Check Point Research

Technology

The World’s Most Trusted Brands Are Cybercriminals’ Entry Point of Choice 

Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global…

Read More »
Technology

Phishing in the Classroom: 115,000 Emails Exploit Google Classroom to Target 13,500 Organizations

Check Point researchers have uncovered a large-scale active phishing campaign abusing Google Classroom, a platform trusted by millions of students and educators…

Read More »
Technology

Cursor IDE: Persistent Code Execution via MCP Trust Bypass

Cursor is one of the fastest-growing AI-powered coding tools used by developers today. It combines local code editing with powerful…

Read More »
Technology

Check Point Research Unveils Q2 2025 Brand Phishing Trends: Microsoft Maintains Lead, Spotify Reenters Top Rankings

Technology and Digital Services Continue to Dominate Phishing Landscape, Highlighting Growing Threat to Consumer Trust Check Point Research (CPR), the…

Read More »
Technology

FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild

Check Point Research identifies how the new social engineering technique, FileFix, is being actively tested by threat actors in the…

Read More »
Technology

Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day

By: Sameer Basha, Lead Security Consultant, GCC at Check Point Software Technologies Ltd. The zero-day was used in a targeted…

Read More »
Technology

Surge in Cybercrime: Check Point 2023 Mid-Year Security Report Reveals 8% Spike in Global Cyberattacks

Old and new blend in cybercrime, AI and USB devices become unexpected accomplices. Lockbit3 leads ransomware surge in the first…

Read More »
Technology

Phishing Tools for Purchase: A Closer Look at Facebook Scamming Groups

By Gal Yogev, Cyber Security Researcher at Check Point Software Technologies Check Point Research researchers have identified numerous Facebook pages…

Read More »
Technology

Yahoo Most Impersonated Brand in Q4 2022 Phishing Attacks

Check Point Research reports that Yahoo climbed 23 places in Q4 2022, while LinkedIn and FedEx returned to the top…

Read More »
Technology

One Year on from Log4j Vulnerability: Have Lessons been Learned?

On the anniversary of the Log4j vulnerability disclosure, Check Point Software looks back on one of the biggest security shake…

Read More »
Back to top button

Adblock Detected

Please Turnoff the adblocker!