Research July 3, 2025 Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals Ahead of this year’s Amazon Prime Day 2025 on July 8th, shoppers ... Read more
Harmony SASE July 2, 2025 From VPN to SASE: Enabling Hybrid Work Beyond Legacy Access It’s 8 AM EST and your VPN is already at 85% capacity. New York comes ...
Infinity Global Services July 1, 2025 Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation In today’s evolving threat landscape, proactive security measures are more critical than ever. Penetration Testing ...
Executive Insights June 30, 2025 BEYOND DEFENSE: Hong Kong’s New Era of Financial Cyber Resilience Hong Kong, a key international financial hub, is confronting increasingly sophisticated cyber threats that demand ...
Securing the Network June 27, 2025 World SMB Day: Eight Network Tech Essentials Every Small Business Needs Small and medium-sized businesses (SMBs) are the backbone of the global economy. And to be ...
Security June 26, 2025 Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks Modern cyber attacks move faster than ever before. While your security team is analyzing one ...
Infinity Global Services June 26, 2025 The AI Arms Race: When Attackers Leverage Cutting-Edge Tech For too long, the narrative around AI in cyber security has focused on its defensive ...
Harmony June 25, 2025 Frost & Sullivan Report Validates Value of Consolidated Security The endpoint security landscape is evolving faster than many security teams can keep up. While ...
Artificial Intelligence June 25, 2025 AI Evasion: The Next Frontier of Malware Techniques Check Point Research identifies the first documented case of malware embedding prompt injection to evade ...
Security June 25, 2025 Educated Manticore Reemerges: Iranian Spear-Phishing Campaign Targeting High-Profile Figures Amid growing warnings from agencies like the FBI and DHS about Iranian cyber activity, Check ...
Harmony June 24, 2025 PDFguard: AI Engine Against Growing Threats in PDFs In recent years, PDFs emerged as a primary vector for attack chains, with threat actors ...
Securing the Network June 23, 2025 Defeating PumaBot: How Check Point Quantum IoT Protect Nano Agent Shields Surveillance Devices The threat at a glance Darktrace researchers have identified PumaBot, a Go-based Linux botnet that ...
Artificial Intelligence June 23, 2025 The illusion of control: Can we ever fully secure autonomous industrial systems? In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven decision-making into ...
Research June 12, 2025 Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks
Innovation April 21, 2025 Check Point Named a Leader and the Outperformer in the GigaOm Radar for Enterprise Firewalls 2025
Company and Culture March 17, 2025 Check Point Named Gold Winner for Cloud Security in 2025 Globee Cybersecurity Awards
Harmony July 16, 2024 Check Point Recognized as a Leader in Forrester Wave for Mobile Threat Defense Solutions