Research November 13, 2025 The State of Ransomware in Q3 2025 The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law ...
Artificial Intelligence November 12, 2025 Payroll Pirates: One Network, Hundreds of Targets Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since ...
Artificial Intelligence November 11, 2025 Global Cyber Attacks Surge in October 2025 Amid Explosive Ransomware Growth and Rising GenAI Threats Global Overview In October 2025, the global volume of cyber attacks continued its upward trajectory. ...
Artificial Intelligence November 10, 2025 New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond With more than 5.4 billion users worldwide (according to Statista), Facebook remains the world’s most ...
Executive Insights November 4, 2025 Inside the Rise of AI-Powered Pharmaceutical Scams Introduction Over the past few months, we identified an emerging online threat that combines fraud, ...
Research November 4, 2025 Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered Trust alone isn’t a security strategy. That’s the key lesson from new research by Check ...
Artificial Intelligence November 3, 2025 Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis Key Highlights XLoader 8.0 malware is one of the most evasive and persistent information stealers ...
Research October 30, 2025 Hezi Rash: Rising Kurdish Hacktivist Group Targets Global Sites A new ideologically-motivated threat actor has emerged and growing technical capabilities: Hezi Rash. This Kurdish ...
Research October 23, 2025 LockBit Returns — and It Already Has Victims Key Takeaways LockBit is back. After being disrupted in early 2024, the ransomware group has ...
Research October 23, 2025 The YouTube Ghost Network: How Check Point Research Helped Take Down 3,000 Malicious Videos Spreading Malware Check Point Research uncovered the YouTube Ghost Network, a large-scale malware distribution operation that used ...