A new ideologically-motivated threat actor has emerged and growing technical capabilities: Hezi Rash. This Kurdish nationalist hacktivist group, founded in 2023, has rapidly escalated its presence through a series of distributed denial-of-service (DDoS) attacks targeting countries perceived as hostile to Kurdish or Muslim communities. Who Is Hezi Rash? Hezi Rash, meaning “Black Force” in Kurdish, describes itself as a digital collective defending Kurdish society against cyber threats. The...| Check Point Blog
Network security solutions can be complex and expensive to operate, especially when based on hardware appliances. Additionally, they can degrade performance, which can impact productivity. Adopting the right solution can help simplify the network, reduce costs, improve productivity and time to value, and reduce exposure to risk. The TCO savings calculator provides insights into how Check Point SASE can lower your TCO and improve your network security stack’s ROI compared to a traditional VP...| Check Point Blog
The race to build AI is accelerating. Enterprises are investing billions in AI factories that power the creation and development of AI capabilities. While AI provides amazing productivity benefits, AI systems face unprecedented security challenges. More than half of enterprise networks now use AI tools, making them prime targets for cyber attacks. Check Point data shows that 1 in every 80 GenAI prompts exposes sensitive data. Meanwhile, a recent Gartner report found that 32% of organization...| Check Point Blog
Organizations around the world are rapidly adopting AI, including across the enterprise, where it is already providing significant efficiency gains. As a result, cyber security is entering a turning point where AI fights AI. The phishing scams and deepfakes of today are only precursors to a coming era of autonomous, self-optimizing AI threat actors. Systems that can plan, execute, and refine attacks with limited human oversight or even none at all. In September 2025, Check Point Research’s ...| Check Point Blog
Key Takeaways LockBit is back. After being disrupted in early 2024, the ransomware group has resurfaced and is already extorting new victims. New version, new victims. Check Point Research identified a dozen organizations hit in September 2025, half by the new LockBit 5.0 (“ChuongDong”) variant. Expanded targeting. The group is deploying attacks across Windows, Linux, and ESXi environments in Europe, the Americas, and Asia. Check Point Harmony Endpoint and Quantum protect customers agains...| Check Point Blog
Check Point Research uncovered the YouTube Ghost Network, a large-scale malware distribution operation that used fake and compromised YouTube accounts to distribute infostealers such as Rhadamanthys and Lumma. More than 3,000 malicious videos were identified and removed after being reported by Check Point Research, disrupting one of the largest malware operations seen on YouTube. The operation relied on cracked software and game hack videos to lure victims into downloading password-protected ...| Check Point Blog
The Big Picture OpenAI’s ChatGPT Atlas browser is the prototype for how we’ll use computers in the future. Within a few years, operating systems will be powered by AI as users interact through prompts instead of clicking applications. You’ll describe what you want, and the AI will orchestrate everything across your system, apps, and the internet. This isn’t speculation, it’s the logical evolution of computing. Atlas demonstrates this vision today: AI sitting at the center of your co...| Check Point Blog
The recently released 2025 Verizon Mobile Security Index documents trends that CISOs and IT leaders have been seeing come together this year – and it’s clear that the vulnerability of mobile devices, the advancements of AI-powered threats, and persistent human error are creating a growing risk surface for security teams. Considering that our 2025 State of Cyber Security Report found that more than 60% of global internet traffic originated from mobile devices in 2024, protecting ...| Check Point Blog
Check Point is thrilled to introduce a continuously-trained AI-engine designed to analyze key information about websites, achieving remarkable results in detecting phishing attempts. Integrated with our ThreatCloud AI, it offers comprehensive protection across Quantum gateways, Harmony Email, Endpoint, and Harmony Mobile. The Threat Phishing remains one of the most widespread and rapidly evolving cyber threats, with millions of new malicious domains appearing each year, and a steady rise in...| Check Point Blog
Generative and agentic AI are transforming phishing and smishing into adaptive, multi-channel attacks. Learn how CISOs can build AI-resilient defenses.| Check Point Blog
By Asaf Avisar, Arie Olshtein and Shiri Yaakobson Highlights: In recent months, MemDive allowed our Threat Emulation engine to prevent various| Check Point Blog
Manufacturing faces rising cyberattacks, supply chain risks, and ransomware losses. Learn why resilience is now a top executive priority.| Check Point Blog
Highlights: Check Point Research (CPR) provides under-the-hood details of its analysis of the infamous Azov Ransomware Using advanced wipers, Azov is| Check Point Blog
Research September 22, 2025 | Check Point Blog
As businesses continue to migrate to the cloud, delivering the highest level of network security becomes increasingly challenging due to infrastructure| Check Point Blog
Key Highlights Check Point Research is actively tracking Iranian threat actor Nimbus Manticore. Our latest findings show it is expanding operations into| Check Point Blog
Learn how to avoid NFT scams, phishing, and rug pulls. This security handbook shows you how to safeguard your digital fortune in the NFT world.| Check Point Blog
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance| Check Point Blog
Check Point Research uncovers ZipLine, an advanced phishing campaign using web forms and AI lures to target U.S. manufacturing and supply chains.| Check Point Blog
In an increasingly AI-powered enterprise landscape, the recent discovery of a zero-click vulnerability in Microsoft 365 Copilot, dubbed EchoLink, should| Check Point Blog
From critical infrastructure to classrooms, no sector is being spared. In July 2025, cyber attacks surged across nearly every industry and region, marking| Check Point Blog
Cyber criminals are raising the stakes. This month, researchers uncovered a sophisticated, multi-stage malware campaign delivering some of the most| Check Point Blog
Harmony SASE August 6, 2025 | Check Point Blog
Extend Zero Trust to unmanaged devices with a secure, Chromium-based browser. Protect data, ensure compliance, and eliminate endpoint blind spots.| Check Point Blog
Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve| Check Point Blog
CloudGuard WAF expands with 8 new PoPs worldwide, boosting app and API protection with AI-powered, automated security and zero-day threat prevention.| Check Point Blog
A critical zero-day vulnerability (CVE-2025-53770 ) in SharePoint on-prem is actively being exploited in the wild.| Check Point Blog
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn't kept| Check Point Blog
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms| Check Point Blog
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further,| Check Point Blog
Highlights: Global attacks increased by 28%in the third quarter of 2022 compared to same period in 2021. The average weekly attacks per organization| Check Point Blog
Executive Summary: Check Point Research has identified a large-scale phishing operation utilizing a new version of Rhadamanthys Stealer. Dubbed| Check Point Blog
Highlights: Global weekly attacks rose by 7% in Q1 2023 versus same quarter last year, , with each organization facing an average of 1248 attacks per| Check Point Blog
Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of| Check Point Blog
Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten.| Check Point Blog
Check Point Research (CPR) releases new data on 2022 cyberattack trends. The data is segmented by global volume, industry and geography. Global| Check Point Blog