Check Point Software

  • Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads
    by rohann@checkpoint.com on December 12, 2025 at 12:00 pm

    As enterprises expand into Oracle Cloud Infrastructure (OCI), they need security that scales as dynamically as their workloads. Check Point CloudGuard Network Security now brings full auto-scaling support to OCI extending its industry-leading cloud security automation capabilities to yet another major platform. CloudGuard Network Security integrates natively with 20 public and private cloud vendors ensuring smooth interoperability and choice. This advanced integration provides customers the confidence and freedom to choose the right cloud for each workload or application without compromising on security or control. Auto-Scaling with Oracle Instance Pools With OCI Instance Pools, CloudGuard firewalls can now automatically expand or The post Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads appeared first on Check Point Blog.

  • Infinity Global Services’ Cyber Park World Championship Crowns Its First Global Winners
    by rohann@checkpoint.com on December 11, 2025 at 12:00 pm

    Check Point’s Infinity Global Services (IGS) recently concluded its first ever Cyber Park World Championship, a global competition designed to challenge and inspire the next generation of cyber defenders. In partnership with CheckMates, Check Point’s community of cyber security professionals, and Cympire, an advanced cyber training partner. The championship brought together hundreds of participants from across the globe to compete in realistic cyber ranges, showcase their technical mastery, and preform collaborate in high-pressure simulated environments. The Cyber Park platform, part of Check Point’s Infinity Global Services Training Programs, offers hands-on cyber simulations and training designed to help organizations upskill their The post Infinity Global Services’ Cyber Park World Championship Crowns Its First Global Winners appeared first on Check Point Blog.

  • Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks
    by rohann@checkpoint.com on December 10, 2025 at 12:00 pm

    In November 2025, global cyber activity continued its upward trend, with organizations experiencing an average of 2,003 cyber-attacks per week. This represents a 3% increase from October, and a 4% rise compared to November 2024. Check Point Research data shows that this steady escalation reflects a threat landscape shaped by intensified ransomware activity, expanded attack surfaces, and the growing exposure risks associated with generative AI tools inside organizations. Industry Insights: Education Under Sustained Pressure The education sector remained the most targeted industry worldwide, facing an average of 4,656 attacks per organization per week—a 7% year-over-year increase. Next in line were The post Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks appeared first on Check Point Blog.

  • 40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams
    by rohann@checkpoint.com on December 9, 2025 at 12:00 pm

    The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate, insurance, and everyday business operations, have become essential to how modern organizations move at speed. But that same convenience creates an opening for cyber criminals. Email security researchers at Check Point have recently uncovered a phishing campaign where attackers impersonate file-sharing and e-signature services to deliver finance-themed lures that look like legitimate notifications. In this incident, attackers sent over 40,000 The post 40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams appeared first on Check Point Blog.

  • Cyber Threats to the U.S.: What Policymakers Need to Know for 2026
    by rohann@checkpoint.com on December 8, 2025 at 9:00 am

    Cyber attacks against the United States are no longer isolated events or technical headaches. They are now powerful tools of national strategy used by foreign governments, criminal networks, and ideological groups. A new report explains how these attacks have changed from simple hacks into coordinated campaigns aimed at shaping global politics, weakening U.S. institutions, and putting pressure on American decision-makers. This blog highlights the key takeaways for leaders responsible for national security, public policy, and critical infrastructure resilience. Takeaway 1: Cyber Attacks Are Now Tools of Geopolitics Cyber operations have become a normal part of how countries compete with one The post Cyber Threats to the U.S.: What Policymakers Need to Know for 2026 appeared first on Check Point Blog.

  • What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF Customers Carried on with Their Day
    by bferrite on December 5, 2025 at 10:22 pm

     Note: Before we dive in, Check Point CloudGuard WAF customers were proactively protected and not affected by React2Shell. In early December 2025, the team behind React—the most widely used technology powering today’s websites and digital services—announced a critical security flaw in one of its new server features. Researchers call this bug React2Shell, and it’s rated CVSS 10.0 — the highest severity! It’s rated critical because it can let a stranger run code on your server without needing to log in or do anything. They only need to send a special request. No password. No account. No user interaction. Just a The post What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF Customers Carried on with Their Day appeared first on Check Point Blog.

  • The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back
    by rohann@checkpoint.com on December 5, 2025 at 12:00 pm

    When Senator Ben Ray Luján warned that the United States was facing “the largest telecommunications hack in our nation’s history,” it marked a turning point in how we understand national cyber risk. On December 4, 2024, the White House confirmed a sprawling cyber-espionage campaign targeting 80 global telecom providers across dozens of countries¹. A joint task force—the Operation Enduring Security Framework—was launched by the NSA, Pentagon, and CISA to contain the damage. The adversary behind it: a sophisticated nation-state threat actor Microsoft calls Salt Typhoon, also tracked as Ghost Emperor, FamousSparrow, Earth Estrie, UNC2286, and earlier as LightBasin / UNC1945 The post The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back appeared first on Check Point Blog.

  • Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid Mesh Cloud and On-Prem Firewalls
    by rohann@checkpoint.com on December 4, 2025 at 3:49 pm

    As organizations adopt AI tools and Model Context Protocol (MCP) servers to implement AI applications, security teams face mounting pressure to protect sensitive data, applications, and distributed environments. Enterprises are looking for security solutions to help them safely adopt AI, protect distributed environments and simplify Zero Trust across hybrid networks. We’re pleased to announce our latest Quantum Firewall Software release, R82.10 for CloudGuard Network and Quantum Force Firewalls. This new release uses a prevention-first approach by unifying management, reinforcing Zero Trust, and enabling secure, responsible AI adoption across both cloud and on-premises environments. Let’s take a closer look at several The post Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid Mesh Cloud and On-Prem Firewalls appeared first on Check Point Blog.

  • Check Point Named a Leader in the 2025 GartnerÂŽ Magic Quadrant™ for Email Security
    by rohann@checkpoint.com on December 3, 2025 at 3:30 pm

    We’re proud to announce that Gartner® has recognized Check Point as a Leader in the 2025 Magic Quadrant™ for Email Security (published December 2025). We believe that this independent evaluation from the industry’s most trusted research firm validates our commitment to delivering best-in-class email security that protects organizations from increasingly sophisticated threats while remaining easy to deploy and manage. The stakes have never been higher. According to Check Point Research’s 2025 Security Report, 68% of attacks start with email, and 61% of harmful files are sent via HTML attachments. Organizations need proven, reliable email security that can stop these threats The post Check Point Named a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security appeared first on Check Point Blog.

  • AI Has Become the New Enterprise Perimeter — and Gemini 3 Pro Just Proved It
    by rohann@checkpoint.com on November 26, 2025 at 12:00 pm

    When Google unveiled Gemini 3 on 18 November 2025, most headlines focused on its leaps in reasoning, multimodality, and performance. But executives should look past the model-to-model comparisons. Gemini 3’s real significance is structural. Part of a Broader Trend — Accelerated by Gemini 3 AI assistants have already begun moving inside enterprise workflows. Microsoft Copilot, for example, has embedded OpenAI models deeply into the Microsoft ecosystem for some time, enabling users to query documents from office.com, summarize inboxes, act on Teams content, and automate tasks across Office 365. Gemini 3 continues — and accelerates — this trend in Google’s environment.It The post AI Has Become the New Enterprise Perimeter — and Gemini 3 Pro Just Proved It appeared first on Check Point Blog.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.