The Weaponization of PDFs : 68% of Cyberattacks begin in your inbox, with 22% of these hiding in PDFs

Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat.  Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide malicious code. Malicious PDFs have been cyber criminals’ favorite gateways for years but have now become even more popular. While 68% of malicious attacks are delivered through email, PDF-based attacks now account for 22% of all malicious email attachments, according to Check Point Research. This makes them particularly insidious for businesses that share large quantities of these files in the […]

The post The Weaponization of PDFs : 68% of Cyberattacks begin in your inbox, with 22% of these hiding in PDFs appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/7AO9Dnc
via

Employee Spotlight: Getting to Know Vanessa Johnson

Vanessa, can you tell us a bit about yourself? I’m a proud Texas native with a passion for learning and helping others grow. I have a Bachelor’s degree in Marketing and a Master’s in Management and Administrative Sciences, which led me to a career in training and development. Over the years, I’ve gained experience in instructional design, eLearning development, curriculum design, and training facilitation—basically, all things learning! I’m also certified in these areas because I believe in always sharpening my skills. Outside of work, I’m an active member of Alpha Kappa Alpha Sorority Inc., where I enjoy giving back to […]

The post Employee Spotlight: Getting to Know Vanessa Johnson appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/x6duSmE
via

What’s Next For Attack Surface Management? Perspectives From The Market Leader

We are delighted to announce that Cyberint, a Check Point company, was recently named a Leader and an Outperformer in the GigaOm Attack Surface Management Radar report. To read the full analysis, download the report here. In light of this major recognition, it’s worth taking a moment to reflect on the evolution of ASM—both the specific capabilities that Check Point provides to customers and on the trends of the broader Attack Surface Management market. Perhaps most importantly, we will also discuss what’s next for ASM and where the market is headed in 2025. The Origins of Attack Surface Management The […]

The post What’s Next For Attack Surface Management? Perspectives From The Market Leader appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/zGk3oUp
via

You Can Stockpile Food—But You Can’t Stockpile Trust

Why the EU’s Crisis Preparedness Needs a Digital Backbone The European Union recently urged its citizens to stock up on essentials—water, food, torches, medicine—for at least 72 hours in case of a major disruption. The recommendation, outlined in a report by the Financial Times, is part of a broader push to improve resilience in the face of climate events, potential conflict, or breakdowns in critical infrastructure. It’s a prudent message—but only partially complete. In our increasingly digital-first world, real resilience cannot stop at flashlights and food rations. The invisible layer supporting every modern emergency response is digital. From electricity to […]

The post You Can Stockpile Food—But You Can’t Stockpile Trust appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/i4LjYb0
via

Advanced Network Security with Check Point CloudGuard and Nutanix Cloud Platform

As businesses continue to migrate to the cloud, delivering the highest level of network security becomes increasingly challenging due to infrastructure and workload complexity. Check Point CloudGuard Network Security offers a comprehensive solution with Nutanix Cloud Platform to support advanced networking architectures like Transit VPC and Tenant VPC in highly available configurations. By leveraging the Nutanix Service Insertion Framework and AHV hypervisor support, CloudGuard provides consistent security policy enforcement, full threat visibility across physical datacenters, hyperconverged infrastructure, and public cloud environments. CloudGuard also delivers robust SD-WAN capabilities and end-to-end protection for private, hybrid, and multicloud environments. Let’s explore how this […]

The post Advanced Network Security with Check Point CloudGuard and Nutanix Cloud Platform appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/mCfUtad
via

Backup Data Resiliency: Backups Alone Aren’t Enough

Every year, March 31st marks another World Backup Day—a timely reminder to check if our data protection strategies are truly ready for today’s volatile cyber landscape. It is an illusion to think that cyber attacks on any industry can be avoided. In fact Check Point’s 2025 State of Cyber Security Report shows that the average number of weekly attacks per organization are up 44% year-over-year. Such attacks come from many sources – from ransomware, hacktivism, third party supply chain attacks, phishing, network intrusions and even data breaches. But in 2025, simply asking “Have you backed up your data?” no longer […]

The post Backup Data Resiliency: Backups Alone Aren’t Enough appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/xfFKuJM
via

NIS2: What do we know so far about the EU’s expanded cyber security regulation?

When it comes to security, potent emerging threats on the horizon are causing regulators to be more proactive than ever. For organizations, this means constant reorientation to new compliance frameworks, obligations, and risks. At the forefront of this regulatory churn is the European Union’s expanded Network & Information Systems directive, otherwise known as NIS2, a regulation focused on cyber security and risk management in the EU. Companies in critical sectors operating in the EU or serving EU customers need to adhere to NIS2. While a lot of the discourse around NIS2 focuses on how enterprises need to address new compliance […]

The post NIS2: What do we know so far about the EU’s expanded cyber security regulation? appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/inGhPq1
via

The Weaponization of PDFs : 68% of Cyberattacks begin in your inbox, with 22% of these hiding in PDFs

Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat.  Over 87% of organizations use PDF...