Research March 9, 2026 China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions Key Findings Since the recent escalation in the Middle East, Check Point ... Read more
Infinity Global Services March 5, 2026 Introducing CPR Act: A Unified Approach for a Full‑Lifecycle Security Fragmented products and solutions sprawled across multiple environments create significant visibility gaps, which attackers look ...
Partners March 4, 2026 Powering Cyber Resilience Across APAC: Celebrating Check Point’s APAC FY25 Partner Award Winners Recognizing Excellence, Innovation, and Impact Across the Region Check Point Software Technologies recognized the top partners ...
Crypto March 4, 2026 The Whitelist Illusion – When Your Trusted List Becomes a Billion Dollar Attack Path Your whitelist is not a wall. For nation-state attackers, it’s a map, showing exactly who ...
Research March 3, 2026 Silver Dragon: China Nexus Cyber Espionage Group Targeting Governments in Asia and Europe Silver Dragon is a China nexus cyber espionage group targeting government ministries and public sector ...
Executive Insights March 2, 2026 How Threat Intelligence and Multi-Source Data Drive Smarter Vulnerability Prioritization The CVSS Blind Spot For years, CVSS scores have been the default metric for vulnerability ...
Research March 1, 2026 What Defenders Need to Know about Iran’s Cyber Capabilities With the current Iran crisis at its peak, cyber activity is a relevant part of the ...
Executive Insights February 26, 2026 National Cyber Resilience in the AI Era A Practical Q&A Guide for Leaders Navigating NIST, Zero Trust, and AI Governance Q1. Why ...
Research February 25, 2026 Check Point Researchers Expose Critical Claude Code Flaws Critical vulnerabilities, CVE-2025-59536 and CVE-2026-21852, in Anthropic’s Claude Code enabled remote code execution and API ...
Research February 18, 2026 Two Types of Threat Intelligence That Make Security Work The problem isn’t that we lack threat intelligence. It’s that we lack the right kind ...
Hybrid Mesh February 17, 2026 Check Point Named Leader in GigaOm Radar for Cloud Network Security For 3 Years in a Row – Protects 22 Cloud Vendors In today’s multi-cloud world, businesses deploy workloads across dozens of public and private clouds, each ...
Research February 16, 2026 Using AI for Covert Command-and-Control Channels Check Point Research identified a potential future attack technique in which AI assistants with web-browsing ...
Research February 16, 2026 The UK’s Cyber Threat Has Changed. Most Organizations Haven’t. For years, ransomware shaped how UK organizations thought about cyber risk. In 2025, that assumption ...
Email Security August 26, 2025 ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing
Research June 12, 2025 Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks