Tag: Check Point Blog

Cursor IDE: Persistent Code Execution via MCP Trust Bypass

CVE-2025-54136 –  MCPoison Key Insights Critical RCE Flaw in Popular AI-powered IDE Check Point Research uncovered a persistent remote code execution vulnerability in Cursor, a fast-growing AI-powered coding platform trusted by developers worldwide. MCP Vulnerability Cursor allows attackers to gain…

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve become fully weaponized, commercially available, and dangerously scalable. What began as clever video edits…

Employee Spotlight: Getting to Know Sandy Venkataraman

 Sandy, can you tell us a bit about yourself? I’m someone who loves making people laugh, growing stronger every day—mentally and professionally—and leading a team I genuinely care about at Check Point. What led to your decision to join Check…

AI Shield: How Artificial Intelligence Protects Your Digital Life

Artificial intelligence, the unsung hero of modern cyber security, works tirelessly to protect our digital world. While AI’s creative capabilities are well-known, its most critical role is safeguarding data, privacy, and infrastructure from sophisticated cyber threats. As Albert Einstein wisely…