From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025

Key Insights AI and automation have made holiday scams smarter and harder to detect. Over 33,500 Christmas-themed phishing emails and over 10,000 holiday season-themed social media advertisements flagged in just 14 days. Fake retail sites and social media giveaways are surging globally. Learn practical tips to spot scams and protect your holiday shopping. Why Christmas Scams Are More Dangerous in 2025 As the season of giving unfolds, cyber criminals are taking advantage of holiday stress and speed. In 2025, scams are not only more common, they’re powered by AI and automation, making them harder to spot. Researchers at Check Point […]

The post From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025 appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/FNd1SKh
via

Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads

As enterprises expand into Oracle Cloud Infrastructure (OCI), they need security that scales as dynamically as their workloads. Check Point CloudGuard Network Security now brings full auto-scaling support to OCI extending its industry-leading cloud security automation capabilities to yet another major platform. CloudGuard Network Security integrates natively with 20 public and private cloud vendors ensuring smooth interoperability and choice. This advanced integration provides customers the confidence and freedom to choose the right cloud for each workload or application without compromising on security or control. Auto-Scaling with Oracle Instance Pools With OCI Instance Pools, CloudGuard firewalls can now automatically expand or […]

The post Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/yLudOVU
via

Infinity Global Services’ Cyber Park World Championship Crowns Its First Global Winners

Check Point’s Infinity Global Services (IGS) recently concluded its first ever Cyber Park World Championship, a global competition designed to challenge and inspire the next generation of cyber defenders. In partnership with CheckMates, Check Point’s community of cyber security professionals, and Cympire, an advanced cyber training partner. The championship brought together hundreds of participants from across the globe to compete in realistic cyber ranges, showcase their technical mastery, and preform collaborate in high-pressure simulated environments. The Cyber Park platform, part of Check Point’s Infinity Global Services Training Programs, offers hands-on cyber simulations and training designed to help organizations upskill their […]

The post Infinity Global Services’ Cyber Park World Championship Crowns Its First Global Winners appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/CEt1lzL
via

Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks

In November 2025, global cyber activity continued its upward trend, with organizations experiencing an average of 2,003 cyber-attacks per week. This represents a 3% increase from October, and a 4% rise compared to November 2024. Check Point Research data shows that this steady escalation reflects a threat landscape shaped by intensified ransomware activity, expanded attack surfaces, and the growing exposure risks associated with generative AI tools inside organizations. Industry Insights: Education Under Sustained Pressure The education sector remained the most targeted industry worldwide, facing an average of 4,656 attacks per organization per week—a 7% year-over-year increase. Next in line were […]

The post Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/UnxrvhQ
via

40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams

The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate, insurance, and everyday business operations, have become essential to how modern organizations move at speed. But that same convenience creates an opening for cyber criminals. Email security researchers at Check Point have recently uncovered a phishing campaign where attackers impersonate file-sharing and e-signature services to deliver finance-themed lures that look like legitimate notifications. In this incident, attackers sent over 40,000 […]

The post 40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/HIEWXZb
via

Cyber Threats to the U.S.: What Policymakers Need to Know for 2026

Cyber attacks against the United States are no longer isolated events or technical headaches. They are now powerful tools of national strategy used by foreign governments, criminal networks, and ideological groups. A new report explains how these attacks have changed from simple hacks into coordinated campaigns aimed at shaping global politics, weakening U.S. institutions, and putting pressure on American decision-makers. This blog highlights the key takeaways for leaders responsible for national security, public policy, and critical infrastructure resilience. Takeaway 1: Cyber Attacks Are Now Tools of Geopolitics Cyber operations have become a normal part of how countries compete with one […]

The post Cyber Threats to the U.S.: What Policymakers Need to Know for 2026 appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/qmOHIKp
via

What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF Customers Carried on with Their Day

 Note: Before we dive in, Check Point CloudGuard WAF customers were proactively protected and not affected by React2Shell. In early December 2025, the team behind React—the most widely used technology powering today’s websites and digital services—announced a critical security flaw in one of its new server features. Researchers call this bug React2Shell, and it’s rated CVSS 10.0 — the highest severity! It’s rated critical because it can let a stranger run code on your server without needing to log in or do anything. They only need to send a special request. No password. No account. No user interaction. Just a […]

The post What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF Customers Carried on with Their Day appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/mh5Tsr9
via

From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025

Key Insights AI and automation have made holiday scams smarter and harder to detect. Over 33,500 Christmas-themed phishing emails and over ...