Crypto March 4, 2026 The Whitelist Illusion – When Your Trusted List Becomes a Billion Dollar Attack Path Your whitelist is not a wall. For nation-state attackers, it’s a map, showing exactly who ...
Research March 3, 2026 Silver Dragon: China Nexus Cyber Espionage Group Targeting Governments in Asia and Europe Silver Dragon is a China nexus cyber espionage group targeting government ministries and public sector ...
Executive Insights March 2, 2026 How Threat Intelligence and Multi-Source Data Drive Smarter Vulnerability Prioritization The CVSS Blind Spot For years, CVSS scores have been the default metric for vulnerability ...
Executive Insights February 26, 2026 National Cyber Resilience in the AI Era A Practical Q&A Guide for Leaders Navigating NIST, Zero Trust, and AI Governance Q1. Why ...
Research February 25, 2026 Check Point Researchers Expose Critical Claude Code Flaws Critical vulnerabilities, CVE-2025-59536 and CVE-2026-21852, in Anthropic’s Claude Code enabled remote code execution and API ...
Research February 18, 2026 Two Types of Threat Intelligence That Make Security Work The problem isn’t that we lack threat intelligence. It’s that we lack the right kind ...
Hybrid Mesh February 17, 2026 Check Point Named Leader in GigaOm Radar for Cloud Network Security For 3 Years in a Row – Protects 22 Cloud Vendors In today’s multi-cloud world, businesses deploy workloads across dozens of public and private clouds, each ...
Research February 16, 2026 Using AI for Covert Command-and-Control Channels Check Point Research identified a potential future attack technique in which AI assistants with web-browsing ...
EMEA February 16, 2026 The UK’s Cyber Threat Has Changed. Most Organizations Haven’t. For years, ransomware shaped how UK organizations thought about cyber risk. In 2025, that assumption ...
Securing the Network February 13, 2026 Unzipping the Threat: How to Block Malware Hidden in Password-Protected ZIP Files As malware evades detection by hiding inside password-protect zip files, new Threat Emulation capabilities enable ...