Shila, can you tell us a bit about yourself? I’m an HR Partner for EMEA. I’m 33-years-old, a proud mom to Naomi and married to Yonatan, and we live in a small kibbutz in the north of Israel. I hold a…
Category: Check Point Blog
AI Security Report 2025: Understanding threats and building smarter defenses
As artificial intelligence becomes more deeply embedded in business operations, it’s also reshaping how cyber threats evolve. The same technologies helping organizations improve efficiency and automate decision-making are now being co-opted and weaponized by threat actors. The inaugural edition of…
Elevating MSSP Managed Security Services with Managed Detection and Response (MDR)
In today’s rapidly evolving cyber security landscape, managed security service providers (MSSPs) must continuously innovate to meet the growing demands of their clients. As an MSSP, one powerful way to enhance your service portfolio and deliver exceptional value is by…
Check Point CloudGuard WAF Wins American Business Award for Cyber Security
We’re proud to announce that Check Point CloudGuard has been named a Silver Stevie Award winner in the Best Cloud Security Solution category at the 2025 American Business Awards! This prestigious recognition reflects CloudGuard’s impact in enabling secure, scalable, and…
Rising Mobile Threats: Closing the Security Gap in Your Organization’s Device Strategy
As advanced mobile threats become more prevalent, it’s crucial for organizations to understand that mobile devices have become significant targets for cyber criminals. With the growing reliance on mobile communication and remote work by both businesses and government agencies, attackers…
Employee Spotlight: Getting to Know Anthony Gallo
Anthony, can you tell us a bit about yourself? I am originally from New Jersey, but currently live in South Carolina. I am an attorney on the Check Point team covering the Americas, working closely with many different business units…
Check Point and Illumio Partner to Accelerate Zero Trust with Proactive Threat Prevention and Microsegmentation
Dynamic hybrid data center cloud environments are growing, leading to a larger attack surface. The mix of on-premises and multiple cloud platforms creates complex interconnections that are hard to monitor. Traditional network segmentation is insufficient as workloads move fluidly between…
Securing the Hybrid Workforce in the Age of AI: 5 Priorities for 2025
Generative AI is transforming the modern workplace. It offers new opportunities but also unprecedented risks, such as industrial-scale exploit production and data leaks through employee use of GenAI tools. In 2025, defending a hybrid workforce means adapting fast, securing smarter,…
Cyber Criminals Exploit Pope Francis Death to Launch Global Scams
Following Pope Francis’ death, as is common with global events of this nature, cyber criminals have launched a variety of malicious campaigns. This tactic isn’t new—cyber attackers have long exploited major world events, from the passing of Queen Elizabeth II…
Introducing ATAM 360°: Your Comprehensive Cyber Security Package
At Check Point, comprehensive cyber security with unmatched support is a top priority. We’re excited to introduce ATAM 360°, Check Point’s newly enhanced Advanced Technical Account Management (ATAM), a subscription-based service customized to your organization’s needs, with a designated engineer…
The Green IT Approach To Cyber Security And What Efficient Implementation Can Achieve
In today’s digital landscape, organizations face the dual challenge of maintaining robust cyber security measures while also reducing their environmental impact to manage risks and realize opportunities. In recognition of Earth Day 2025, we’d like to discuss why the convergence…
The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases
Key Findings The number of publicly-mentioned and extorted victims in Q1 reached the highest ever number, with a 126% increase year-over-year. Cl0p returned to prominence as the most prolific ransomware actor in Q1 2025, exploiting new zero-day vulnerabilities in Cleo-managed…
Check Point Named a Leader and the Outperformer in the GigaOm Radar for Enterprise Firewalls 2025
As cyber threats grow faster and more widespread, enterprises of all sizes need flexible, scalable, and easy-to-manage security solutions backed by a strong network. Today’s rapidly evolving threat landscape demands enterprise firewalls that can adapt to complex environments while providing…
Microsoft Dominates as Top Target for Imitation, Mastercard Makes a Comeback
Phishing attacks are one of the primary intrusion points for cyber criminals. As we examine the phishing threat landscape through the first quarter of 2025, cyber criminals continue to leverage trusted names to deceive unsuspecting users. Here’s a closer look…
Employee Spotlight: Getting to Know Henrique Sauer
Henrique, can you tell us a bit about yourself? I’m a Security Engineer based in Brazil, passionate about solving complex cyber security challenges and helping organizations stay ahead of evolving threats. My journey in cyber security started early, and since…
The Hidden Downside of a Cloud-only SASE Architecture
As enterprises accelerate their shift toward secure access service edge (SASE), many are tempted to implement cloud-only security service edge (SSE) solutions. And while SSE provides modular security services like SWG, CASB, and ZTNA, it also introduces hidden costs, scalability…
Q1 2025 Global Cyber Attack Report from Check Point Software: An Almost 50% Surge in Cyber Threats Worldwide, with a Rise of 126% in Ransomware Attacks
Cyber Attack Surge: In Q1 2025, cyber attacks per organization increased by 47%, reaching an average of 1,925 weekly attacks. Sectors Most Affected: Education saw the highest number of attacks, with 4,484 weekly, followed by government and telecommunications with 2,678…
Check Point and Fuse to Deliver First Real-Time Blockchain Firewall
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn’t kept pace. In 2024 alone, crypto platforms lost over $2.2 billion to cyber attacks, with sophisticated exploits…
Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy
Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced Persistent Threat (APT) 29, a Russian-linked threat group. The operation targeted diplomatic organizations throughout Europe. The campaign appears to continue a previous operation called Wineloader,…
Infinity Global Services’ Cyber Park Launches “Beacon in the Dark” – A New Cyber Security Escape Room Adventure
Step into the shadows and sharpen your digital instincts—Beacon in the Dark, the latest escape room experience in Check Point’s IGS Cyber Park, is now live. First launched at CPX and now available for free on Cyber Park, the game…