Cyber Attack Surge: In Q1 2025, cyber attacks per organization increased by 47%, reaching an average of 1,925 weekly attacks. Sectors Most Affected: Education saw the highest number of attacks, with 4,484 weekly, followed by government and telecommunications with 2,678…
Tag: Check Point Blog
Check Point and Fuse to Deliver First Real-Time Blockchain Firewall
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn’t kept pace. In 2024 alone, crypto platforms lost over $2.2 billion to cyber attacks, with sophisticated exploits…
Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy
Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced Persistent Threat (APT) 29, a Russian-linked threat group. The operation targeted diplomatic organizations throughout Europe. The campaign appears to continue a previous operation called Wineloader,…
Infinity Global Services’ Cyber Park Launches “Beacon in the Dark” – A New Cyber Security Escape Room Adventure
Step into the shadows and sharpen your digital instincts—Beacon in the Dark, the latest escape room experience in Check Point’s IGS Cyber Park, is now live. First launched at CPX and now available for free on Cyber Park, the game…
Collateral Damage: The Hidden Cost of Cyber Risks
Unanticipated cyber threats can rapidly exhaust cyber security budgets and derail carefully planned strategies. Among these challenges, distributed denial of service (DDoS) attacks stand out as a prime example of how unexpected risks can disrupt even the most secure systems.…
Smart Buses, Smarter Threats | Securing the Future of Connected Transit
As public transportation evolves, bus systems face new risks. Many systems still rely on older technology (outdated OT devices – such as standalone diagnostic tools), which wasn’t built to handle today’s complex cyber attacks. While modern buses use technologies like…
Harmony SaaS Delivers Next-Level SaaS Security for Google Cloud Customers
Your organization relies on a growing portfolio of SaaS applications to drive productivity. But this shift has brought with it a shadow of complexity and risk. Shadow IT, misconfigured apps, and third-party integrations now form a fragmented, often-invisible attack surface—one…
Securing a Hyperconnected World: The Case for Check Point’s Hybrid Mesh Security Architecture
Introduction: AI is reshaping cybersecurity—accelerating both innovation and attack sophistication. As enterprises expand across cloud, remote, and on-prem environments, cybercriminals are leveraging generative AI to launch faster, more convincing, and more damaging campaigns. Traditional firewalls and siloed solutions cannot keep…
March 2025: Malware Spotlight – FakeUpdates and RansomHub Ransomware Group Dominate Cyber Threats
Our latest Global Threat Index for March 2025 shows the continued dominance of FakeUpdates, a downloader malware that remains the most prevalent cyber threat worldwide. This sustained threat comes as RansomHub ransomware campaigns gain traction, marking a growing concern in…
Check Point Cloud Firewalls Achieve Industry Best 100% Block Rate and Accuracy: CyberRatings.Org Test Results Confirm
Organizations demand uncompromising protection against today’s sophisticated threats while ensuring minimal disruption to legitimate business operations. Check Point CloudGuard Network Security has just set a new industry benchmark—achieving a 100% exploit block rate including evasions in independent testing conducted by…
6 Reasons to Visit Check Point at RSAC 2025
The RSA Conference is where the cyber security world comes together, and this year, Check Point’s presence will be greatly felt. From breakthrough AI defenses to exclusive executive gatherings, we’re bringing innovation, insight, and hands-on experiences to the show floor.…
World Health Day 2025: When Cyber Security Fails, So Does Public Health
On World Health Day 2025, we are reminded that health is not only about biology and behavior—it’s about infrastructure, access, and now, cyber security. As this important critical sector grows increasingly digital, it also becomes increasingly vulnerable. Patient lives, sensitive…
Why AI-Powered Cyber Security is Essential in a Hyperconnected World
In today’s digital landscape, the boundaries of the corporate network have expanded far beyond the traditional data center. The rapid adoption of cloud, remote work, IoT, and mobile devices has reshaped how organizations operate—and how they must defend themselves against…
Tax Season Scams: How to Protect Yourself from Cyber Security Threats
Tax season is a critical time of year, not only for tax authorities but also for cyber criminals who seize the opportunity to launch targeted attacks. Individuals filing their taxes or dealing with tax-related matters become easy targets for attackers…
Celebrate World Cloud Security Day with our new Zero Trust and Hybrid Cloud Security eBook
Today, we recognize the value of cloud security. As more and more of our daily lives, business processes, and critical infrastructure are mediated by the cloud, ensuring ironclad cloud security takes on critical importance. From email and data storage to…
The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat. Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide…
