Tag: Check Point Blog

AI, Agents, and the Future of Cyber Security

In just a few short years, the breakneck speed of advancements in AI have transformed nearly every industry, including cyber security. The pace of acceleration has forced IT and business leaders to rethink approaches to some of the most sensitive…

Ransomware Reloaded: Why 2025 Is the Most Dangerous Year Yet

May 12 marks Anti-Ransomware Day, a global awareness initiative created by INTERPOL and Kaspersky to commemorate the 2017 WannaCry outbreak. That infamous ransomware campaign crippled hundreds of thousands of systems worldwide, from UK hospitals to global logistics networks, and its…

Employee Spotlight: Getting to Know Tom De Laet

 Tom, can you tell us a bit about yourself? Currently I have the privilege of leading the Incident Response Team for EMEA at Check Point, based in Belgium, where I live with my wife and two daughters. My journey into…

DragonForce Ransomware: Redefining Hybrid Extortion in 2025

The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing more dangerous. In this volatile landscape, DragonForce is emerging as one of the most intriguing and threatening actors of 2025. Born from possible hacktivist roots and now fully immersed in…

Microsoft Dynamics 365 Customer Voice Phishing Scam

Overview: Check Point researchers have identified a new phishing campaign that exploits Microsoft’s “Dynamics 365 Customer Voice,” a customer relationship management software product. It’s often used to record customer calls, monitor customer reviews, share surveys and track feedback. Microsoft 365…

Secure Coding in DevOps: Shifting Left for Stronger Security

In today’s rapidly evolving DevOps environment, the drive for speed often inadvertently amplifies security risks, leaving applications exposed to costly breaches. With global breach costs averaging $4.8 million last year, according to IBM’s annual Cost of a Data Breach Report…