Check Point Blog Blog
- Check Point Partners with HackShield to Empower the Next Generation of Cyber Heroesby lizwu@checkpoint.com on October 8, 2025 at 12:50 pm
We couldn’t be more excited to announce our new partnership with HackShield, the award-winning cyber education platform for children. This collaboration will bring essential cyber awareness education to kids aged 8 to 12 through HackShield’s gamified learning experience. Our goal: to expand access to high-quality, age-appropriate cyber education and empower young people to become resilient “Cyber Agents” in their schools, families, and communities. Not only does this new partnership align with our values and mission, it will help provide the next generation with a foundation in cyber security knowledge that will last a lifetime. A Critical Need for Early Cyber The post Check Point Partners with HackShield to Empower the Next Generation of Cyber Heroes appeared first on Check Point Blog.
- Zero Trust Access Made Simple for Contractorsby rohann@checkpoint.com on October 6, 2025 at 12:50 pm
Third-party contractors are critical for many organizations. They bring specialized skills, help scale projects quickly, and support both short-term initiatives and long-term business needs. Yet contractors also introduce unique security and operational challenges. Whether it’s a quick project or a multi-year collaboration, enterprise IT teams need a secure way to provide access to corporate resources without driving up costs. A secure enterprise browser offers a practical way to achieve these goals, offering a cost-efficient Zero Trust solution that makes managing contractor access both easier and safer. The Dynamic Nature of Contractor Relationships Short-Term Engagements Imagine a marketing consultant hired for The post Zero Trust Access Made Simple for Contractors appeared first on Check Point Blog.
- Rhadamanthys 0.9.2: A Stealer That Keeps Evolvingby rohann@checkpoint.com on October 3, 2025 at 1:00 pm
Rhadamanthys 0.9.2 released: New version of the popular information stealer introduces changes that break existing tools and add fresh evasion techniques. Professionalization continues: Operators have rebranded as RHAD Security / Mythical Origin Labs and launched a polished website with multiple products on offer. Key technical shifts: New PNG-based payload delivery, updated encryption, smarter sandbox checks, configurable process injections, and added targeting of Ledger Live crypto wallets. Why it matters: Older detection methods may miss this variant, making it a persistent and growing threat to enterprises and individuals. Defender impact: CPR provides updated signatures, research insights, and open-source tools so defenders The post Rhadamanthys 0.9.2: A Stealer That Keeps Evolving appeared first on Check Point Blog.
- Amazon Prime Day 2025: The Dark Side of Dealsby rohann@checkpoint.com on October 2, 2025 at 1:00 pm
Amazon’s Fall Prime Day not only kicks off the holiday shopping season with deals too good to ignore, it also creates one of the biggest opportunities of the year for cyber criminals. As millions of consumers flock online for deals, attackers launch phishing scams, fake domains, and malicious emails designed to steal Amazon credentials and payment information. Check Point Research has uncovered a surge in Amazon Prime Day scams this September, showing how attackers continue to weaponize urgency and trust. Amazon Prime Day Scams 2025: Malicious Domains on the Rise During the first three weeks of September 2025, a total The post Amazon Prime Day 2025: The Dark Side of Deals appeared first on Check Point Blog.
- 5 Essential Cyber Security Tips for Cyber Security Awareness Monthby rohann@checkpoint.com on October 1, 2025 at 1:00 pm
October marks Cybersecurity Awareness Month, an annual initiative designed to help everyone stay safer and more secure online. In today’s digital landscape, cyber threats are constantly evolving, targeting individuals and organizations alike with increasingly sophisticated tactics. Whether you’re scrolling social media, checking emails, or downloading apps, cyber criminals are always looking for new ways to exploit vulnerabilities. The threat landscape is as broad as your web presence. Organizations must contend with AI-driven attacks that are growing in scale and sophistication day by day. It’s no longer enough to react – cyber security strategies must be prevention-first. That’s why raising awareness The post 5 Essential Cyber Security Tips for Cyber Security Awareness Month appeared first on Check Point Blog.