The Weaponization of PDFs : 68% of Cyberattacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat. Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide…
Employee Spotlight: Getting to Know Vanessa Johnson
Vanessa, can you tell us a bit about yourself? I’m a proud Texas native with a passion for learning and helping others grow. I have a Bachelor’s degree in Marketing and a Master’s in Management and Administrative Sciences, which led…
What’s Next For Attack Surface Management? Perspectives From The Market Leader
We are delighted to announce that Cyberint, a Check Point company, was recently named a Leader and an Outperformer in the GigaOm Attack Surface Management Radar report. To read the full analysis, download the report here. In light of this…
Advanced Network Security with Check Point CloudGuard and Nutanix Cloud Platform
As businesses continue to migrate to the cloud, delivering the highest level of network security becomes increasingly challenging due to infrastructure and workload complexity. Check Point CloudGuard Network Security offers a comprehensive solution with Nutanix Cloud Platform to support advanced…
You Can Stockpile Food—But You Can’t Stockpile Trust
Why the EU’s Crisis Preparedness Needs a Digital Backbone The European Union recently urged its citizens to stock up on essentials—water, food, torches, medicine—for at least 72 hours in case of a major disruption. The recommendation, outlined in a report…
Backup Data Resiliency: Backups Alone Aren’t Enough
Every year, March 31st marks another World Backup Day—a timely reminder to check if our data protection strategies are truly ready for today’s volatile cyber landscape. It is an illusion to think that cyber attacks on any industry can be…
NIS2: What do we know so far about the EU’s expanded cyber security regulation?
When it comes to security, potent emerging threats on the horizon are causing regulators to be more proactive than ever. For organizations, this means constant reorientation to new compliance frameworks, obligations, and risks. At the forefront of this regulatory churn…
Transforming Security Management with AI Agents and Assistants
Attackers are already using AI, but you can return fire by deploying your own AI-powered cyber security tools. Turning to general use LLMs like ChatGPT or DeepSeek is not an option for security management as they are not specialized for…
Leveraging AI in Financial Services with Resilience and Security
The financial services sector is at a critical juncture as it faces increasing pressure to adopt cutting-edge technologies like AI to stay competitive and relevant. Financial services and financial technology companies are rapidly embracing AI advancements, particularly large language models…
Protecting the Unchangeable – 23andMe Bankruptcy and What It Means for Data Privacy
The recent bankruptcy filing by 23andMe isn’t just another financial crisis – it’s a stark warning for the cyber security community. When a company entrusted with immutable, sensitive genetic data collapses, it forces us to reexamine how we protect data…
The Rise of VanHelsing RaaS: A New Player in the Ransomware Landscape
VanHelsing RaaS is a burgeoning ransomware-as-a-service (RaaS) platform that launched on March 7, 2025. Participants, from seasoned hackers to beginners, can join with a $5,000 deposit. Affiliates retain 80% of ransom payments, while core operators take 20%. The only stipulation…
Getting to Know Julio Lemus
Julio, can you tell us a bit about yourself? My name is Julio Lemus and I’m from Guatemala, but am currently living in Panamá. I’m part of the Check Point team for LATAM, covering the territory of Panamá, Venezuela, and…
Keeping Your Head Above Water: Cyber Security and Water
Water is the essence of life, but in today’s digital world, it’s also an increasingly attractive target for cyber criminals. Water treatment plants and distribution systems rely on digital controls, which, if compromised, can lead to disastrous consequences, including contamination,…
Zero Trust in the Era of Generative AI: Securing Information with Innovative Approaches
Introduction: Increasing Demand for AI-Enhanced Cybersecurity Enterprise security programs are evolving rapidly by embracing the new-generation AI technologies, including generative AI (GenAI) which offer numerous benefits, but also present new risks and threats. This two-sided sword has become a major…
Securing NVIDIA AI Cloud Data Centers with the Next Wave in Real-Time Runtime Security
The explosive growth of AI is transforming enterprises and cloud providers alike, creating unprecedented demand for secure, high-performance AI infrastructure. At NVIDIA GTC 2025, Check Point will share how it is integrating the NVIDIA Cybersecurity AI platform to secure the…
Check Point Accelerates Site-to-Site VPN for Azure Virtual WAN
As organizations seek to accelerate their cloud operations, ensuring secure and fast network performance to Azure Virtual WAN has become critically important. Check Point CloudGuard Network Security has now made available enhanced site-to-site VPN that simplifies Azure Virtual WAN network…
Is Firebase Phishing a Threat to Your Organization?
