We’re excited to share that Check Point is acquiring Veriti, the first to introduce preemptive exposure management which automatically remediates threat exposures and prevents threat across complex multi-vendor estates. In the era of hyperconnectivity and AI, reactive security is too…
Category: Check Point Blog
ThreatCloud AI Gives Harmony SASE Customers an Edge Against Cyber Threats
Today’s enterprise network faces an unprecedented barrage of advanced attacks designed to evade detection. Harmony SASE provides unmatched malware protection by leveraging the power of Check Point’s ThreatCloud AI, the brain behind our threat intelligence that delivers industry-leading protection against…
Harmony Mobile Leads in Miercom 2025 MTD Security Assessment
In today’s mobile-first world, where 75% of employees access sensitive corporate data through their smartphones, securing the mobile attack surface has become a critical priority for organizations. The challenge is distinguishing marketing claims from actual security performance. This is why…
Employee Spotlight: Getting to Know Jay Dave
Jay, can you tell us a bit about yourself? I’m passionate about cyber security and I am dedicated to creating a safer digital environment by breaking down complex risks into simple, manageable solutions. I strive to empower individuals and organizations…
Exploiting the AI Boom: How Threat Actors Are Targeting Trust in Generative Platforms like Kling AI
In early 2025, Check Point Research identified a cyber attack campaign exploiting the popularity of generative AI service, Kling AI. The attack began with deceptive social media ads leading to a fake website designed to trick users into downloading malicious…
Introducing Check Point MCP Servers: Integrate Check Point Cyber Security Capabilities Directly into Your AI Tools
Security teams today need to move faster, prove compliance, and investigate issues across increasingly complex environments – all while working with limited resources. To help address these challenges, we are thrilled to introduce a suite of model context protocol (MCP)…
From Classrooms to Code Red: 3,000+ Cyber Threats Hit U.S. Schools and Universities Weekly
Classrooms and campuses have gone fully digital — and continue to innovate – while cyber criminals are exploiting every gap in that transformation. Schools, colleges, and universities are rapidly digitalizing, but with limited cyber security infrastructure and strained IT resources,…
Smart Networks, Smarter Threats: Securing Telecoms in the Age of AI and Critical Infrastructure
As we celebrate World Telecommunication and Information Society Day (WTISD) 2025, the world is navigating a powerful intersection of opportunity and risk. Telecommunications—always an important utility—has become the critical backbone of our digital economy. It supports everything from emergency response…
Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers
In a recent discovery, Check Point researchers have identified a large-scale phishing campaign that exploits the guise of email quarantine notifications. This campaign, consisting of 32,000 emails, has targeted 6,358 customers across various regions. The primary objective of the attackers…
Become a Cyber Security Industry Expert with Check Point’s New Course Catalog
Cyber threats surged by 30% in Q2 2024, highlighting the urgent need for skilled professionals – but there’s a significant shortage in cyber security expertise worldwide. Infinity Global Services (IGS) bridges this gap with the first-edition Course Catalog, offering a…
With the Right Tools, You Can Prevent This Healthcare Scam from Hurting Employees
In 2024, ninety-two percent of healthcare organizations contended with at least one cyber attack. As a result, over 276 million patient records were compromised, translating to the compromise of roughly 758,000 records every single day. Victims of medical identity theft…
AI, Agents, and the Future of Cyber Security
In just a few short years, the breakneck speed of advancements in AI have transformed nearly every industry, including cyber security. The pace of acceleration has forced IT and business leaders to rethink approaches to some of the most sensitive…
Ransomware Reloaded: Why 2025 Is the Most Dangerous Year Yet
May 12 marks Anti-Ransomware Day, a global awareness initiative created by INTERPOL and Kaspersky to commemorate the 2017 WannaCry outbreak. That infamous ransomware campaign crippled hundreds of thousands of systems worldwide, from UK hospitals to global logistics networks, and its…
April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with Stealth
Cyber criminals are raising the stakes. This month, researchers uncovered a sophisticated, multi-stage malware campaign delivering some of the most prevalent commodity malware—AgentTesla, Remcos, and XLoader—via stealthy techniques designed to evade detection. Meanwhile, FakeUpdates retains its top spot in the…
Check Point Wins “Best Threat Prevention Vendor of the Year” at GISEC 2025
We’re thrilled to announce that Check Point Software Technologies has been named Best Threat Prevention Vendor of the Year by Cyber Strategists at GISEC 2025! This award recognizes organizations that lead the way in proactive cyber defense—identifying, stopping, and staying…
Employee Spotlight: Getting to Know Tom De Laet
Tom, can you tell us a bit about yourself? Currently I have the privilege of leading the Incident Response Team for EMEA at Check Point, based in Belgium, where I live with my wife and two daughters. My journey into…
Check Point Named Cloud Security Innovator of the Year by ITP.NET at GISEC 2025
We’re proud to share that Check Point Software Technologies has been named Cloud Security Innovator of the Year by ITP.NET at GISEC 2025! Presented as part of the Security Leadership Awards, this honor celebrates organizations that are pushing boundaries in…
DragonForce Ransomware: Redefining Hybrid Extortion in 2025
The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing more dangerous. In this volatile landscape, DragonForce is emerging as one of the most intriguing and threatening actors of 2025. Born from possible hacktivist roots and now fully immersed in…
Microsoft Dynamics 365 Customer Voice Phishing Scam
Overview: Check Point researchers have identified a new phishing campaign that exploits Microsoft’s “Dynamics 365 Customer Voice,” a customer relationship management software product. It’s often used to record customer calls, monitor customer reviews, share surveys and track feedback. Microsoft 365…
Secure Coding in DevOps: Shifting Left for Stronger Security
In today’s rapidly evolving DevOps environment, the drive for speed often inadvertently amplifies security risks, leaving applications exposed to costly breaches. With global breach costs averaging $4.8 million last year, according to IBM’s annual Cost of a Data Breach Report…