In May 2025, a sophisticated phishing campaign emerged, impersonating several U.S. state Departments of Motor Vehicles (DMVs). This campaign leveraged widespread SMS phishing (smishing) and deceptive web infrastructure to harvest personal and financial data from unsuspecting citizens. Victims received alarming…
Category: Check Point Blog
Introducing the Ticket Enrichment AI Agent
Staying ahead of threats in the ever-evolving landscape of cyber security requires not only robust protection but also efficient and effective operational processes. At Check Point, we are committed to enhancing your security infrastructure with cutting-edge AI solutions. Today, we…
Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users
In February 2025, our detection engines identified a SpyLoan application on a victim’s device. The detected sample belonging to the “RapiPlata” application, which was available on Google Play (GP) and downloaded by over 100K victims. We estimate that around 150K…
Discover Check Point’s AI-powered, cloud-delivered security solutions at AWS re:Inforce 2025
Check Point continues to grow our offerings and capabilities for the Amazon Web Services (AWS) cloud. Over the last year, we’ve expanded our capabilities with AWS Gateway Load Balancers and AWS Cloud WAN, and we’ve launched CloudGuard WAF-as-a-Service on AWS…
Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks
Attackers took advantage of a Discord feature that lets expired or deleted invite links be reused, allowing them to hijack trusted community links and redirect users to harmful servers. The attack tricks users with a fake verification bot and phishing…
Check Point Research Warns of Holiday-Themed Phishing Surge as Summer Travel Season Begins
Over 39,000 new vacation-related domains registered in May 2025, with 1 in 21 flagged as malicious or suspicious—cyber criminals target travel enthusiasts and property owners through phishing scams mimicking popular platforms like Airbnb and Booking.com. As summer travel season kicks…
Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs
Managed service providers (MSPs) are facing a pivotal moment. As businesses of all sizes continue to adopt cloud platforms, hybrid work models, and mobile-first strategies, MSPs are being tasked with delivering stronger, faster, and more comprehensive cyber security services, many…
Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day
Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day Check Point Research (CPR) identified a previously unknown Windows vulnerability (CVE-2025-33053) being actively exploited in the wild. Following CPR’s responsible disclosure, Microsoft released a patch on its June 10th Patch Tuesday…
Cyber Risks Take Flight, Navigating the Evolving Threat Landscape in the Travel Industry
The global travel industry is flying high once again, but alongside its recovery comes a surge in digital turbulence. As travel demand surges and operations digitize at an unprecedented rate, cyber criminals are seizing new opportunities to exploit vulnerabilities in…
May 2025 Malware Spotlight: SafePay Surges to the Forefront of Cyber Threats
Cyber criminals are becoming more brazen, and this month, research highlights the rise of SafePay, a relatively new but increasingly active ransomware group that has quickly established itself as a key player in the cyber crime ecosystem. Meanwhile, FakeUpdates remains…
No Excuses: Why Multi-Factor Authentication is Non-Negotiable
Breaches are not a matter of if but when, which is why relying solely on passwords is a dangerous oversight. As the Product Security Manager for Harmony SASE, I’ve seen the destruction firsthand, and I’m here to tell you that…
6 Key Insights from Check Point’s Cloud Security Report 2025
Cloud environments are evolving faster than many security teams can adapt. As hybrid, multi-cloud, edge, and SaaS adoption accelerates, organizations face fragmented systems, inconsistent controls, and widening attack surfaces. Threat detection is often delayed, tools are overwhelmed, and many defenses…
Understanding Gartner Market Guide for Cloud Web Application and API Protection: How CloudGuard WAF Sets a New Standard in Web & API Protection
How the market is evolving and why now, more than ever, you need an AI powered WAF What defines a next-generation web application and API protection (WAAP) platform? How can security teams keep pace with today’s fast-moving, API-driven threat landscape…
Lumma Infostealer – Down but Not Out?
Key Findings: The takedown achieved a significant disruption to Lumma infostealers’ infrastructure, but likely didn’t permanently affect most of its Russia-hosted infrastructure. Lumma’s developers are undertaking significant efforts to reinstate the activity and to conduct business as usual. There seems…
Accelerate your Operations with AI Powered Security Management and Quantum Smart-1 Management 700/7000 Series Appliances
Check Point introduces powerful all-in-one Quantum Smart-1 700/7000 Security Management appliances to manage security policies for both on-premises and cloud firewalls, delivering consolidated visibility, logging, compliance, and auditing across enterprise networks. These new 7th generation Quantum Smart-1 Security Management appliances…
Quantum Force Firewalls Bring Lightning-Fast Cyber Security to the Branch Office
Our hyperconnected world demands more from cyber security than ever before. Security leaders must prevent intrusions at the network level, but also protect a distributed, cloud-enabled workforce in hybrid roles and in branch offices with the same enterprise-grade security that…
Employee Spotlight: Getting to Rolando Panez
Rolando, can you tell us a bit about yourself? I’m a proud father of three beautiful girls. I was born and raised in Florida. I received a master’s degree in electrical engineering at the University of Florida. I worked on…
Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments
We’re excited to share that Check Point is acquiring Veriti, the first to introduce preemptive exposure management which automatically remediates threat exposures and prevents threat across complex multi-vendor estates. In the era of hyperconnectivity and AI, reactive security is too…
ThreatCloud AI Gives Harmony SASE Customers an Edge Against Cyber Threats
Today’s enterprise network faces an unprecedented barrage of advanced attacks designed to evade detection. Harmony SASE provides unmatched malware protection by leveraging the power of Check Point’s ThreatCloud AI, the brain behind our threat intelligence that delivers industry-leading protection against…
Harmony Mobile Leads in Miercom 2025 MTD Security Assessment
In today’s mobile-first world, where 75% of employees access sensitive corporate data through their smartphones, securing the mobile attack surface has become a critical priority for organizations. The challenge is distinguishing marketing claims from actual security performance. This is why…