16-07-2025 |
Quantum Spark 2500 Enhances SMB Cyber Security |
Cybersecurity |
Check Point's Quantum Spark 2500 series offers small and medium-sized businesses (SMBs) advanced AI-powered threat prevention, blocking 99.9% of cyber threats with ThreatCloud AI and R82 software. Integrated Wi-Fi 7, 5G, and SD-WAN ensure fast, reliable connectivity, while zero-touch provisioning simplifies management for Managed Service Providers (MSPs). The series supports scalable, enterprise-grade security within the Check Point Infinity Platform, reducing complexity for MSPs and SMBs alike. Explore the Quantum Spark 2500 series for robust protection and seamless operations. |
|
26-06-2025 |
Infinity Playblocks Enhances Enterprise-Wide Cybersecurity Automation |
Cybersecurity |
Check Point’s Infinity Playblocks revolutionizes cybersecurity by transforming a single threat detection into real-time, enterprise-wide prevention across email, endpoint, network, and cloud. Powered by GenAI, it offers over 100 prebuilt playbooks and seamless integration with third-party tools, eliminating silos and reducing response times. Organizations, like a German oil and gas company and a LATAM IT provider, leverage its intuitive automation to block threats instantly and streamline SOC operations. Learn how Playblocks strengthens security at checkpoint.com. |
|
26-06-2025 |
Check Point Harmony Endpoint Excels in 2025 Frost Radar |
Reports |
Check Point Harmony Endpoint earns strong performer status in Frost & Sullivan’s 2025 Endpoint Security Radar Report, recognized for its AI-powered threat correlation and consolidated workforce security. The report highlights its integration with Perimeter 81 SASE, enhancing hybrid work environments. With the endpoint security market projected to reach $22.3 billion by 2028, Harmony Endpoint’s automation and next-gen innovations like browser-based DLP set it apart. Explore the full Frost & Sullivan report to understand how Check Point simplifies and strengthens endpoint protection. |
|
24-06-2025 |
Check Point Exposes Risks in Autonomous Systems |
Insights |
Check Point Software Technologies highlights the illusion of control in AI-driven autonomous industrial systems, like smart grids and manufacturing lines. Their research reveals that increased automation introduces complex security risks, including AI confusion attacks and cascading failures. Check Point urges OT CISOs to implement explainable AI and human-in-the-loop controls to ensure safer operations. Visit checkpoint.com for expert insights on securing Industry 4.0 environments. |
|
20-06-2025 |
Third-Party Access Poses Major Cyber Risk for Manufacturers |
Showcase |
Check Point Software highlights that 20% of data breaches stem from third-party access, costing manufacturers an average of $4.46 million per incident and taking 26 days longer to identify. These breaches exploit interconnected systems like suppliers and remote engineers, often unmanaged, leading to halted production and exposed data. Check Point’s unified architecture offers real-time monitoring, restricted access, and instant revocation to secure IT and OT environments. Manufacturers are urged to prioritize visibility and control to mitigate these growing vulnerabilities. |
|
18-06-2025 |
Fake Minecraft Mods Deliver Malware to Players |
Showcase |
Check Point Research uncovered a sophisticated malware campaign targeting Minecraft players through fake mods on GitHub, distributed via the Stargazers Ghost Network. Disguised as popular mods like Oringo and Taunahi, the multistage attack deploys Java-based downloaders and stealers to harvest credentials, cryptocurrency wallets, and system data. With over 1,500 devices potentially compromised, gamers are urged to download mods only from trusted sources. Check Point’s Threat Emulation and Harmony Endpoint solutions offer protection against these threats. |
|
16-06-2025 |
Harmony Mobile Exposes RapiPlata as Malicious Loan App |
Showcase |
Check Point’s Harmony Mobile uncovered RapiPlata, a deceptive loan app with over 150,000 downloads, stealing sensitive data like SMS, contacts, and call logs. Targeting Colombian users, it employed harassing tactics and unauthorized data theft while posing as a legitimate financial service. Though removed from Google Play and Apple App Stores, it persists on misleading third-party sites. Protect your device with Harmony Mobile and download apps only from verified sources. |
|
06-06-2025 |
Check Point Urges Universal MFA to Bolster Cybersecurity |
Feature |
Check Point Software emphasizes multi-factor authentication (MFA) as essential for securing digital identities against rising credential theft. MFA, requiring multiple verification methods like authenticator apps or biometrics, significantly reduces breach risks by adding layers beyond passwords. Poorly implemented MFA can create user friction or security gaps, so seamless integration and ongoing education are critical. Learn how to strengthen your defenses with MFA at checkpoint.com. |