Check Point researchers have uncovered a sophisticated credential harvesting attack that leverages Firebase, a popular web application hosting service. This attack involves the creation of highly convincing and professionally designed phishing web pages that impersonate well-known services. The attackers also…
How Manufacturers Can Turn Security Into a Competitive Advantage
Digitization has significantly changed manufacturing over the past 25 years. The benefits include reducing inventory costs and machine downtime, and boosting throughput and forecasting accuracy. But as digitization has grown in prevalence, so have the security challenges facing manufacturers. This…
Check Point Named Gold Winner for Cloud Security in 2025 Globee Cybersecurity Awards
Check Point is honored to be featured as a Gold Winner for Cloud Security in the 2025 Globee Cybersecurity Awards. Check Point’s CloudGuard platform distinguished itself for its preventive approach to cloud security, focusing on stopping cyber attacks before they…
Beyond the Cloud | How Edge Computing is Unlocking IoT’s Full Potential
The Internet of Things (IoT) is transforming industries like healthcare, manufacturing, smart cities, and even autonomous vehicles—making our daily lives hyperconnected. But as more devices come online, relying solely on cloud computing can lead to slow response times, high bandwidth…
A Milestone in Hands-On Cyber Security Training: SecureAcademy’s First Global Cyber Range Challenge
SecureAcademy recently hosted its first-ever Global Cyber Range Challenge, a virtual event designed to provide cyber security students and enthusiasts with real-world, hands-on experience. With participants from 11 countries and 12 academic institutions, the event showcased the power of immersive…
The Role of WAF in Fintech & Financial Services
The financial sector serves as the backbone of the global economy, making it one of the most targeted industries for cyber attacks. As online banking, mobile transactions, and fintech innovations expand, cyber threats continue to evolve. Cyber criminals continuously exploit…
Dark Storm Team Claims Responsibility for Cyber Attack on X Platform – What It Means for the Future of Digital Security
In a stark reminder of the growing threat posed by hacktivist groups, the pro-Palestinian Dark Storm Team has taken credit for a major distributed denial-of-service (DDoS) attack on X (formerly Twitter). This attack underscores the vulnerability of even the most…
February 2025’s Malware Spotlight: AsyncRAT Emerges, Targeting Trusted Platforms
Check Point’s latest threat index highlights a new campaign involving the malware, AsyncRAT, a remote access trojan targeting Windows systems since 2019. The fourth most prevalent malware of the month, AsyncRAT, enables data theft, command execution, and system compromise. The…
The Growing Danger of Blind Eagle: One of Latin America’s Most Dangerous Cyber Criminal Groups Targets Colombia
Executive Summary Check Point Research (CPR) has uncovered a series of ongoing, targeted cyber campaigns by Blind Eagle (APT-C-36)—one of Latin America’s most dangerous threat actors Days after Microsoft released a fix for CVE-2024-43451, the group began employing a comparable…
Check Point Real-Time Threat Prevention Solves Web3 and Blockchain Security Concerns
The world of Web3 and blockchain technology holds immense potential for revolutionizing industries, from finance to supply chain management. However, despite many business leaders realizing the potential, one critical barrier stands in the way of widespread blockchain adoption: many businesses…
Why a Value-Driven Approach Makes Women Strong Leaders
In business, the path to value creation requires more than strategic planning and execution—it demands an ability to connect the dots, anticipate needs, and understand the human elements that drive progress. Women often demonstrate these capabilities through their natural inclination…
Check Point Software Partners with Variscite: Embedding Security at the Core, Securing IoT Devices from Day One
The growing demand for securing IoT devices presents a significant challenge for developers and manufacturers. Many struggle to implement security measures that fall outside their core expertise, often addressing security concerns only in the later stages of development. As a…
Five Reasons Retail Chains Can’t Ignore SASE
