Tag: Check Point Blog

Check Point and Nutanix Advance Cloud Network Security

As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…

The Great NPM Heist – September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages.…

The Networking and Security Shifts Fueling the Rise of SASE

Today’s workplace is no longer defined by office walls. Consequently, IT and security teams must rethink their approach to access and security. Enter Secure Access Service Edge (SASE), an architecture that merges network and security services into a unified, cloud-delivered…

Passing the Security “Vibe” Check

Imagine walking into a kitchen where you can shout out recipes and a robot instantly cooks up a meal. You ask for pasta, and within minutes you have a steaming plate in front of you.  The speed and convenience are…

Resilient by Design: Network Security for the Next Disruption

Whether it’s a pandemic, war, or natural disaster, one thing is certain: disruption is inevitable. For information security professionals, the important question is whether your network is ready to keep operations running securely. There are two essential tactics you can…

Hexstrike-AI: When LLMs Meet Zero-Day Exploitation

Key Findings: Newly released framework called Hexstrike-AI provides threat actors with an orchestration “brain” that can direct more than 150 specialized AI agents to autonomously scan, exploit, and persist inside targets. Within hours of its release, dark web chatter shows…