In just a few short years, the breakneck speed of advancements in AI have transformed nearly every industry, including cyber security. The pace of acceleration has forced IT and business leaders to rethink approaches to some of the most sensitive…
Tag: Check Point Blog
Ransomware Reloaded: Why 2025 Is the Most Dangerous Year Yet
May 12 marks Anti-Ransomware Day, a global awareness initiative created by INTERPOL and Kaspersky to commemorate the 2017 WannaCry outbreak. That infamous ransomware campaign crippled hundreds of thousands of systems worldwide, from UK hospitals to global logistics networks, and its…
April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with Stealth
Cyber criminals are raising the stakes. This month, researchers uncovered a sophisticated, multi-stage malware campaign delivering some of the most prevalent commodity malware—AgentTesla, Remcos, and XLoader—via stealthy techniques designed to evade detection. Meanwhile, FakeUpdates retains its top spot in the…
Check Point Wins “Best Threat Prevention Vendor of the Year” at GISEC 2025
We’re thrilled to announce that Check Point Software Technologies has been named Best Threat Prevention Vendor of the Year by Cyber Strategists at GISEC 2025! This award recognizes organizations that lead the way in proactive cyber defense—identifying, stopping, and staying…
Employee Spotlight: Getting to Know Tom De Laet
Tom, can you tell us a bit about yourself? Currently I have the privilege of leading the Incident Response Team for EMEA at Check Point, based in Belgium, where I live with my wife and two daughters. My journey into…
Check Point Named Cloud Security Innovator of the Year by ITP.NET at GISEC 2025
We’re proud to share that Check Point Software Technologies has been named Cloud Security Innovator of the Year by ITP.NET at GISEC 2025! Presented as part of the Security Leadership Awards, this honor celebrates organizations that are pushing boundaries in…
DragonForce Ransomware: Redefining Hybrid Extortion in 2025
The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing more dangerous. In this volatile landscape, DragonForce is emerging as one of the most intriguing and threatening actors of 2025. Born from possible hacktivist roots and now fully immersed in…
Microsoft Dynamics 365 Customer Voice Phishing Scam
Overview: Check Point researchers have identified a new phishing campaign that exploits Microsoft’s “Dynamics 365 Customer Voice,” a customer relationship management software product. It’s often used to record customer calls, monitor customer reviews, share surveys and track feedback. Microsoft 365…
Secure Coding in DevOps: Shifting Left for Stronger Security
In today’s rapidly evolving DevOps environment, the drive for speed often inadvertently amplifies security risks, leaving applications exposed to costly breaches. With global breach costs averaging $4.8 million last year, according to IBM’s annual Cost of a Data Breach Report…
Employee Spotlight: Getting to Know Shila Elisha-Aloni
Shila, can you tell us a bit about yourself? I’m an HR Partner for EMEA. I’m 33-years-old, a proud mom to Naomi and married to Yonatan, and we live in a small kibbutz in the north of Israel. I hold a…