Retailers have always relied on technology to improve operations and enhance many aspects of the shopping experience – and that’s truer than ever today. From AI-powered predictive analytics to automated customer service, retailers are increasingly using digital innovations to stay…
Five Reasons to Choose Secure SD-WAN from Check Point
In today’s fast-paced digital landscape, businesses are increasingly in need of reliable, secure, and high-performance connectivity. Check Point’s secure SD-WAN solutions offer a comprehensive approach by combining top-notch security with optimized internet and network connectivity, ensuring safe and uninterrupted operations.…
Migrating from Hub and Spoke Network to Azure Virtual WAN
Azure Virtual WAN is a robust network service that combines networking, security, and routing functionalities into a single operational interface. This innovative approach simplifies the complexity of managing multiple connectivity types such as VNet, VPN, remote user, and ExpressRoute connectivity.…
Bridging the Cyber Security Talent Gap with AI and Experts
The cyber security skills shortage has been a growing concern for more than a decade. And as the threat landscape continues to grow in complexity, too many organizations have been left vulnerable to the threat of breach. Recognizing the need…
Auto-Deploying Check Point Firewalls with AWS Gateway Load Balancers
The dynamic nature of cloud infrastructure can present unique challenges in managing network security. Fortunately, Check Point and AWS have a solution. Check Point integration with AWS Gateway Load Balancers (GWLBs) offers organizations the ability to enhance network security while…
Check Point Expands Partner and Customer Advocacy Management Services, Strengthening Cyber Security Collaboration and Operational Resilience
At CPX 2025 Vegas, Check Point has unveiled the expansion of its Partner and Customer Advocacy Management Services, providing direct access to advocacy experts. These services enhance stability, streamline engagement, and facilitate proactive collaboration between Check Point, its partners, and…
Securing Latin America in 2025: How AI and Cyber Threat Intelligence Are Reshaping the Cyber Security Landscape
Under the dazzling lights of Las Vegas, Check Point unveiled its forward-thinking strategy for safeguarding our interconnected world at CPX 2025, its flagship annual cyber security conference. The event drew thousands of participants from the United States, Canada, and Latin…
How hunting for vulnerable drivers unraveled a widespread attack
Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest permissions, to bypass security measures and facilitate further infections. To prevent the abuse of vulnerable drivers, Microsoft’s 2015 policy required new drivers to be signed…
What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection
Executive Summary: In one of the largest thefts in digital asset history, hackers gained access to an offline Ethereum wallet and stole $1.5 billion worth of digital assets, primarily consisting of Ethereum tokens. The recent incident with Bybit marks a…
Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware.…
Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware.…
Cyber Criminals Using URL Tricks to Deceive Users
Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically,…
The Future of Sustainability | Bacteria, Meet the Internet of Things
In an era of pressing ecological crises, innovative technologies are emerging to address challenges that traditional methods have struggled to solve. One of the new frontiers in this quest is microbial IoT, a revolutionary fusion of microbiology and IoT. With…
Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winners
At Check Point Software, our partners are at the core of our mission to deliver cutting-edge cyber security solutions worldwide. As cyber threats continue to evolve in complexity and frequency, our partners play a vital role in safeguarding businesses and…
Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platform
Check Point today unveiled its strategic vision for securing the hyper-connected world at CPX 2025 Bangkok, its premier annual cyber security event. With nearly 1,650 employees, customers and partners from across APAC in attendance, Check Point showcased how AI-driven security…
Check Point Software Announces Plans to Expand Global R&D Footprint with First Asia-Pacific Research & Development Centre in Bengaluru
Check Point has announced its plans to establish its first Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India, with a goal to drive innovation in cyber security solutions and strengthen global product development and talent growth. This strategic expansion,…
