Meet Yurei: The New Ransomware Group Rising from Open-Source Code

New Group, Fast Growth: Yurei ransomware first appeared on September 5, already listing three victims in Sri Lanka, India, and Nigeria within its first week. Copy-Paste Malware: The ransomware is largely based on the open-source Prince-Ransomware project, showing how attackers with limited skills can quickly launch operations. Data Leaks Over Encryption: Despite flaws that allow partial recovery, Yurei’s main weapon is data theft and exposure, which they use to pressure victims into paying. Global Threat, Emerging Origins: Early evidence suggests links to Morocco, reflecting how ransomware is no longer confined to traditional regions, it can emerge anywhere and spread fast. […]

The post Meet Yurei: The New Ransomware Group Rising from Open-Source Code appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/zj32Ji1
via

Global Cyber Threats August 2025: Agriculture in the Crosshairs

In August 2025, the global cyber threat landscape presented a complex interplay of stability and alarming new challenges. Organizations around the world confronted an average of nearly 2,000 cyber attacks each week—a slight 1% decrease from July but a stark 10% rise compared to the same month last year. Particularly concerning is the agricultural sector, which has seen a staggering 101% increase in cyber incidents since August 2024. Although the overall volume of attacks has somewhat stabilized, the evolving distribution of threats across industries, regions, and types of attacks suggests a troubling trend that demands our attention. As businesses navigate […]

The post Global Cyber Threats August 2025: Agriculture in the Crosshairs appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/SLjKqsu
via

The Great NPM Heist – September 2025

On September 8, 2025, the JavaScript ecosystem experienced what is now considered the largest supply chain attack in npm history. A sophisticated phishing campaign led to the compromise of a trusted maintainer’s account, resulting in the injection of cryptocurrency-stealing malware into 18+ foundational npm packages. These packages collectively accounted for over 2 billion weekly downloads, affecting millions of applications globally—from personal projects to enterprise-grade systems. Following the discovery of the breach, the npm team began removing several of the malicious package versions published by the attackers, including the compromised debug package, which alone sees over 357 million downloads each week. Initial Compromise: A Phishing Attack with […]

The post The Great NPM Heist – September 2025 appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/lU9omYj
via

The Networking and Security Shifts Fueling the Rise of SASE

Today’s workplace is no longer defined by office walls. Consequently, IT and security teams must rethink their approach to access and security. Enter Secure Access Service Edge (SASE), an architecture that merges network and security services into a unified, cloud-delivered platform. SASE has grown rapidly in importance since its introduction a few years ago and is now a must-have for any organization with remote and hybrid teams. But what’s behind the surge in SASE interest? The Rise of the Hybrid Workforce Forty-eight percent of knowledge workers are hybrid or remote, and 60% of organizations larger than 500 people use a […]

The post The Networking and Security Shifts Fueling the Rise of SASE appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/SdVKADG
via

Passing the Security “Vibe” Check

Imagine walking into a kitchen where you can shout out recipes and a robot instantly cooks up a meal. You ask for pasta, and within minutes you have a steaming plate in front of you.  The speed and convenience are impressive, but if you never stop to check what ingredients went into the dish, you might be eating something unsafe. That is what vibe coding feels like. Instead of carefully writing lines of code, developers describe what they want in plain English and let AI assistants generate it. Tools like Copilot, ChatGPT, VSCode, and other AI-powered code helpers have made […]

The post Passing the Security “Vibe” Check appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/5SI9nhF
via

Resilient by Design: Network Security for the Next Disruption

Whether it’s a pandemic, war, or natural disaster, one thing is certain: disruption is inevitable. For information security professionals, the important question is whether your network is ready to keep operations running securely. There are two essential tactics you can use to keep things running: provision additional VPN capacity for remote connections or adopt a secure access service edge (SASE) solution. Both are workable strategies, but each has its own strengths and weaknesses that can lead your company to a state of readiness, or alternatively, leave you facing significant operational risk. Before diving into solutions, step back: are you thinking […]

The post Resilient by Design: Network Security for the Next Disruption appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/DbEymUL
via

Hexstrike-AI: When LLMs Meet Zero-Day Exploitation

Key Findings: Newly released framework called Hexstrike-AI provides threat actors with an orchestration “brain” that can direct more than 150 specialized AI agents to autonomously scan, exploit, and persist inside targets. Within hours of its release, dark web chatter shows threat actors attempting to use HexStrike-AI to go after a recent zero day CVEs, with attackers dropping webshells for unauthenticated remote code execution. These vulnerabilities are complex and require advanced skills to exploit. With Hextrike-AI, threat actors claim to reduce the exploitation time from days to under 10 minutes. From Concept to Reality A recent executive insight blog examined the […]

The post Hexstrike-AI: When LLMs Meet Zero-Day Exploitation appeared first on Check Point Blog.



from Check Point Blog https://ift.tt/5qknd80
via

Meet Yurei: The New Ransomware Group Rising from Open-Source Code

New Group, Fast Growth: Yurei ransomware first appeared on September 5, already listing three victims in Sri Lanka, India, and Nigeria with...