|
05-06-2025 |
Check Point’s CloudGuard WAF Redefines Web Security |
Reports |
Check Point’s CloudGuard WAF sets a new standard in web and API protection, as highlighted in Gartner’s 2025 Market Guide for WAAP. Its AI-powered, prevention-first approach delivers a 99.3% detection rate with near-zero false positives, safeguarding against zero-day threats. The platform offers seamless API lifecycle security and integrates with DevSecOps for agile development. Discover CloudGuard WAF’s capabilities at checkpoint.com. |
|
05-06-2025 |
Cloud Security Gaps Exposed in Check Point’s 2025 Report |
Reports |
Check Point’s 2025 Cloud Security Report reveals critical gaps as cloud adoption outpaces security measures. Surveying over 900 IT leaders, the report highlights a 65% breach rate, delayed threat detection, and reliance on outdated tools. Check Point’s CloudGuard platform offers AI-driven solutions to unify security and enhance visibility. Download the full report at https://blog.checkpoint.com/securing-the-cloud/6-key-insights-from-check-points-cloud-security-report-2025 to strengthen your cloud defenses. |
|
29-05-2025 |
Check Point’s Quantum Smart-1 Enhances AI-Driven Security Management |
Feature |
Check Point’s Quantum Smart-1 700/7000 Series Appliances deliver advanced security management with AI-powered tools, doubling gateway capacity and boosting log rates by up to 70%. These seventh-generation devices offer centralized policy management, real-time threat visibility, and seamless integration with over 250 third-party solutions, ensuring robust protection for hybrid enterprise networks. Features like AI Copilot and Policy Insights streamline operations, enhance zero-trust compliance, and accelerate threat response. |
|
27-05-2025 |
Check Point Acquires Veriti for Enhanced Threat Management |
Acquisition |
Check Point Software Technologies has acquired Veriti, a pioneer in preemptive exposure management, to strengthen its cybersecurity offerings. Veriti’s innovative platform automatically identifies and remediates risks across complex, multi-vendor environments, reducing patching time from weeks to minutes. By integrating with over 70 security vendors, it ensures real-time threat prevention without disrupting business operations. This acquisition enhances the Check Point Infinity Platform, delivering comprehensive risk management for enterprises. |
|
25-05-2025 |
Harmony SASE Bolsters Defenses with ThreatCloud AI |
Feature |
Check Point’s Harmony SASE leverages ThreatCloud AI to deliver real-time protection against advanced cyber threats, syncing intelligence across 100,000+ customers in seconds. ThreatCloud AI analyzes billions of daily inputs, achieving a 99.9% accuracy in blocking zero-day malware, as validated by Miercom. It offers automated responses and enhanced visibility, ensuring robust security for enterprise networks. Book a demo to see Harmony SASE in action. |
|
22-05-2025 |
Check Point Harmony Mobile Earns Top Spot in Miercom’s 2025 MTD Assessment |
Reports |
Check Point Harmony Mobile secured the Miercom Certified Secure Award in the 2025 Mobile Threat Defense Benchmark, outperforming competitors like Lookout and Microsoft with a 98.2% malware detection rate and 99% zero-day phishing prevention. Offering comprehensive protection across apps, networks, and DNS security, it ensures zero-impact deployment for mobile-first businesses. The report highlights its industry-leading defense against diverse cyber threats. Download the full findings at engage.checkpoint.com to explore its superior security capabilities. |
|
22-05-2025 |
Check Point Named Among America’s Best Cybersecurity Companies by Newsweek |
Company News |
Check Point Software Technologies Ltd. has been recognized by Newsweek and Statista as one of America’s Best Cybersecurity Companies for 2025. Celebrated for its AI-powered threat prevention and protection across cloud, network, and mobile for over 100,000 organizations, Check Point continues to lead in cybersecurity innovation. This accolade follows its inclusion in TIME’s World’s Best Companies and Forbes’ Best Employers lists. Read more at checkpoint.com and explore their Infinity Platform for advanced security solutions. |
|
19-05-2025 |
Check Point MCP Servers Boost AI-Driven Cybersecurity |
Feature |
Check Point’s new Model Context Protocol (MCP) servers enable seamless integration of AI models with cybersecurity infrastructure, allowing natural language queries for real-time policy and compliance insights. Available as an open-source release on GitHub, these servers enhance privacy and offer granular control over data access. Security teams can combine Check Point MCP with other tools for context-aware workflows, streamlining operations. Visit Check Point’s blog to explore how this service strengthens enterprise security with AI. |
|
17-05-2025 |
Check Point Secures Telecoms Against Rising Cyber Threats |
Insights |