Strengthening Authentication in the AI Era: How Harmony SASE Aligns with CISA’s Secure by Design Pledge
For the modern threat environment, strong authentication is a must. Malicious actors are leveraging traditional credential harvesting tactics more than ever, as well as using AI to enhance them. Organizations must reinforce their defenses and deploy multi-factor authentication (MFA) to…
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in never-before-seen zero day threats that slip past defenses. For companies adopting the SASE security model, effective threat prevention is non-negotiable. That’s why Check Point delivers industry-leading protection for SASE and…
Protecting Hospitals from IoT Threats with Check Point
In today’s healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security…
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
Check Point Software’s latest threat index highlights that FakeUpdates continues to pose a significant threat in the cyber landscape, playing a crucial role in facilitating ransomware attacks. A recent investigation by security researchers revealed that an affiliate of RansomHub utilized…
A Safer Digital Future: Stopping AI-Fueled Cyber Scams for a more Secure Tomorrow
With Safer Internet Day this week, it’s hard not to feel a little extra concern about our kids’ online safety. Today, our children and young adults are living and breathing a digital world that’s evolving faster than ever—one where scammers…
Service Levels for MSSPs: Elevating Security-Specific Services
Introduction: The Critical Role of Service Levels in Managed Security Today’s managed service providers (MSPs) play a crucial role in safeguarding businesses against cyber threats. As the complexity and frequency of these threats increase exponentially, it’s becoming critical for MSPs…
Love Gone Phishy: Check Point Research Exposes Valentine’s Day Cyber Threats
Key Findings In January 2025, we observed over 18,000 new Valentine’s/love-related websites, marking a 5% increase compared to the previous month. Of these, 1 in 72 newly registered websites were identified as malicious or risky. Specifically focusing on Valentine’s-related websites,…
Breaking (Fire)Walls & Glass Ceilings: Women Leading Digital Revolution and Cyber Security’s Next Frontier
Cyber security is at the heart of today’s digital revolution, yet it remains one of the most male-dominated sectors in science and technology. Data from Zippia shows that while women hold 48% of roles in the broader workforce, they represent…
How Electric AI Strengthened Its Cloud Security with AI-Powered Solutions
Electric AI, a New York-based IT platform provider serving nearly 1,000 customers and over 55,000 end-users, faced the critical challenge of securing not only their own infrastructure but also protecting sensitive data across multiple industries. As a managed security provider…
Check Point Helps Gentera Secure the Financial Future of Millions
Gentera is built on the vision of eradicating financial exclusion and serves over 3.2 million clients across its subsidiaries in Mexico, Guatemala, and Peru. To help empower those with fewer financial resources, Gentera provides counseling and services around credit, insurance,…
New Facebook Copyright Infringement Phishing Campaign
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further, according to Sprout Social, Facebook is the third-most visited website following Google and YouTube. Thus, when a phishing campaign…
Check Point Software Collaborates with AppDirect to Offer Streamlined Cyber Security Solutions
Check Point Software and AppDirect, a B2B subscription commerce platform, have unveiled a strategic collaboration, allowing businesses to effortlessly obtain Check Point’s AI-powered cyber security solutions through the AppDirect marketplace. This partnership offers a unified procurement experience, ensuring more customers…
CPR Finds Threat Actors Already Leveraging DeepSeek and Qwen to Develop Malicious Content
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms to develop malicious content. Threat actors are sharing how to manipulate the models and show uncensored…
Check Point Ranks #1 in Threat Prevention Testing: Miercom 2025 Enterprise & Hybrid Mesh Firewall Report
For the third consecutive year, Check Point ranked #1 for security effectiveness in all categories of the Miercom Enterprise and Hybrid Mesh Firewall Report. This report includes two new metrics: SSE/SASE Threat Prevention and Known Exploited Vulnerabilities (KEVs). Miercom’s independent,…
AI-Powered Security Management for the Hyperconnected World
Today’s security approach is siloed. Each deployed security tool is designed to provide a specific type of protection across different areas like the network, endpoints, email, and cloud environments. This hybrid methodology, often requiring dozens of systems, leads to several…
Check Point Ranks #1 in Threat Prevention Testing Miercom 2025 Enterprise & Hybrid Mesh Firewall Report
For the third consecutive year, Check Point ranked #1 for security effectiveness in all categories of the Miercom Enterprise and Hybrid Mesh Firewall Report. This report includes two new metrics: SSE/SASE Threat Prevention and Known Exploited Vulnerabilities (KEVs). Miercom’s independent,…
Protect Your Organization from GenAI Risks with Harmony SASE
Love it or hate it, large language models (LLMs) like ChatGPT and other AI tools are reshaping the modern workplace. As AI becomes a critical part of daily work, establishing guardrails and deploying monitoring tools for these tools is critical.…
WAF Security Test Results – How Does Your Vendor Rate?
With cyber threats on the rise, organizations are increasingly concerned about their security posture. One area of prime concern is web applications and APIs that power key business processes. To protect mission-critical applications, efficient web application firewalls (WAFs) are required…
What DeepSeek’s R1 Model Means For AI Innovation and Enterprise Security
DeepSeek’s R1 model launch marks a significant milestone in AI accessibility, combining advanced reasoning capabilities with free, unlimited access. The platform’s explosive growth is evident—its mobile app topped the iOS App Store charts within 48 hours of release, indicating unprecedented…
The Journey to Autonomous Cyber Security
The evolution of cyber security is no longer just about reacting to threats; it is about staying perpetually ahead in a world defined by complexity and speed. Autonomous cyber security represents a bold, transformative leap into the future—where intelligent, AI-driven…
Check Point Software champions data privacy on International Data Protection Day
In recognition of International Data Protection Day, Check Point Software has underscored the critical importance of data privacy as a strategic priority for organizations worldwide. No longer merely a compliance obligation, data privacy has become a competitive advantage, reinforcing customer trust,…
Continuing to Pioneer Cyber Security Excellence and Shaping the Future
As a trusted leader in cyber security, Check Point proudly acknowledges its 2024 accolades from leading analysts and research firms. These accolades and recognitions showcase Check Point’s innovation and dedication to protecting the digital world and ensuring digital trust across…
Introducing HT-ML Guard to Automatically Analyze and Secure HTML Files
Highlights: HTML files are being used in phishing attacks, mimicking trusted websites HT-ML Guard is designed to analyze HTML files and accurately determine whether they are malicious, enhancing cyber security defenses. Check Point Harmony Email and Collaboration customers remain protected…
The 8 Things You Should Know About Cyber Attacks on the Education Sector and How to Prevent Them
2024 saw an escalation in cyber attacks on the critical Education Sector. Looking at overall numbers, cyber attacks are surging at an alarming rate, with organizations experiencing an average of 1,673 weekly attacks in 2024—a staggering 44% increase from the…
Expanding Cyber Security Education Globally: SecureAcademy Partners with Nonprofits
Cyber security education is not just a priority—it’s a necessity in today’s digital landscape. With cyber attacks on the rise globally, there is an unprecedented demand for skilled professionals to safeguard critical infrastructures, businesses, and individuals. To address this urgent…
Cyber Security Tips for Educators and Parents
The numbers are staggering: the average number of weekly cyber attacks per organization rose to 1,673 in 2024, a 44% increase compared to the previous year, according to Check Point’s The State of Cyber Security 2025 report. Among all sectors,…
Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback
Cyber criminals continue to refine their phishing tactics, targeting trusted global brands to deceive users and steal sensitive information. Check Point Research (CPR), the intelligence arm of Check Point® Software, has unveiled its latest findings for Q4 2024, revealing key…
