Artificial Intelligence November 26, 2025 AI Has Become the New Enterprise Perimeter — and Gemini 3 Pro Just Proved It When Google unveiled Gemini 3 on 18 November 2025, most headlines focused on its leaps ...
Company and Culture November 26, 2025 Employee Spotlight: Getting to Know Angel Salazar Tell us your story — who you are, what drives you, and how your journey ...
Research November 25, 2025 Shai-Hulud 2.0: Inside The Second Coming, the Most Aggressive NPM Supply Chain Attack of 2025 How attackers infiltrated the npm ecosystem, what Check Point researchers uncovered, and how organizations can ...
Artificial Intelligence November 25, 2025 The 2026 Tech Tsunami: AI, Quantum, and Web 4.0 Collide The year 2026 will not be defined by incremental upgrades. It will be shaped by ...
Securing the Cloud November 25, 2025 How CloudGuard WAF Lowers Risk and Total Cost of Ownership (TCO) Security teams must protect apps and APIs without drowning in rule maintenance or false-positive triage. ...
Mobile November 24, 2025 GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts ...
EMEA November 21, 2025 Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-Loss Products The global appetite for GLP-1 medications like Ozempic, Wegovy and Mounjaro have created something far ...
Security November 21, 2025 Cyber Insurance Won’t Save You from Bad Hygiene Why foundational failures still cost companies, even when they’re insured Cyber insurance is no longer ...
Artificial Intelligence November 20, 2025 The Black Friday Cyber Crime Economy: Surge in Fraudulent Domains and eCommerce Scams Key findings Malicious activity is rising, with 1 in 11 newly registered Black Friday themed ...
Securing the Cloud November 19, 2025 Check Point Launches Managed Rules for AWS Network Firewall Managing network security is a critically important and challenging task, especially in cloud environments. Scaling ...