Harmony April 25, 2025 Rising Mobile Threats: Closing the Security Gap in Your Organization’s Device Strategy As advanced mobile threats become more prevalent, it’s crucial for organizations to understand that mobile ...
Research April 24, 2025 Cyber Criminals Exploit Pope Francis Death to Launch Global Scams Following Pope Francis’ death, as is common with global events of this nature, cyber criminals ...
Innovation April 24, 2025 Check Point and Illumio Partner to Accelerate Zero Trust with Proactive Threat Prevention and Microsegmentation Dynamic hybrid data center cloud environments are growing, leading to a larger attack surface. The ...
Research April 21, 2025 Microsoft Dominates as Top Target for Imitation, Mastercard Makes a Comeback Phishing attacks are one of the primary intrusion points for cyber criminals. As we examine ...
Innovation April 21, 2025 Check Point Named a Leader and the Outperformer in the GigaOm Radar for Enterprise Firewalls 2025 As cyber threats grow faster and more widespread, enterprises of all sizes need flexible, scalable, ...
Quantum April 17, 2025 The Hidden Downside of a Cloud-only SASE Architecture As enterprises accelerate their shift toward secure access service edge (SASE), many are tempted to ...
Research April 16, 2025 Q1 2025 Global Cyber Attack Report from Check Point Software: An Almost 50% Surge in Cyber Threats Worldwide, with a Rise of 126% in Ransomware Attacks Cyber Attack Surge: In Q1 2025, cyber attacks per organization increased by 47%, reaching an ...
Research April 15, 2025 Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced ...
Crypto April 15, 2025 Check Point and Fuse to Deliver First Real-Time Blockchain Firewall The rise of blockchain promises a more open, decentralized internet. But with that promise comes ...
Security April 14, 2025 Collateral Damage: The Hidden Cost of Cyber Risks Unanticipated cyber threats can rapidly exhaust cyber security budgets and derail carefully planned strategies. Among ...