Check Point researchers have uncovered a large-scale active phishing campaign abusing Google Classroom, a platform trusted by millions of students and educators worldwide. Over the course of just one week, attackers launched five coordinated waves, distributing more than 115,000 phishing emails aimed at 13,500 organizations across multiple industries. Organizations in Europe, North America, the Middle East and Asia are being targeted. Turning a Trusted Tool into a Threat Vector Google Classro...| Check Point Blog
We are excited to announce that CloudGuard WAF-as-a-Service (WAFaaS) is now available on Amazon Web Services (AWS) Marketplace and verified as a “Deployed on AWS” solution. This release simplifies application and API protection for AWS customers. CloudGuard WAF was recognized in the Gartner Market Guide for Cloud Web Application and API Protection (WAAP) and named a Leader in the GigaOm Radar for the second consecutive year. It achieved a 99.4% threat detection rate and 0.81% false positi...| Check Point Blog
Enterprise security and networking teams need details fast, and we work hard to make sure your SASE admin experience is as streamlined as possible. But sometimes it’s better to integrate data into the tools you already use. Introducing the Harmony SASE MCP Server: the bridge between the AI tools you use every day and Harmony SASE. What is MCP (Model Context Protocol)? MCP is an open standard that lets AI and IDE assistants (Claude, Cursor, GitHub Copilot, etc.) connect to external tools and...| Check Point Blog
In an increasingly AI-powered enterprise landscape, the recent discovery of a zero-click vulnerability in Microsoft 365 Copilot, dubbed EchoLink, should| Check Point Blog
Introduction Last week, researchers at Carnegie Mellon University (CMU) revealed a finding that caught the attention of both the AI and cybersecurity worlds. Their work tackled a lingering challenge: whether today’s leading large language models (LLMs) can independently carry out complex, multi-host cyber-attacks from start to finish. In their raw form, when asked to execute multi-step cyber-attacks from start to finish, these models routinely fail. They wander off-task, choose the wrong to...| Check Point Blog
When Instagram quietly rolled out its new “Friend Map” feature, it was billed as a fun way to see where friends are and discover shared hangouts. But the launch also sparked immediate concern, and for good reason. Location sharing isn’t just about convenience; it’s about trust, safety, and control over your personal data. While Meta insists the feature is opt-in, the reality is that enabling it can open the door to far more than just casual meetups. It blurs the line between digital p...| Check Point Blog
In the dynamic world of cyber security, staying ahead of malicious actors is paramount. We are thrilled to introduce the GitHub Abuse Engine, a cutting-edge engine of ThreatCloud AI designed to detect and mitigate malicious abuse on GitHub. This engine leverages advanced algorithms and AI to identify accounts and repositories that are hosted on GitHub and used for credential theft attacks and drive-by downloads. Integrated with our ThreatCloud AI, it offers comprehensive protection across Qu...| Check Point Blog
Check Point Research uncovered six fresh vulnerabilities in Microsoft Windows, including one critical flaw with potential for wide-reaching impact. These weaknesses could trigger system crashes, enable arbitrary code execution, or expose sensitive data across networks. Following a responsible disclosure process, Check Point privately reported these issues to Microsoft, with the final patch delivered on August 12 Patch Tuesday. Check Point customers are already protected—our security solutio...| Check Point Blog
From critical infrastructure to classrooms, no sector is being spared. In July 2025, cyber attacks surged across nearly every industry and region, marking| Check Point Blog
Cyber criminals are raising the stakes. This month, researchers uncovered a sophisticated, multi-stage malware campaign delivering some of the most| Check Point Blog
Harmony SASE August 6, 2025 | Check Point Blog
Major banks are adopting public blockchains at an accelerating pace. Financial institutions are moving beyond pilot programs on private networks to live deployments on permissionless blockchains. Today, major financial institutions are issuing stablecoins and tokenizing real world assets (stocks, bonds, ect.) directly on public blockchains . Stablecoin transaction volumes now exceed the combined throughput of Visa and Mastercard, marking blockchain’s emergence as the new backbone of digital...| Check Point Blog
Extend Zero Trust to unmanaged devices with a secure, Chromium-based browser. Protect data, ensure compliance, and eliminate endpoint blind spots.| Check Point Blog
Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to most, and often more meme than menace. Fast forward to 2025, and they’ve| Check Point Blog
CloudGuard WAF expands with 8 new PoPs worldwide, boosting app and API protection with AI-powered, automated security and zero-day threat prevention.| Check Point Blog
Check Point's Harmony Email & Collaboration ranked Leader in GigaOm 2025 for its AI-powered email security, advanced threat detection, and deepfake protection.| Check Point Blog
Learn how MSPs can reduce risk, boost margins, and scale services with a 4-step proactive security strategy supported by Check Point’s MSP Program.| Check Point Blog
A critical zero-day vulnerability (CVE-2025-53770 ) in SharePoint on-prem is actively being exploited in the wild.| Check Point Blog
Cyber threats are advancing rapidly, with over 75% of attacks starting via email. Traditional defenses alone are no longer sufficient, which is why| Check Point Blog
Explore Check Point Software Blog - Research, news, articles, trends, attacks and updates on the cyber security world| Check Point Blog
The rise of blockchain promises a more open, decentralized internet. But with that promise comes new risks—and so far, the security landscape hasn't kept| Check Point Blog
Soon after the launch of AI models DeepSeek and Qwen, Check Point Research witnessed cyber criminals quickly shifting from ChatGPT to these new platforms| Check Point Blog
Facebook is the most popular social network worldwide, outperforming every other competitor for reach and active users, according to Statista. Further,| Check Point Blog
Highlights: Global attacks increased by 28%in the third quarter of 2022 compared to same period in 2021. The average weekly attacks per organization| Check Point Blog
Executive Summary: Check Point Research has identified a large-scale phishing operation utilizing a new version of Rhadamanthys Stealer. Dubbed| Check Point Blog
Highlights: Global weekly attacks rose by 7% in Q1 2023 versus same quarter last year, , with each organization facing an average of 1248 attacks per| Check Point Blog
Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of| Check Point Blog
Check Point Research sees Microsoft as the number one impersonated brand by cybercriminals with the technology sector dominating the top ten.| Check Point Blog
Check Point Research (CPR) releases new data on 2022 cyberattack trends. The data is segmented by global volume, industry and geography. Global| Check Point Blog