Research November 25, 2025 Shai-Hulud 2.0: Inside The Second Coming, the Most Aggressive NPM Supply Chain Attack of 2025 How attackers infiltrated the npm ecosystem, what Check Point researchers uncovered, and how organizations can ...
Harmony November 24, 2025 GhostAd: Hidden Google Play Adware Drains Devices and Disrupts Millions of Users Check Point researchers uncover a large-scale Android adware campaign that silently drains resources and disrupts ...
Research November 21, 2025 Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-Loss Products The global appetite for GLP-1 medications like Ozempic, Wegovy and Mounjaro have created something far ...
Artificial Intelligence November 20, 2025 The Black Friday Cyber Crime Economy: Surge in Fraudulent Domains and eCommerce Scams Key findings Malicious activity is rising, with 1 in 11 newly registered Black Friday themed ...
Research November 13, 2025 The State of Ransomware in Q3 2025 The ransomware landscape in Q3 2025 has reached a critical inflection point. Despite multiple law ...
Artificial Intelligence November 12, 2025 Payroll Pirates: One Network, Hundreds of Targets Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since ...
Artificial Intelligence November 11, 2025 Global Cyber Attacks Surge in October 2025 Amid Explosive Ransomware Growth and Rising GenAI Threats Global Overview In October 2025, the global volume of cyber attacks continued its upward trajectory. ...
Artificial Intelligence November 10, 2025 New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond With more than 5.4 billion users worldwide (according to Statista), Facebook remains the world’s most ...
Executive Insights November 4, 2025 Inside the Rise of AI-Powered Pharmaceutical Scams Introduction Over the past few months, we identified an emerging online threat that combines fraud, ...
Research November 4, 2025 Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered Trust alone isn’t a security strategy. That’s the key lesson from new research by Check ...