News

Check Point Blog
blog. checkpoint. com > research > the-phishing-paradox-the-worlds-most-trusted-brands-are-cyber-criminals-entry-point-of-choice

The Phishing Paradox: The World's Most Trusted Brands Are Cyber Criminals' Entry Point of Choice

1+ day, 9+ hour ago  (584+ words) In Q1 2026, Microsoft continued to be the most impersonated brand in phishing attacks, accounting for 22% of all brand impersonation attempts, according to data from Check Point Research (CPR). The results reinforce a long'standing trend: attackers consistently exploit highly trusted brands to…...

Check Point Blog
blog. checkpoint. com > research > tax-season-2026-how-cyber-criminals-are-preparing-their-attacks-months-in-advance

Tax Season 2026: Inside Early'Stage Cyber Crime Campaigns

2+ week, 1+ day ago  (412+ words) Tax season remains one of the most attractive periods of the year for cyber criminals. As individuals and organizations exchange sensitive financial and identity data online, attackers take advantage of increased tax'related activity to launch phishing campaigns, fraudulent websites, and…...

Check Point Blog
blog. checkpoint. com > research > when-ai-trust-breaks-the-chatgpt-data-leakage-flaw-that-redefined-ai-vendor-security-trust

Chat GPT Data Leak (Fixed Feb 2026): Key Takeaways

2+ week, 4+ day ago  (771+ words) That assumption was challenged when new research uncovered a previously unknown vulnerability that enabled silent data leakage from Chat GPT conversations without user knowledge or consent. While the issue has since been fully resolved by Open AI, the discovery delivers…...

Check Point Blog
blog. checkpoint. com > product-updates > exceptions-for-attachment-file-cleaning-threat-extraction

Exceptions for Attachment/File Cleaning (Threat Extraction)

1+ mon, 2+ week ago  (154+ words) are now available, allowing organizations to define sender-based and file hash-based allow-lists for greater flexibility in how cleaned files are delivered to end users. Attachment Cleaning, powered by Threat Extraction " Check Point's Content Disarm and Reconstruction (CDR) engine " is widely…...

Check Point Blog
blog. checkpoint. com > securing-the-cloud > check-point-named-leader-in-gigaom-radar-for-cloud-network-security-for-3-years-in-a-row-protects-22-cloud-vendors

Check Point Is a Leader in Giga Om Radar for Cloud Network Security

2+ mon, 17+ hour ago  (294+ words) With all the recent cloud vendor collaboration and integration, it's no wonder Check Point cloud firewalls are recognized as leaders by so many analysts. Here's a rundown on the support from Check Point firewalls, covering all major cloud vendors and…...

Check Point Blog
blog. checkpoint. com > research > love-is-in-the-air-and-so-are-scammers-valentines-day-2026-threats-to-watch-for

Valentine's Day 2026 Cyber Scams

2+ mon, 6+ day ago  (354+ words) As Valentine's Day 2026 approaches, people are turning to online shopping, digital dating, and last'minute gift ideas. Unfortunately, cyber criminals are doing the same. Check Point researchers have identified a sharp rise in Valentine'themed phishing websites, fraudulent stores, and fake dating…...

Check Point Blog
blog. checkpoint. com > email-security > attackers-continue-to-target-trusted-collaboration-platforms-12000-emails-target-teams-users

Attackers Continue to Target Trusted Collaboration Platforms: 12, 000+ Emails Target Teams Users

2+ mon, 3+ week ago  (352+ words) This report describes a phishing campaign in which attackers abuse Microsoft Teams functionality to distribute phishing content that appears to originate from legitimate Microsoft services. The attack leverages guest invitations and phishing-themed team names to impersonate billing and subscription notifications,…...

Check Point Blog
blog. checkpoint. com > research > ai-powered-north-korean-konni-malware-targets-developers

AI-Powered KONNI Malware Targets Developers

2+ mon, 3+ week ago  (453+ words) Check Point Research is tracking an active phishing campaign involving KONNI, a North Korea-affiliated threat actor active since at least 2014. Historically, KONNI focused on South Korean diplomatic, academic, and government-linked targets, using geopolitical themes as phishing lures. This latest activity…...

Check Point Blog
blog. checkpoint. com > research > phishing-campaign-leverages-trusted-google-cloud-automation-capabilities-to-evade-detection

Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection

3+ mon, 3+ week ago  (363+ words) In this incident, attackers sent 9, 394 phishing emails targeting approximately 3, 200 customers over the past 14 days. All messages were sent from the legitimate Google address [email'protected], which significantly increased their credibility and likelihood of reaching end users" inboxes. To further increase trust,…...

Check Point Blog
blog. checkpoint. com > research > from-fake-deals-to-phishing-the-most-effective-christmas-scams-of-2025

Top Christmas Scams of 2025: How to Stay Safe

4+ mon, 2+ day ago  (177+ words) Tip: Always verify deals on official retailer websites and avoid clicking on suspicious links. Figure 1: Holiday reward lure email example This is the most successful holiday scam worldwide. AI-generated smishing messages mimic alerts from logistics giants like Royal Mail, Fed…...