News
Tax Season 2026: Inside Early‑Stage Cyber Crime Campaigns
1+ day, 20+ hour ago (412+ words) Tax season remains one of the most attractive periods of the year for cyber criminals. As individuals and organizations exchange sensitive financial and identity data online, attackers take advantage of increased tax'related activity to launch phishing campaigns, fraudulent websites, and…...
ChatGPT Data Leak (Fixed Feb 2026): Key Takeaways
4+ day, 23+ hour ago (771+ words) That assumption was challenged when new research uncovered a previously unknown vulnerability that enabled silent data leakage from ChatGPT conversations without user knowledge or consent. While the issue has since been fully resolved by OpenAI, the discovery delivers a much…...
Exceptions for Attachment/File Cleaning (Threat Extraction)
1+ mon, 1+ day ago (154+ words) Exceptions for Attachment/File Cleaning (Threat Extraction) are now available, allowing organizations to define sender-based and file hash-based allow-lists for greater flexibility in how cleaned files are delivered to end users. Attachment Cleaning, powered by Threat Extraction " Check Point's Content…...
Check Point Is a Leader in GigaOm Radar for Cloud Network Security
1+ mon, 2+ week ago (294+ words) With all the recent cloud vendor collaboration and integration, it's no wonder Check Point cloud firewalls are recognized as leaders by so many analysts. Here's a rundown on the support from Check Point firewalls, covering all major cloud vendors and…...
Valentine’s Day 2026 Cyber Scams
1+ mon, 2+ week ago (354+ words) As Valentine's Day 2026 approaches, people are turning to online shopping, digital dating, and last'minute gift ideas. Unfortunately, cyber criminals are doing the same. Check Point researchers have identified a sharp rise in Valentine'themed phishing websites, fraudulent stores, and fake dating…...
Attackers Continue to Target Trusted Collaboration Platforms: 12,000+ Emails Target Teams Users
2+ mon, 1+ week ago (352+ words) This report describes a phishing campaign in which attackers abuse Microsoft Teams functionality to distribute phishing content that appears to originate from legitimate Microsoft services. The attack leverages guest invitations and phishing-themed team names to impersonate billing and subscription notifications,…...
AI-Powered KONNI Malware Targets Developers
2+ mon, 1+ week ago (453+ words) Check Point Research is tracking an active phishing campaign involving KONNI, a North Korea-affiliated threat actor active since at least 2014. Historically, KONNI focused on South Korean diplomatic, academic, and government-linked targets, using geopolitical themes as phishing lures. This latest activity…...
Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection
3+ mon, 1+ week ago (363+ words) In this incident, attackers sent 9,394 phishing emails targeting approximately 3,200 customers over the past 14 days. All messages were sent from the legitimate Google address [email'protected], which significantly increased their credibility and likelihood of reaching end users" inboxes. To further increase trust,…...
Top Christmas Scams of 2025: How to Stay Safe
3+ mon, 2+ week ago (177+ words) Tip: Always verify deals on official retailer websites and avoid clicking on suspicious links. Figure 1: Holiday reward lure email example This is the most successful holiday scam worldwide. AI-generated smishing messages mimic alerts from logistics giants like Royal Mail, FedEx,…...
40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams
3+ mon, 3+ week ago (442+ words) Email security researchers at Check Point have recently uncovered a phishing campaign where attackers impersonate file-sharing and e-signature services to deliver finance-themed lures that look like legitimate notifications. The attackers abused Mimecast's secure-link rewriting feature, using it as a smokescreen…...