I instantly regret not going to Antoine for my run this morning. Blame Garmin for calling me strained for the past couple weeks
#Checkpoint #SalteseWetlands #TrailRunning #Running #WavesInAntoine
I instantly regret not going to Antoine for my run this morning. Blame Garmin for calling me strained for the past couple weeks
#Checkpoint #SalteseWetlands #TrailRunning #Running #WavesInAntoine
#CheckPoint researchers assessed three most significant financial-sector trends in 2025. #DDoS attacks surged 105%, data breaches and leaks rose 73%, and #ransomware incidents reached 451 cases with aggressive multi-extortion tactics. #Hacktivists drove DDoS attacks, and ransomware groups like #Qilin, #Akira, and #Cl0p scaled operations via shared tooling and third-party access.
#CheckPoint Research observed #Amaranth-Dragon, a Chinese-aligned group linked to #APT41, conducting espionage against government and law enforcement across Southeast Asia. The threat actor weaponized #WinRAR flaw CVE-2025-8088 within 10 days after its disclosure, geo-fenced servers to targets, and introduced #TGAmaranth, a Telegram-based remote access tool.
⚕️Protecting patient care doesn’t stop at the exam room.
For Fast Pace Health, security had to keep up with rapid growth across hundreds of rural clinics without slowing down care delivery.
By improving visibility and automating response with #CheckPoint Harmony and Infinity Platform Services, their lean security team dramatically reduced phishing activity and gained the clarity needed to act faster and smarter.
The impact? More resilience. Less noise.
https://www.checkpoint.com/customer-stories/fast-pace-health/
For the latest discoveries in cyber research for the week of 9th February, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/9th-february-threat-intelligence-report/
🤖 Is solo cyber training still enough in the age of AI?
As AI reshapes cyber attacks, security teams are rethinking how they train.
#CheckPoint Infinity Global Services analyzed training trends from 2023–2025 and uncovered a clear shift toward team-based, continuous learning designed for modern SOCs.
Why now? And what does this say about where cyber defense is headed next?
👉 Read the full blog to find out: https://blog.checkpoint.com/infinity-global-services/from-solo-to-squad-the-evolution-of-cyber-security-training-in-the-ai-era/
🤔 What if phishing didn’t look like phishing at all?
#CheckPoint's Email Security researchers uncovered a large-scale scam where attackers abused trusted SaaS platforms to send phone-based lures that looked like routine service emails.
No fake links.
No shady senders.
Just familiar brands and “legitimate” emails doing the damage.
👉 See how it works and why security teams should be paying attention: https://blog.checkpoint.com/research/saas-abuse-at-scale-phone-based-scam-campaign-leveraging-trusted-platforms/
R82 fresh install, migrate_server import, policy installed.
It’s always more nerve wracking at home with limited resources and no TAC support to back you up than in a production environment.
If you know, you know.
🚨 Nation-state attackers are exploiting new vulnerabilities!
#CheckPoint Research uncovered highly targeted attacks against government and law enforcement agencies across the ASEAN region.
The previously untracked group, Amaranth-Dragon, is weaponizing newly disclosed vulnerabilities within days and tying activity to real-world political events.
👉 Read the research to understand what’s happening and why it matters: https://blog.checkpoint.com/research/amaranth-dragon-targeted-cyber-espionage-campaigns-across-southeast-asia/
2025 erlebten Banken eine Verdopplung der Cyberangriffe: Koordinierte Kampagnen, Hacktivismus und Ransomware-as-a-Service dominieren die neue, hochprofessionelle Bedrohungslage. Besonders auffällig: DDoS-Attacken auf kritische Finanzdienste stiegen um 105 % und sind zunehmend geopolitisch motiviert.
#Aktuell #Anwendung #StudienUmfragen #CheckPoint #Cybersecur...
https://www.it-finanzmagazin.de/von-hacktivismus-bis-ransomware-as-a-service-die-neue-bedrohungslage-fuer-banken-239534/?fsp_sid=21071
#CheckPoint Research has published the 2026 #CyberSecurity Report, highlighting #AI as a force multiplier across attacks, fragmentation in #ransomware with data only extortion, and multi-channel #socialengineering attacks. It maps threat activity to geopolitics and identity driven paths, quantifies risky AI usage, and provides sector and regional breakouts.
https://research.checkpoint.com/2026/cyber-security-report-2026/
Bitte schnell die betroffenen Systeme aktualisieren und sich einen neuen Hersteller des Vertrauens suchen... z.B. #CheckPoint 🫳 🎤
#Fortinet #FortiCloud #FortiOS #FortiManager #FortiWeb #FortiProxy #FortiAnalyzer #Sicherheitsluecke #EUVD_2026_4712 #CVE_2026_24858
For the latest discoveries in cyber research for the week of 26th January, please download our Threat Intelligence Bulletin: https://research.checkpoint.com/2026/26th-january-threat-intelligence-report/
#CheckPoint researchers describe a #MicrosoftTeams #phishing campaign abusing guest invitations and finance-themed team names to mimic billing notices. More than 12K emails were observed hitting 6,135 users via invite emails with obfuscated text. The campaign targeted US-based organizations across manufacturing, technology, and education.
🏁 What happens when championship speed meets cyber protection?
We're excited to announce that we're teaming up with NASCAR powerhouse Hendrick Motorsports, with Corey Day and the No. 17 Chevrolet leading the charge!
Together, we're securing the digital systems behind modern racing — from data and connectivity to the technologies behind every lap — as Corey takes on the 2026 NASCAR O’Reilly Series season.
#CheckPoint Research identified an ongoing #phishing campaign associated with #KONNI, a North Korean–linked threat actor active since at least 2014. The campaign targets software developers and engineering teams across the Asia-Pacific region, including Japan, Australia, and India, using blockchain-themed lures to prompt interaction and deliver malicious content. In observed activity, the threat actor deploys AI-generated #PowerShell #backdoors.
https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/
#CheckPoint Research revealed that #VoidLink, a recently exposed cloud-native #Linux #malware framework, is authored almost entirely by AI, likely under the direction of a single individual. The malware was produced predominantly through AI-driven development, reaching the first functional implant in under a week. From a methodology perspective, the actor used the model beyond coding, adopting an approach called Spec Driven Development (SDD).
https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/