Check Point Software Technologies highlights the critical need for robust cybersecurity in telecommunications, a sector facing a 94% surge in weekly cyber attacks in Q1 2025. With AI and 5G expanding vulnerabilities, Check Point’s advanced threat prevention tools, like GenAI Protect, empower telecoms to safeguard critical infrastructure. The company emphasizes resilience through AI-driven solutions and secure-by-design practices. Explore Check Point’s solutions to strengthen telecom security at checkpoint.com. |
|
16-05-2025 |
Check Point Exposes Phishing Scam Targeting Thousands |
Cybersecurity |
Check Point Software Technologies uncovered a phishing campaign sending 32,000 fake email quarantine notifications to 6,358 customers, primarily in North America. These emails trick users into sharing login credentials via deceptive links. Check Point’s email security solutions help organizations detect and block such threats. Learn how to protect your inbox at checkpoint.com. |
|
14-05-2025 |
Check Point Warns of Xanthorox AI’s Role in Democratizing Cybercrime |
Cybersecurity |
Check Point’s Sergey Shykevich highlights Xanthorox AI, a platform enabling anyone to launch phishing, malware, and deepfake attacks without expertise, lowering the cybercrime barrier. Available via Telegram and Discord, it amplifies scams in a multibillion-dollar industry. Check Point urges evolving AI-driven defenses to counter such threats. Stay vigilant and explore Check Point’s cybersecurity solutions. |
|
14-05-2025 |
Check Point Urges AI-Driven Security to Combat Banks Technical Debt |
Insights |
Check Point’s Jayant Dave highlights banks vulnerability to outages, like Barclays’ three-day mainframe failure costing £7.5mn, due to complex legacy systems. With 33 outages at Barclays and 32 at HSBC and Santander since 2023, technical debt remains a critical issue. Check Point advocates AI-powered security and hybrid cloud solutions to enhance visibility and resilience. Explore these insights in the Financial Times. |
|
13-05-2025 |
Phishing Scams Target Healthcare Employees, Expose Millions of Records |
Cybersecurity |
Check Point Software’s Harmony Email & Collaboration blocked over 7,000 phishing emails in 2024, targeting healthcare employees with fake clinic scams, compromising 276 million patient records. Cybercriminals use real doctor images and impersonate providers like Zocdoc to steal sensitive data. Check Point’s SmartPhish solution helps organizations prevent such attacks through advanced email filtering. Protect your workforce by exploring actionable cybersecurity steps today. |
|
09-05-2025 |
FakeUpdates Leads Malware Surge with Stealthy Multi-Stage Attacks |
Cybersecurity |
FakeUpdates, a notorious downloader malware, impacted 6% of global organizations in April 2025, topping Check Point’s malware rankings. Sophisticated campaigns using phishing emails and layered tactics deploy commodity malware like AgentTesla and Remcos, evading detection. The education sector remains the most targeted, with ransomware groups like Akira and SatanLock intensifying threats. Strengthen your defenses with Check Point’s Threat Emulation and Harmony Endpoint solutions. |
|
08-05-2025 |
Check Point Named Best Threat Prevention Vendor at GISEC 2025 |
Awards & Honours |
Check Point Software Technologies has been honored as the Best Threat Prevention Vendor of the Year at GISEC GLOBAL 2025 by the Cyber Strategist Awards. Recognized for its AI-powered ThreatCloud AI, Check Point excels in proactive cyber defense, stopping advanced threats across networks, cloud, and endpoints. This award highlights their leadership in delivering innovative cybersecurity solutions. |
|
08-05-2025 |
Check Point Named Cloud Security Innovator of the Year by ITP.NET at GISEC |
Awards & Honours |
Recognized for leading cloud security solutions and cloud native security innovation, Check Point’s CloudGuard platform tackles misconfigurations, data breaches, and AI-driven attacks with unmatched scalability. Learn how CloudGuard empowers organizations to protect hybrid and multi-cloud environments. Discover the award-winning service and secure your infrastructure today. |
|
06-05-2025 |
Check Point Uncovers Phishing Scam Targeting Microsoft Dynamics 365 Customer Voice |
Cybersecurity |
Check Point researchers have exposed a sophisticated phishing campaign exploiting Microsoft Dynamics 365 Customer Voice, affecting over 350 organizations and targeting more than one million mailboxes with over 3,370 fraudulent emails. Cybercriminals use compromised accounts to send deceptive emails with fake links mimicking legitimate Microsoft services, aiming to steal user credentials. The campaign, primarily targeting American organizations, employs tactics like Captcha tests to appear authentic, leading victims to phishing sites disguised as Microsoft login pages. Businesses are urged to enhance email security and educate employees to verify suspicious emails to prevent data breaches. |
|