- The Rising Cyber Threat to Manufacturing: A Call to Action for Executivesby rohann@checkpoint.com on September 30, 2025 at 1:00 pm
Key Insights Manufacturing faces an average of 1,585 weekly attacks per organization, a 30% year-over-year increase. Ransomware remains the dominant threat, with incidents costing hundreds of millions in losses and in some cases forcing insolvency. Supply chain connectivity magnifies risk. One weak supplier can cause ripple effects across entire industries. State-backed and hacktivist groups are targeting manufacturing for both disruption and intellectual property theft, making security a matter of national competition. Introduction Manufacturing continues to be one of the most attractive targets for cyber attackers, with attacks only increasing. Once overlooked in favor of data-rich industries, today’s factories are caught The post The Rising Cyber Threat to Manufacturing: A Call to Action for Executives appeared first on Check Point Blog.
- How to Defend Against Credential Attacks with a Hybrid Mesh Architectureby rohann@checkpoint.com on September 26, 2025 at 1:00 pm
Introduction Credential-based attacks have reached epidemic levels. The 2025 Verizon Data Breach Investigations Report (DBIR) underscores the trend: 22% of breaches now start with compromised credentials, while Check Point External Risk Management found that leaked credential volumes surged 160% year-over-year. Attackers increasingly prefer to “log in” rather than “hack in,” leveraging a flood of exposed passwords, API keys, and tokens circulating from breaches and dark web leaks. For CISOs, the message is clear: identity is now the perimeter, and defenses must reflect that reality with coherence and context. Key takeaway: Credential threats — from OAuth abuse, to API key exposure The post How to Defend Against Credential Attacks with a Hybrid Mesh Architecture appeared first on Check Point Blog.
- Quantum-Safe Cyber Security: Current Capabilities and the Road Aheadby rohann@checkpoint.com on September 25, 2025 at 1:00 pm
Quantum computing is moving from theory to reality. While largescale quantum computers are not yet available, their future impact on cyber security is clear: algorithms like RSA, Diffie–Hellman, and Elliptic Curve Diffie-Hellman which secure VPNs, TLS, and digital identities, will eventually be broken by quantum algorithms. This creates an immediate risk known as “harvest now, decrypt later”, in which adversaries can capture encrypted traffic today and decrypt it when quantum resources become available. To address this, the U.S. National Institute of Standards and Technology (NIST) finalized the first post-quantum cryptography (PQC) standards in 2024: FIPS 203: ML-KEM for key establishment FIPS The post Quantum-Safe Cyber Security: Current Capabilities and the Road Ahead appeared first on Check Point Blog.
- Playing Offside: How Threat Actors Are Warming Up for FIFA 2026by rohann@checkpoint.com on September 25, 2025 at 1:00 pm
Introduction Every four years, the World Cup captures the attention of billions. With that attention comes opportunity – not only for sponsors, broadcasters, and legitimate merchants, but also for adversaries who see in this spectacle a marketplace of deception. As the 2026 FIFA World Cup approaches, the outlines of this parallel economy are already visible. In the span of two months since 1 August 2025, more than 4,300 newly registered domains bearing the language of FIFA, the World Cup, or its host cities have surfaced across the internet. On the surface, many of these domains appear innocuous. Yet, when examined The post Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 appeared first on Check Point Blog.
- Self-Driving IT Security: The Road Aheadby rohann@checkpoint.com on September 23, 2025 at 1:00 pm
Introduction: From Driver’s Seat to Autopilot For more than a decade, the world has talked about self-driving cars. At first, the idea felt futuristic — even far-fetched. Yet today, robotaxis are quietly navigating city streets, proving that autonomy has arrived, even if most people barely notice. IT security is on a similar journey. For years, defenders have relied on automation: writing playbooks, configuring policies, and creating scripts to respond to threats. These tools helped, but they had limits. Automation can only do what we tell it to do, and attackers don’t play by our rules. Now, security is entering a The post Self-Driving IT Security: The Road Ahead appeared first on Check Point Blog.