Research February 3, 2026 The Three Most Disruptive Cyber Trends Impacting the Financial Industry Today The financial sector experienced an unprecedented rise in cyber incidents in 2025, with attacks more ...
Research January 28, 2026 The Trends Defining Cyber Security in 2026: Cyber Security Report 2026 Security programs are being asked to defend increasingly complex environments against cyber attacks that are faster, more ...
Research January 22, 2026 AI-Powered North Korean Konni Malware Targets Developers Check Point Research is tracking an active phishing campaign involving KONNI, a North Korea-affiliated threat ...
Research January 19, 2026 VoidLink Signals the Start of a New Era in AI-Generated Malware Check Point Research has identified VoidLink, one of the first known examples of advanced malware ...
Research January 15, 2026 Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025 In Q4 2025, Microsoft once again ranked as the most impersonated brand in phishing attacks, ...
Research January 15, 2026 Patch Now: Active Exploitation Underway for Critical HPE OneView Vulnerability Executive Summary Check Point Research identified active, large-scale exploitation of CVE-2025-37164, a critical remote code ...
Research January 13, 2026 Latin America Sees Sharpest Rise in Cyber Attacks in December 2025 as Ransomware Activity Accelerates In December 2025, organizations experienced an average of 2,027 cyber attacks per organization per week. ...
Research January 13, 2026 VoidLink: The Cloud-Native Malware Framework Weaponizing Linux Infrastructure Key Points: VoidLink is a cloud-native Linux malware framework built to maintain long-term, stealthy access ...
Mobile January 8, 2026 The Truman Show Scam: Trapped in an AI-Generated Reality Executive Summary The OPCOPRO “Truman Show” operation is a fully synthetic, AI‑powered investment scam that ...
Email Security December 22, 2025 Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection This report describes a phishing campaign in which attackers impersonate legitimate Google generated messages by ...