Protect your applications and APIs with CloudGuard WAF — a unified, AI-driven security platform. We are excited to share that CloudGuard WAF global footprint has expanded with 8 new points of presence (PoPs) in recent months. This growth supports rising…
Tag: Check Point Blog
Ransomware in Q2 2025: AI Joins the Crew, Cartels Rise, and Payment Rates Collapse
Key Findings – Q2 2025 Ransomware Trends Ransomware-as-a-Service (RaaS) group disruptions: Several major ransomware groups have disappeared, leaving a fragmented ecosystem. Slight decline in public victim extortion: Fewer victims were named on data leak sites this quarter, likely due to…
Check Point Named Leader and Outperformer in 2025 GigaOm Radar for Anti-Phishing
We’re extremely excited to announce that Harmony Email & Collaboration was just named Leader and Outperformer in 2025 GigaOm Radar for Anti-Phishing, an enormous validation of our cyber security efficacy and block rate and one more proof point on how…
JSCEAL Targets Crypto App Users – A New Threat in the Cyber Security Landscape
Key Points: Check Point Research has discovered the JSCEAL campaign, which targets crypto app users by leveraging malicious advertisements The campaign uses fake applications impersonating popular cryptocurrency trading apps, with over 35,000 malicious ads served in the first half of…
Check Point Launches MDR 360° / MXDR 360°: Open, Vendor-Neutral Managed Detection and Response Services for Stronger Security
Check Point Software Technologies is proud to introduce MDR 360° / MXDR 360°, a new suite of managed detection and response service packages designed to simplify security operations, maximize visibility, and quickly contain threats across endpoint, identity, cloud, and network…
Proactive Security for MSPs: 4 Steps to Reduce Risk and Improve Margins
As an MSP, you’re increasingly expected to deliver more than just uptime and availability. Customers now rely on you for security, compliance, and risk reduction. That creates a tremendous opportunity: by evolving your offerings to include proactive security services, you…
Stopping Ransomware: How a Hybrid Mesh Architecture Disrupts the Attack Chain Part Three
In parts one and two, we explored the ransomware attack chain, the shortcomings of fragmented defenses, and the advantages of a unified hybrid mesh approach. In part three, Pete Nicoletti joins us to share practical steps CISOs can take right…
Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target
Phishing continues to be a powerful tool in the cyber criminal arsenal. In the second quarter of 2025, attackers doubled down on impersonating the world’s most trusted brands—those that millions of people rely on every day. From tech giants to…
SharePoint Zero-Day CVE-2025-53770 Actively Exploited: What Security Teams Need to Know
Key findings : A critical zero-day vulnerability (CVE-2025-53770 ) in SharePoint on-prem is actively being exploited in the wild. Dubbed “ToolShell,” the campaign enables unauthorized access to on-prem SharePoint servers, posing a serious risk to corporate environments Check Point Research identified…
Independent Tests Prove It: Check Point’s SASE Excels in Security & User Experience
With employees working in the office, from home, and points beyond, securing the hybrid workforce requires more than just a VPN replacement in the cloud, or a scattered mix of point solutions. Organizations need a cloud-delivered platform that combines secure…