News

Check Point Blog
blog. checkpoint. com > research > march-2026-cyber-threat-landscape-shows-no-relief-as-ransomware-rebounds-and-genai-risks-intensify

March 2026 Cyber Threat Report: Ransomware & Gen AI Risk

11+ hour, 23+ min ago  (1047+ words) March 2026 cyber threat update: attacks dip to 1, 995/week, ransomware rebounds, and Gen AI data leakage risk rises'plus key sector and regional trends. Global Attack Volumes Begin to Moderate In March 2026, global cyber attack activity showed early signs of moderation while…...

Check Point Blog
blog. checkpoint. com > infinity-global-services > ps-private-training-turning-cyber-complexity-into-operational-control

Operational Capability as the Key to Cyber Resilience

2+ day, 4+ hour ago  (778+ words) Systemic cyber risk is rising as complexity grows. Check Point PS Private Training builds real-world operational capability to close execution gaps and boost resilience. The World Economic Forum's Global Cybersecurity Outlook 2025 concurred that cyber risk is increasingly driven by operational…...

Check Point Blog
blog. checkpoint. com > research > tax-season-2026-how-cyber-criminals-are-preparing-their-attacks-months-in-advance

Tax Season 2026: Inside Early'Stage Cyber Crime Campaigns

1+ week, 50+ min ago  (412+ words) Tax season remains one of the most attractive periods of the year for cyber criminals. As individuals and organizations exchange sensitive financial and identity data online, attackers take advantage of increased tax'related activity to launch phishing campaigns, fraudulent websites, and…...

Check Point Blog
blog. checkpoint. com > artificial-intelligence > claude-mythos-wake-up-call-what-ai-vulnerability-discovery-means-for-cyber-defense > amp

Claude Mythos Signals a New Era of AI'Driven Cyber Attacks

1+ week, 20+ hour ago  (329+ words) For security leaders, this development is both a warning and a call to action. It crystallizes a trend we've been closely monitoring and preparing for: the democratization and industrialization of cyber attacks. Claude Mythos is the early signal of two…...

Check Point Blog
blog. checkpoint. com > hybrid-mesh > uncovering-roi-of-a-hybrid-mesh-architecture-2026-idc-business-value-study > amp

ROI of Hybrid Mesh Network Security (IDC Study 2026)

1+ week, 2+ day ago  (695+ words) Check Point Blog To move fast without losing control, enterprises need a Hybrid Mesh Network Security architecture. But for CISOs and CIOs, the challenge is clear: How do you demonstrate measurable business value from adopting hybrid mesh security? Analyst firm…...

Check Point Blog
blog. checkpoint. com > research > when-trusted-software-updates-become-the-attack-vector-inside-operation-truechaos-and-a-new-zero-day-vulnerability-in-a-popular-collaboration-tool

Operation True Chaos: True Conf Zero'Day Supply'Chain Attack

1+ week, 2+ day ago  (448+ words) A zero day flaw in a trusted supply chain software turned a legitimate government collaboration tool into a malware delivery platform." In Operation True Chaos, the attackers gained control of a central on premises True Conf server, operated by a…...

Check Point Blog
blog. checkpoint. com > research > iran-nexus-password-spray-campaign-targeting-cloud-environments-with-a-focus-on-the-middle-east

Iran'Nexus M365 Password Spray Campaign in the Middle East

1+ week, 2+ day ago  (344+ words) Check Point Research identified a password-spraying campaign conducted by an Iran-nexus threat actor, targeting cloud environments of government entities, municipalities, energy-sector organizations, and private-sector companies amid the ongoing conflict in the Middle East, primarily in Israel and the UAE. Figure…...

Check Point Blog
blog. checkpoint. com > research > when-ai-trust-breaks-the-chatgpt-data-leakage-flaw-that-redefined-ai-vendor-security-trust

Chat GPT Data Leak (Fixed Feb 2026): Key Takeaways

1+ week, 3+ day ago  (771+ words) That assumption was challenged when new research uncovered a previously unknown vulnerability that enabled silent data leakage from Chat GPT conversations without user knowledge or consent. While the issue has since been fully resolved by Open AI, the discovery delivers…...

Check Point Blog
blog. checkpoint. com > portal > spring-cleaning-has-arrived-meet-the-new-check-point-portal-experience

Spring Cleaning Has Arrived: Meet the New Check Point Portal Experience

1+ week, 4+ day ago  (182+ words) We've been busy behind the scenes, and the results are here. The Check Point Portal just got its biggest visual refresh yet " brighter, cleaner, and more modern than ever before. Think of it as a thorough spring cleaning: everything you…...

Check Point Blog
blog. checkpoint. com > research > north-americas-cyber-security-threat-reality-in-2026

North America's Cyber Security Threat Reality in 2026

2+ week, 1+ day ago  (160+ words) Three dynamics stand out, each shaping how organizations experienced risk over the past year and what they should expect next." Ransomware"in North America has reached a mature operating state. Ransomware accounted for approximately 45 percent of all recorded incidents, making…...