Highlights: Check Point Research (CPR) provides under-the-hood details of its analysis of the infamous Azov Ransomware Using advanced wipers, Azov is| Check Point Blog
Research September 22, 2025 | Check Point Blog
As businesses continue to migrate to the cloud, delivering the highest level of network security becomes increasingly challenging due to infrastructure| Check Point Blog
Introduction Credential-based attacks have reached epidemic levels. The 2025 Verizon Data Breach Investigations Report (DBIR) underscores the trend: 22% of breaches now start with compromised credentials, while Check Point External Risk Management found that leaked credential volumes surged 160% year-over-year. Attackers increasingly prefer to “log in” rather than “hack in,” leveraging a flood of exposed passwords, API keys, and tokens circulating from breaches and dark web leaks. For...| Check Point Blog
Quantum computing is moving from theory to reality. While largescale quantum computers are not yet available, their future impact on cyber security is clear: algorithms like RSA, Diffie–Hellman, and Elliptic Curve Diffie-Hellman which secure VPNs, TLS, and digital identities, will eventually be broken by quantum algorithms. This creates an immediate risk known as “harvest now, decrypt later”, in which adversaries can capture encrypted traffic today and decrypt it when quantum resourc...| Check Point Blog
Introduction Every four years, the World Cup captures the attention of billions. With that attention comes opportunity – not only for sponsors, broadcasters, and legitimate merchants, but also for adversaries who see in this spectacle a marketplace of deception. As the 2026 FIFA World Cup approaches, the outlines of this parallel economy are already visible. In the span of two months since 1 August 2025, more than 4,300 newly registered domains bearing the language of FIFA, the World Cup, o...| Check Point Blog
Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived, even if most people barely notice. IT security is on a similar journey. For years, defenders have relied on automation: writing playbooks, configuring policies, and creating scripts to respond to threats. These tools helped, but ...| Check Point Blog
Key Highlights Check Point Research is actively tracking Iranian threat actor Nimbus Manticore. Our latest findings show it is expanding operations into Europe and now targeting the defense, telecom, and aerospace sectors. The group uses fake job portals and spear‑phishing to lure victims, delivering malicious files disguised as part of hiring processes, all while impersonating major local and global aerospace companies. Evolving malware such as MiniJunk and MiniBrowse help attackers stay h...| Check Point Blog
Picture this: You’ve just minted what you think is the next Bored Ape, only to discover you’ve actually given a hacker permission to drain your entire wallet. Or maybe you’ve proudly displayed your new 10 ETH NFT purchase, only to wake up and find it’s now showing a crude drawing of a stick figure. Welcome to the wild world of NFT security – where one wrong click can cost you a fortune, and where the phrase “not your keys, not your crypto” takes on a whole new meaning. As NFTs c...| Check Point Blog
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, proudly recognised the top-performing partners across Asia Pacific at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held from 8th -11th September 2025 at the JW Marriot Hanoi in Vietnam. The annual conference brought together nearly 200 regional partners to collaborate on securing organizations in an era of rising AI-driven cyber threats. As a 100% par...| Check Point Blog
Understanding user satisfaction in conversational AI In the rapidly evolving landscape of artificial intelligence, chatbots have become a cornerstone of customer service, support, and engagement across various industries. Despite their widespread adoption, one of the persistent challenges remains: accurately gauging user satisfaction. Understanding whether users are truly satisfied with their interactions is crucial for refining chatbot performance, enhancing user experience and trust, and en...| Check Point Blog
We’re excited to share the Check Point is acquiring Lakera to deliver a full AI security stack for AI-powered enterprises AI is the new frontier of the IT revolution As organizations seek to modernize operations and unlock new business potential, AI-driven applications are the next big wave of digital transformation, driving unprecedented opportunities for growth. As with any other technological revolution, with great power come great new risks and opportunities for exploitation. AI const...| Check Point Blog
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance| Check Point Blog
Check Point Research uncovers ZipLine, an advanced phishing campaign using web forms and AI lures to target U.S. manufacturing and supply chains.| Check Point Blog
In an increasingly AI-powered enterprise landscape, the recent discovery of a zero-click vulnerability in Microsoft 365 Copilot, dubbed EchoLink, should| Check Point Blog
From critical infrastructure to classrooms, no sector is being spared. In July 2025, cyber attacks surged across nearly every industry and region, marking| Check Point Blog
Cyber criminals are raising the stakes. This month, researchers uncovered a sophisticated, multi-stage malware campaign delivering some of the most| Check Point Blog
Harmony SASE August 6, 2025 | Check Point Blog
Extend Zero Trust to unmanaged devices with a secure, Chromium-based browser. Protect data, ensure compliance, and eliminate endpoint blind spots.| Check Point Blog
Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve| Check Point Blog
CloudGuard WAF expands with 8 new PoPs worldwide, boosting app and API protection with AI-powered, automated security and zero-day threat prevention.| Check Point Blog
Check Point's Harmony Email & Collaboration ranked Leader in GigaOm 2025 for its AI-powered email security, advanced threat detection, and deepfake protection.| Check Point Blog
Learn how MSPs can reduce risk, boost margins, and scale services with a 4-step proactive security strategy supported by Check Point’s MSP Program.| Check Point Blog
A critical zero-day vulnerability (CVE-2025-53770 ) in SharePoint on-prem is actively being exploited in the wild.| Check Point Blog
Cyber threats are advancing rapidly, with over 75% of attacks starting via email. Traditional defenses alone are no longer sufficient, which is why| Check Point Blog
Explore Check Point Software Blog - Research, news, articles, trends, attacks and updates on the cyber security world| Check Point Blog
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn't kept| Check Point Blog
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms| Check Point Blog
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further,| Check Point Blog
Highlights: Global attacks increased by 28%in the third quarter of 2022 compared to same period in 2021. The average weekly attacks per organization| Check Point Blog
Executive Summary: Check Point Research has identified a large-scale phishing operation utilizing a new version of Rhadamanthys Stealer. Dubbed| Check Point Blog
Highlights: Global weekly attacks rose by 7% in Q1 2023 versus same quarter last year, , with each organization facing an average of 1248 attacks per| Check Point Blog
Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of| Check Point Blog
Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten.| Check Point Blog
Check Point Research (CPR) releases new data on 2022 cyberattack trends. The data is segmented by global volume, industry and geography. Global| Check Point Blog