Check Point Blog Blog
- Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloadsby rohann@checkpoint.com on December 12, 2025 at 12:00 pm
As enterprises expand into Oracle Cloud Infrastructure (OCI), they need security that scales as dynamically as their workloads. Check Point CloudGuard Network Security now brings full auto-scaling support to OCI extending its industry-leading cloud security automation capabilities to yet another major platform. CloudGuard Network Security integrates natively with 20 public and private cloud vendors ensuring smooth interoperability and choice. This advanced integration provides customers the confidence and freedom to choose the right cloud for each workload or application without compromising on security or control. Auto-Scaling with Oracle Instance Pools With OCI Instance Pools, CloudGuard firewalls can now automatically expand or The post Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads appeared first on Check Point Blog.
- Infinity Global Servicesâ Cyber Park World Championship Crowns Its First Global Winnersby rohann@checkpoint.com on December 11, 2025 at 12:00 pm
Check Pointâs Infinity Global Services (IGS) recently concluded its first ever Cyber Park World Championship, a global competition designed to challenge and inspire the next generation of cyber defenders. In partnership with CheckMates, Check Pointâs community of cyber security professionals, and Cympire, an advanced cyber training partner. The championship brought together hundreds of participants from across the globe to compete in realistic cyber ranges, showcase their technical mastery, and preform collaborate in high-pressure simulated environments. The Cyber Park platform, part of Check Pointâs Infinity Global Services Training Programs, offers hands-on cyber simulations and training designed to help organizations upskill their The post Infinity Global Servicesâ Cyber Park World Championship Crowns Its First Global Winners appeared first on Check Point Blog.
- Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risksby rohann@checkpoint.com on December 10, 2025 at 12:00 pm
In November 2025, global cyber activity continued its upward trend, with organizations experiencing an average of 2,003 cyber-attacks per week. This represents a 3% increase from October, and a 4% rise compared to November 2024. Check Point Research data shows that this steady escalation reflects a threat landscape shaped by intensified ransomware activity, expanded attack surfaces, and the growing exposure risks associated with generative AI tools inside organizations. Industry Insights: Education Under Sustained Pressure The education sector remained the most targeted industry worldwide, facing an average of 4,656 attacks per organization per weekâa 7% year-over-year increase. Next in line were The post Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks appeared first on Check Point Blog.
- 40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scamsby rohann@checkpoint.com on December 9, 2025 at 12:00 pm
The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate, insurance, and everyday business operations, have become essential to how modern organizations move at speed. But that same convenience creates an opening for cyber criminals. Email security researchers at Check Point have recently uncovered a phishing campaign where attackers impersonate file-sharing and e-signature services to deliver finance-themed lures that look like legitimate notifications. In this incident, attackers sent over 40,000 The post 40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams appeared first on Check Point Blog.
- Cyber Threats to the U.S.: What Policymakers Need to Know for 2026by rohann@checkpoint.com on December 8, 2025 at 9:00 am
Cyber attacks against the United States are no longer isolated events or technical headaches. They are now powerful tools of national strategy used by foreign governments, criminal networks, and ideological groups. A new report explains how these attacks have changed from simple hacks into coordinated campaigns aimed at shaping global politics, weakening U.S. institutions, and putting pressure on American decision-makers. This blog highlights the key takeaways for leaders responsible for national security, public policy, and critical infrastructure resilience. Takeaway 1: Cyber Attacks Are Now Tools of Geopolitics Cyber operations have become a normal part of how countries compete with one The post Cyber Threats to the U.S.: What Policymakers Need to Know for 2026 appeared first on Check Point Blog.
- What is âReact2Shellâ (CVE-2025-55182) â in Plain English â and Why Check Point CloudGuard WAF Customers Carried on with Their Dayby bferrite on December 5, 2025 at 10:22 pm
 Note: Before we dive in, Check Point CloudGuard WAF customers were proactively protected and not affected by React2Shell. In early December 2025, the team behind Reactâthe most widely used technology powering todayâs websites and digital servicesâannounced a critical security flaw in one of its new server features. Researchers call this bug React2Shell, and itâs rated CVSS 10.0 â the highest severity! Itâs rated critical because it can let a stranger run code on your server without needing to log in or do anything. They only need to send a special request. No password. No account. No user interaction. Just a The post What is âReact2Shellâ (CVE-2025-55182) â in Plain English â and Why Check Point CloudGuard WAF Customers Carried on with Their Day appeared first on Check Point Blog.
