Category: Check Point Blog

Harmony Mobile Leads in Miercom 2025 MTD Security Assessment

In today’s mobile-first world, where 75% of employees access sensitive corporate data through their smartphones, securing the mobile attack surface has become a critical priority for organizations. The challenge is distinguishing marketing claims from actual security performance. This is why…

Employee Spotlight: Getting to Know Jay Dave

Jay, can you tell us a bit about yourself? I’m passionate about cyber security and I am dedicated to creating a safer digital environment by breaking down complex risks into simple, manageable solutions. I strive to empower individuals and organizations…

AI, Agents, and the Future of Cyber Security

In just a few short years, the breakneck speed of advancements in AI have transformed nearly every industry, including cyber security. The pace of acceleration has forced IT and business leaders to rethink approaches to some of the most sensitive…

Ransomware Reloaded: Why 2025 Is the Most Dangerous Year Yet

May 12 marks Anti-Ransomware Day, a global awareness initiative created by INTERPOL and Kaspersky to commemorate the 2017 WannaCry outbreak. That infamous ransomware campaign crippled hundreds of thousands of systems worldwide, from UK hospitals to global logistics networks, and its…

Employee Spotlight: Getting to Know Tom De Laet

 Tom, can you tell us a bit about yourself? Currently I have the privilege of leading the Incident Response Team for EMEA at Check Point, based in Belgium, where I live with my wife and two daughters. My journey into…

DragonForce Ransomware: Redefining Hybrid Extortion in 2025

The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing more dangerous. In this volatile landscape, DragonForce is emerging as one of the most intriguing and threatening actors of 2025. Born from possible hacktivist roots and now fully immersed in…

Microsoft Dynamics 365 Customer Voice Phishing Scam

Overview: Check Point researchers have identified a new phishing campaign that exploits Microsoft’s “Dynamics 365 Customer Voice,” a customer relationship management software product. It’s often used to record customer calls, monitor customer reviews, share surveys and track feedback. Microsoft 365…

Secure Coding in DevOps: Shifting Left for Stronger Security

In today’s rapidly evolving DevOps environment, the drive for speed often inadvertently amplifies security risks, leaving applications exposed to costly breaches. With global breach costs averaging $4.8 million last year, according to IBM’s annual Cost of a Data Breach Report…