As organizations seek to accelerate their cloud operations, ensuring secure and fast network performance to Azure Virtual WAN has become critically important. Check Point CloudGuard Network Security has now made available enhanced site-to-site VPN that simplifies Azure Virtual WAN network…
Category: Check Point Blog
Is Firebase Phishing a Threat to Your Organization?
Check Point researchers have uncovered a sophisticated credential harvesting attack that leverages Firebase, a popular web application hosting service. This attack involves the creation of highly convincing and professionally designed phishing web pages that impersonate well-known services. The attackers also…
How Manufacturers Can Turn Security Into a Competitive Advantage
Digitization has significantly changed manufacturing over the past 25 years. The benefits include reducing inventory costs and machine downtime, and boosting throughput and forecasting accuracy. But as digitization has grown in prevalence, so have the security challenges facing manufacturers. This…
Check Point Named Gold Winner for Cloud Security in 2025 Globee Cybersecurity Awards
Check Point is honored to be featured as a Gold Winner for Cloud Security in the 2025 Globee Cybersecurity Awards. Check Point’s CloudGuard platform distinguished itself for its preventive approach to cloud security, focusing on stopping cyber attacks before they…
Beyond the Cloud | How Edge Computing is Unlocking IoT’s Full Potential
The Internet of Things (IoT) is transforming industries like healthcare, manufacturing, smart cities, and even autonomous vehicles—making our daily lives hyperconnected. But as more devices come online, relying solely on cloud computing can lead to slow response times, high bandwidth…
A Milestone in Hands-On Cyber Security Training: SecureAcademy’s First Global Cyber Range Challenge
SecureAcademy recently hosted its first-ever Global Cyber Range Challenge, a virtual event designed to provide cyber security students and enthusiasts with real-world, hands-on experience. With participants from 11 countries and 12 academic institutions, the event showcased the power of immersive…
The Role of WAF in Fintech & Financial Services
The financial sector serves as the backbone of the global economy, making it one of the most targeted industries for cyber attacks. As online banking, mobile transactions, and fintech innovations expand, cyber threats continue to evolve. Cyber criminals continuously exploit…
Dark Storm Team Claims Responsibility for Cyber Attack on X Platform – What It Means for the Future of Digital Security
In a stark reminder of the growing threat posed by hacktivist groups, the pro-Palestinian Dark Storm Team has taken credit for a major distributed denial-of-service (DDoS) attack on X (formerly Twitter). This attack underscores the vulnerability of even the most…
February 2025’s Malware Spotlight: AsyncRAT Emerges, Targeting Trusted Platforms
Check Point’s latest threat index highlights a new campaign involving the malware, AsyncRAT, a remote access trojan targeting Windows systems since 2019. The fourth most prevalent malware of the month, AsyncRAT, enables data theft, command execution, and system compromise. The…
The Growing Danger of Blind Eagle: One of Latin America’s Most Dangerous Cyber Criminal Groups Targets Colombia
Executive Summary Check Point Research (CPR) has uncovered a series of ongoing, targeted cyber campaigns by Blind Eagle (APT-C-36)—one of Latin America’s most dangerous threat actors Days after Microsoft released a fix for CVE-2024-43451, the group began employing a comparable…