- The Largest Telecommunications Attack in U.S. History: What Really HappenedâAnd How We Fight Backby rohann@checkpoint.com on December 5, 2025 at 12:00 pm
When Senator Ben Ray LujĂĄn warned that the United States was facing âthe largest telecommunications hack in our nationâs history,â it marked a turning point in how we understand national cyber risk. On December 4, 2024, the White House confirmed a sprawling cyber-espionage campaign targeting 80 global telecom providers across dozens of countriesš. A joint task forceâthe Operation Enduring Security Frameworkâwas launched by the NSA, Pentagon, and CISA to contain the damage. The adversary behind it: a sophisticated nation-state threat actor Microsoft calls Salt Typhoon, also tracked as Ghost Emperor, FamousSparrow, Earth Estrie, UNC2286, and earlier as LightBasin / UNC1945 The post The Largest Telecommunications Attack in U.S. History: What Really HappenedâAnd How We Fight Back appeared first on Check Point Blog.
- Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid Mesh Cloud and On-Prem Firewallsby rohann@checkpoint.com on December 4, 2025 at 3:49 pm
As organizations adopt AI tools and Model Context Protocol (MCP) servers to implement AI applications, security teams face mounting pressure to protect sensitive data, applications, and distributed environments. Enterprises are looking for security solutions to help them safely adopt AI, protect distributed environments and simplify Zero Trust across hybrid networks. Weâre pleased to announce our latest Quantum Firewall Software release, R82.10 for CloudGuard Network and Quantum Force Firewalls. This new release uses a prevention-first approach by unifying management, reinforcing Zero Trust, and enabling secure, responsible AI adoption across both cloud and on-premises environments. Letâs take a closer look at several The post Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid Mesh Cloud and On-Prem Firewalls appeared first on Check Point Blog.
- Check Point Named a Leader in the 2025 GartnerŽ Magic Quadrant⢠for Email Securityby rohann@checkpoint.com on December 3, 2025 at 3:30 pm
Weâre proud to announce that GartnerÂŽ has recognized Check Point as a Leader in the 2025 Magic Quadrant⢠for Email Security (published December 2025). We believe that this independent evaluation from the industryâs most trusted research firm validates our commitment to delivering best-in-class email security that protects organizations from increasingly sophisticated threats while remaining easy to deploy and manage. The stakes have never been higher. According to Check Point Researchâs 2025 Security Report, 68% of attacks start with email, and 61% of harmful files are sent via HTML attachments. Organizations need proven, reliable email security that can stop these threats The post Check Point Named a Leader in the 2025 GartnerÂŽ Magic Quadrant⢠for Email Security appeared first on Check Point Blog.
- AI Has Become the New Enterprise Perimeter â and Gemini 3 Pro Just Proved Itby rohann@checkpoint.com on November 26, 2025 at 12:00 pm
When Google unveiled Gemini 3 on 18 November 2025, most headlines focused on its leaps in reasoning, multimodality, and performance. But executives should look past the model-to-model comparisons. Gemini 3âs real significance is structural. Part of a Broader Trend â Accelerated by Gemini 3 AI assistants have already begun moving inside enterprise workflows. Microsoft Copilot, for example, has embedded OpenAI models deeply into the Microsoft ecosystem for some time, enabling users to query documents from office.com, summarize inboxes, act on Teams content, and automate tasks across Office 365. Gemini 3 continues â and accelerates â this trend in Googleâs environment.It The post AI Has Become the New Enterprise Perimeter â and Gemini 3 Pro Just Proved It appeared first on Check Point Blog.


















