Research February 4, 2026 Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia Executive Summary Check Point Research uncovered highly targeted cyber espionage campaigns aimed ... Read more
Partners February 4, 2026 Celebrating the 2025 Check Point Software EMEA Partner Award Winners — Recognizing Excellence Across the Region Check Point® Software Technologies today announced the 2025 Check Point Software Technologies EMEA Partner Award ...
Research February 3, 2026 The Three Most Disruptive Cyber Trends Impacting the Financial Industry Today The financial sector experienced an unprecedented rise in cyber incidents in 2025, with attacks more ...
Partners January 29, 2026 Celebrating Check Point’s 2025 Americas Partner Award Winners At Check Point, our partners are more than collaborators. They are the driving force behind ...
Research January 28, 2026 The Trends Defining Cyber Security in 2026: Cyber Security Report 2026 Security programs are being asked to defend increasingly complex environments against cyber attacks that are faster, more ...
Infinity Global Services January 27, 2026 Closing the Cyber Security Skills Gap: Check Point Partners with CompTIA The cyber security industry faces a critical challenge: a growing skills gap that leaves organizations ...
Company and Culture January 23, 2026 Building Cyber Readiness Early: Why Youth Education Is a Security Necessity Cyber security is often framed as a problem for enterprises, governments, and seasoned professionals. But ...
Research January 22, 2026 AI-Powered North Korean Konni Malware Targets Developers Check Point Research is tracking an active phishing campaign involving KONNI, a North Korea-affiliated threat ...
Email Security January 22, 2026 Attackers Continue to Target Trusted Collaboration Platforms: 12,000+ Emails Target Teams Users Overview This report describes a phishing campaign in which attackers abuse Microsoft Teams functionality to ...
Artificial Intelligence January 21, 2026 Why Exposure Management Is Becoming a Security Imperative Of course, organizations see risk. It’s just that they struggle to turn insight into timely, ...
Research January 19, 2026 VoidLink Signals the Start of a New Era in AI-Generated Malware Check Point Research has identified VoidLink, one of the first known examples of advanced malware ...
Research January 15, 2026 Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025 In Q4 2025, Microsoft once again ranked as the most impersonated brand in phishing attacks, ...
Research January 15, 2026 Patch Now: Active Exploitation Underway for Critical HPE OneView Vulnerability Executive Summary Check Point Research identified active, large-scale exploitation of CVE-2025-37164, a critical remote code ...
Email Security August 26, 2025 ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing
Research June 12, 2025 Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks
Innovation April 21, 2025 Check Point Named a Leader and the Outperformer in the GigaOm Radar for Enterprise Firewalls 2025