As businesses and service providers deploy AI tools and systems, having strong cyber security across the entire AI pipeline is a foundational requirement, from design to deployment. Even at this stage of AI adoption, attacks on AI infrastructure and prompt-based…
Category: Check Point Blog
Cyber Resilience Starts with Training: Why Skills Define Security Success
Define Security Success Organizations face an escalating threat landscape and a widening cyber security skills gap. Compliance-driven training alone cannot prepare teams for real-world challenges like incident response, SOC operations, and threat hunting. Without robust, practical training, defenses weaken, and…
Check Point Celebrates 2025 with Top Analyst and Research Lab Recognitions
As a global leader in cyber security, Check Point proudly highlights its 2025 recognition from leading analyst firms and research labs. Check Point believes these honors highlight the company’s commitment to protecting AI-driven environments and securing distributed networks that underpin…
Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection
This report describes a phishing campaign in which attackers impersonate legitimate Google generated messages by abusing Google Cloud Application Integration to distribute malicious emails that appear to originate from trusted Google infrastructure. The emails mimic routine enterprise notifications such as…
Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech
Key Insights Insider recruitment is a growing cyber threat across banks, telecoms, and tech firms. Darknet ads offer payouts from $3,000 to $15,000 for access or data. Crypto exchanges, banks, and cloud providers are prime targets. Prevention requires employee education,…
Check Point Infinity Global Services Launches First AI Security Training Courses
Artificial Intelligence is transforming every industry, unlocking new opportunities while introducing new risks. That is why Infinity Global Services (IGS) is proud to announce the launch of our first dedicated AI security training courses. This is the first release in…
Ink Dragon Expands With New Tools and a Growing Victim Network
Executive Summary Ink Dragon, a Chinese espionage group, has expanded from Asia and South America into European government networks. The group turns compromised servers into relay nodes, using victims to route commands and support operations in other environments. Updated tooling,…
From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025
Key Insights AI and automation have made holiday scams smarter and harder to detect. Over 33,500 Christmas-themed phishing emails and over 10,000 holiday season-themed social media advertisements flagged in just 14 days. Fake retail sites and social media giveaways are…
Data Is the New Intelligence: How Three Decades of Threat Data Made Check Point Early to AI for Cyber Security
Artificial intelligence’s recent rise to prominence often feels like a revolution — a sudden leap from clever algorithms to systems capable of astonishing accuracy. But beneath the buzz lies a timeless truth: AI is only as good as the data…
Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads
As enterprises expand into Oracle Cloud Infrastructure (OCI), they need security that scales as dynamically as their workloads. Check Point CloudGuard Network Security now brings full auto-scaling support to OCI extending its industry-leading cloud security automation capabilities to yet another…
Infinity Global Services’ Cyber Park World Championship Crowns Its First Global Winners
Check Point’s Infinity Global Services (IGS) recently concluded its first ever Cyber Park World Championship, a global competition designed to challenge and inspire the next generation of cyber defenders. In partnership with CheckMates, Check Point’s community of cyber security professionals,…
Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks
In November 2025, global cyber activity continued its upward trend, with organizations experiencing an average of 2,003 cyber-attacks per week. This represents a 3% increase from October, and a 4% rise compared to November 2024. Check Point Research data shows…
40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams
The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate,…
Cyber Threats to the U.S.: What Policymakers Need to Know for 2026
Cyber attacks against the United States are no longer isolated events or technical headaches. They are now powerful tools of national strategy used by foreign governments, criminal networks, and ideological groups. A new report explains how these attacks have changed…
What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF Customers Carried on with Their Day
Note: Before we dive in, Check Point CloudGuard WAF customers were proactively protected and not affected by React2Shell. In early December 2025, the team behind React—the most widely used technology powering today’s websites and digital services—announced a critical security…
The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back
When Senator Ben Ray Luján warned that the United States was facing “the largest telecommunications hack in our nation’s history,” it marked a turning point in how we understand national cyber risk. On December 4, 2024, the White House confirmed…
Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid Mesh Cloud and On-Prem Firewalls
As organizations adopt AI tools and Model Context Protocol (MCP) servers to implement AI applications, security teams face mounting pressure to protect sensitive data, applications, and distributed environments. Enterprises are looking for security solutions to help them safely adopt AI,…
Check Point Named a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security
We’re proud to announce that Gartner® has recognized Check Point as a Leader in the 2025 Magic Quadrant™ for Email Security (published December 2025). We believe that this independent evaluation from the industry’s most trusted research firm validates our commitment…
Employee Spotlight: Getting to Know Angel Salazar
Tell us your story — who you are, what drives you, and how your journey brought you to where you are today. I’m Angel Salazar, born in Guatemala, and my interest in technology began back in school when I studied…
AI Has Become the New Enterprise Perimeter — and Gemini 3 Pro Just Proved It
When Google unveiled Gemini 3 on 18 November 2025, most headlines focused on its leaps in reasoning, multimodality, and performance. But executives should look past the model-to-model comparisons. Gemini 3’s real significance is structural. Part of a Broader Trend —…