How Grand Canyon Education Enhanced Their Cloud Security with CloudGuard
Educational institutions face unique challenges in maintaining robust cloud security. Grand Canyon Education (GCE) is a shared services partner dedicated to serving colleges and universities. GCE supports partner institutions’ students through operational functions that achieve organizational growth and student success.…
6 Cyber Security Challenges Emerge from World Economic Forum, Check Point Research on 2025 Threats
As we step into 2025, the cyber security landscape continues to be as complex as ever for security leaders looking to protect their organizations from increasingly injurious cyber threats. The World Economic Forum (WEF) detailed some of the most challenging…
AI Predictions for 2025: A Cyber Security Expert’s Perspective
As we approach 2025, the rapid evolution of artificial intelligence (AI) is set to dramatically reshape the cyber security landscape. As an AI and cyber security expert, I foresee several key developments that will significantly impact our digital world. The…
Check Point Heads to Davos 2025 to Discuss Advancing Cyber Security and Digital Trust in an Era of GenAI and Disinformation
Check Point’s Rupal Hollenbeck, President, and Dorit Dor, CTO, will be attending the World Economic Forum Annual Meeting 2025 next week from January 20-23. Rupal will speak at WEF Agenda sessions including “Democratizing Cybersecurity,” where she will discuss securing the…
Why Security Providers Choose Check Point
For 20 years, Network Technology Partners (NTP) has been protecting their customers from cyber attackers with cutting-edge, real-time cyber security and information technology. NTP gets to know its customers, ranging from SMBs to Fortune 500 enterprises, specializing in advanced security…
FunkSec: The Rising Yet Controversial Ransomware Threat Actor Dominating December 2024
As 2024 ended, a new name surged to the top of the cyber threat charts: FunkSec. Emerging as a leading ransomware-as-a-service (RaaS) actor, FunkSec made waves in December by publishing over 85 victim profiles on its Data Leak Site (DLS).…
5 Reasons You Won’t Want to Miss CPX 2025
As CPX 2025 approaches, the excitement is undeniable—and so is the opportunity. If you’re a security leader, cyber enthusiast, or someone who wants to stay current on the very latest in cyber threat prevention, CPX is the event you should…
5 Key Cyber Security Trends for 2025
As the digital world continues to evolve, threats to organizations are becoming more sophisticated, pervasive, and disruptive. Our annual 2025 State of Cyber Security Report is intended to provide cyber security leaders with critical insights into the evolving threat landscape…
3 CloudGuard Differentiators for Container Security
Kubernetes has become an enterprise’s go-to platform for orchestrating and managing container workloads for cloud-native software. As more organizations adopt it and cloud-native software scales and becomes more complex, the need for container security is high. Kubernetes and container workloads…
Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
Executive Summary: The FunkSec ransomware group emerged in late 2024 and published over 85 victims in December, surpassing every other ransomware group that month FunkSec operators appear to use AI-assisted malware development, which can enable even inexperienced actors to quickly…
Cracking the Code: How Banshee Stealer Targets macOS Users
Executive Summary: Since September, Check Point Research (CPR) has been monitoring a new version of the Banshee macOS Stealer, a malware that steals browser credentials, cryptocurrency wallets, and other sensitive data. Undetected for over two months, Banshee’s latest version introduced…
Fast Pace Health: Zero Phishing Incidents Since Harmony Email & Collaboration Implementation
Healthcare entities have a 51% probability of falling victim to phishing attacks. Successful incidents not only lead to control over systems, but can also expose patient health information, financial and insurance data. Healthcare providers are seeing an 81% uptick in…
Brand Impersonation Scam Hijacks Travel Agency Accounts
Recently, within the span of a week, a new and extensive phishing campaign compromised more than 7,300 businesses and 40,000 individuals around the world. The most heavily impacted regions are the United States (75%) and the European Union (10%). The…