Real-time threat intelligence derived from hundreds of millions of sensors worldwide, enriched with AI-based engines and exclusive research data from the Check Point Research Team.
Detects 2,000 attacks daily by unknown threats previously undiscovered
Advanced predictive intelligence engines, data from hundreds of millions of sensors, and cutting-edge research from Check Point Research and external intelligence feed
Up-to-minute information on the newest attack vectors and hacking techniques
See LIVE cyber attacks now with threat map or learn about
ThreatCloud is Check Point’s rich cyber defense database. Its threat intelligence powers Check Point zero-day protection solutions.
Mitigate threats 24×7 with award-winning technology, expert analysis and global threat intelligence
The Power of
2,000
Zero-Day Files Detected Daily
150,000
Connected
Networks
13 Million
Files Emulated
Daily
3 Billion
Websites & Files
Handled Daily
“Google Search” any IoCs to obtain contextualized useful treath intelligence
Check Point Research publications and intelligence sharing fuel the discovery of new cyber threats and the development of the international threat intelligence community to keep you secure.
Cyber Attack Trends:
Coronavirus pandemic drives criminal and political cyber attacks across networks, cloud and mobile
Part 1 of the Secure Your Remote Workforce video guide presents the most prominent trends of threats to the remote workforce. 2020 was full of COVID related attacks that took, and are still taking, advantage of the panic around the pandemic, the increased use of Zoom and other video conferencing platforms, and mainly the abrupt transition to work-from-home.
Part 5 of the Secure Your Remote Workforce video guide presents the new wave of mobile threats that are evolving in an alarming rate. With mobile phones being used to exchange corporate date more than ever before, understanding the threats is the first step to preventing them in the new normal.
Part 7 of the Secure Your Remote Workforce video guide presents the possible devastating outcome from a single malicious email. With email attacks being the number one delivery vehicle of malware, a single malicious email can put the entire organization at risk. The Florentine Banker reveal, detailed in this episode, illustrates how one phishing email can cost millions of dollars in losses.
Keeping your gate locked on your IoT devices: Vulnerabilities found on Amazon Alexa
Hacker, 22, Seeks LTR with Your Data: Vulnerabilities Found On Popular OkCupid Dating App
Fixing the Zoom ‘Vanity Clause’ – Check Point and Zoom collaborate to fix Vanity URL issue
SIGRed: Windows DNS Server Remote Code Execution
Tik or Tok? Is TikTok Secure Enough? Check Point Reveals Vulnerabilities in TikTok