktivist Group Targets Global Sites
A new ideologically-motivated threat actor has emerged and growing technical capabilities: Hezi Rash. This Kurdish nationalist hacktivist group, founded in 2023, has rapidly escalated its presence through a series of distributed denial-of-service (DDoS) attacks targeting countries perceived as hostile to…
How to Reduce Your TCO with Check Point’s SASE
Network security solutions can be complex and expensive to operate, especially when based on hardware appliances. Additionally, they can degrade performance, which can impact productivity. Adopting the right solution can help simplify the network, reduce costs, improve productivity and time…
How to reduce your TCO with Check Point’s SASE
Network security solutions can be complex and expensive to operate, especially when based on hardware appliances. Additionally, they can degrade performance, which can impact productivity. Adopting the right solution can help simplify the network, reduce costs, improve productivity and time…
Check Point AI Cloud Protect, Powered by NVIDIA BlueField, Now Available for Enterprise Deployment
The race to build AI is accelerating. Enterprises are investing billions in AI factories that power the creation and development of AI capabilities. While AI provides amazing productivity benefits, AI systems face unprecedented security challenges. More than half of enterprise…
AI 2030: The Coming Era of Autonomous Cyber Crime
Organizations around the world are rapidly adopting AI, including across the enterprise, where it is already providing significant efficiency gains. As a result, cyber security is entering a turning point where AI fights AI. The phishing scams and deepfakes of…
LockBit Returns — and It Already Has Victims
Key Takeaways LockBit is back. After being disrupted in early 2024, the ransomware group has resurfaced and is already extorting new victims. New version, new victims. Check Point Research identified a dozen organizations hit in September 2025, half by the…
The YouTube Ghost Network: How Check Point Research Helped Take Down 3,000 Malicious Videos Spreading Malware
Check Point Research uncovered the YouTube Ghost Network, a large-scale malware distribution operation that used fake and compromised YouTube accounts to distribute infostealers such as Rhadamanthys and Lumma. More than 3,000 malicious videos were identified and removed after being reported…
ChatGPT Atlas: The First Step Toward AI Operating Systems
The Big Picture OpenAI’s ChatGPT Atlas browser is the prototype for how we’ll use computers in the future. Within a few years, operating systems will be powered by AI as users interact through prompts instead of clicking applications. You’ll describe…
The Rise of AI-Powered Threats and Other Mobile Risks Highlight Why It’s Time to Rethink Your Security Architecture
The recently released 2025 Verizon Mobile Security Index documents trends that CISOs and IT leaders have been seeing come together this year – and it’s clear that the vulnerability of mobile devices, the advancements of AI-powered threats, and persistent human…
AI-Powered Phishing Detection: The Next Generation Security Engine
Check Point is thrilled to introduce a continuously-trained AI-engine designed to analyze key information about websites, achieving remarkable results in detecting phishing attempts. Integrated with our ThreatCloud AI, it offers comprehensive protection across Quantum gateways, Harmony Email, Endpoint, and Harmony…
Generative AI and Agentic Systems: The New Frontline in Phishing and Smishing Defense
There’s a quiet revolution happening in cyber security. It isn’t unfolding in dark forums or exotic zero day markets. It’s happening in plain sight—inside large language models, voice cloning tools, and autonomous software agents. Generative AI and agentic systems are…
Microsoft Dominates Phishing Impersonations in Q3 2025
Cyber criminals are sticking with familiar names, and Microsoft remains their favorite disguise. According to Check Point Research’s Brand Phishing Report for Q3 2025, Microsoft accounted for 40% of all brand impersonation attempts this quarter, holding its place as the…
Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware Surges 46%
In September 2025, the global cyber threat landscape reflected a temporary stabilization in overall attack volumes — yet beneath the surface, ransomware activity and data risks linked to generative AI (GenAI) surged to new highs. Organizations worldwide faced an average…
Check Point Partners with HackShield to Empower the Next Generation of Cyber Heroes
We couldn’t be more excited to announce our new partnership with HackShield, the award-winning cyber education platform for children. This collaboration will bring essential cyber awareness education to kids aged 8 to 12 through HackShield’s gamified learning experience. Our goal:…
Zero Trust Access Made Simple for Contractors
Third-party contractors are critical for many organizations. They bring specialized skills, help scale projects quickly, and support both short-term initiatives and long-term business needs. Yet contractors also introduce unique security and operational challenges. Whether it’s a quick project or a…
Rhadamanthys 0.9.2: A Stealer That Keeps Evolving
Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple…