Hybrid Mesh February 17, 2026 Check Point Named Leader in GigaOm Radar for Cloud Network Security For 3 Years in a Row – Protects 22 Cloud Vendors In today’s multi-cloud world, businesses deploy workloads across dozens of public and ... Read more
Research February 16, 2026 Using AI for Covert Command-and-Control Channels Check Point Research identified a potential future attack technique in which AI assistants with web-browsing ...
Research February 16, 2026 The UK’s Cyber Threat Has Changed. Most Organizations Haven’t. For years, ransomware shaped how UK organizations thought about cyber risk. In 2025, that assumption ...
Securing the Network February 13, 2026 Unzipping the Threat: How to Block Malware Hidden in Password-Protected ZIP Files As malware evades detection by hiding inside password-protect zip files, new Threat Emulation capabilities enable ...
Innovation February 12, 2026 Securing Your AI Transformation: How Check Point Is Helping Security Teams Keep Control in an AI-First World AI is moving faster than most security teams can keep up with. As AI reshapes ...
Research February 11, 2026 Love Is in the Air — and So Are Scammers: Valentine’s Day 2026 Threats to Watch For As Valentine’s Day 2026 approaches, people are turning to online shopping, digital dating, and last‑minute ...
Securing the Cloud February 11, 2026 WAF Security Test Results 2026: Why Prevention-First Matters More Than Ever Introduction: Security Testing Must Evolve with Attacks As cyber threats rise, web applications, GenAI workloads, ...
Research February 10, 2026 Global Cyber Attacks Rise in January 2026 Amid Increasing Ransomware Activity and Expanding GenAI Risks Global Attack Volumes Climb Worldwide In January 2026, the global volume of cyber attacks continued ...
Infinity Global Services February 9, 2026 From Solo to Squad: The Evolution of Cyber Security Training in the AI Era Generative AI is transforming cyber defense. Technical expertise remains critical, but AI-driven threats demand more ...
Email Security February 5, 2026 SaaS Abuse at Scale: Phone-Based Scam Campaign Leveraging Trusted Platforms Overview This report documents a large-scale phishing campaign in which attackers abused legitimate software-as-a-service (SaaS) ...
Research February 4, 2026 Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia Executive Summary Check Point Research uncovered highly targeted cyber espionage campaigns aimed at government and ...
Partners February 4, 2026 Celebrating the 2025 Check Point Software EMEA Partner Award Winners — Recognizing Excellence Across the Region Check Point® Software Technologies today announced the 2025 Check Point Software Technologies EMEA Partner Award ...
Research February 3, 2026 The Three Most Disruptive Cyber Trends Impacting the Financial Industry Today The financial sector experienced an unprecedented rise in cyber incidents in 2025, with attacks more ...
Email Security August 26, 2025 ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing
Research June 12, 2025 Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks