AI is fueling a new wave of cyber threats. This report uncovers the darker side of innovation—where threat actors are using AI to scale attacks in ways never seen before. The report zeroes in on:
- AI-driven phishing, deepfakes, and impersonation
- Jailbroken LLMs and “Dark AI” models
- Automated malware creation and data mining
- Fake AI platforms and GenAI-fueled disinformation
- Data exposure risks from unregulated corporate AI use
Backed by real-world data and threat intelligence from Check Point Research, the report also highlights how defenders can turn the tables—using AI for research, detection, and cyber resilience.
White Papers
The release of The Cyber Security Report 2025 marks a critical step in addressing this year’s most pressing cyber threats and trends. Download the report to learn more.
Data-driven insights into enterprise adoption of Kubernetes, exploring challenges, best practices and emerging trends, from AI to edge computing.
The 2024 Cloud Security Report discusses these pressing concerns and evolving priorities in cloud security. By shifting the focus toward AI-based threat prevention, CISOs can take back control, and gain full visibility across their cloud infrastructure, while reducing the burden on resources.
Dive into the latest trends with Check Point's 2024 Cyber Security Report. Gain a deep understanding of the evolving digital threats landscape through a detailed analysis, featuring global attack patterns, malware families, and regional data specifics.
Check Point Research (CPR), the Threat Intelligence arm of Check Point, has unveiled its 2023 Mid-Year Cyber Security Report. The report uncovers an unsettling 8% surge in global weekly cyberattacks in the second quarter, the most significant increase in two years, highlighting how cybercriminals have cunningly combined next-gen AI technologies with long-established tools like USB devices to conduct disruptive cyberattacks. AI has also emerged as a powerful tool for defending against sophisticated and ever evolving cyberattacks. AI-powered cybersecurity systems excel at identifying anomalies and detecting previously unseen attack patterns, thereby mitigating potential risks before they escalate. Read the report now to see how you can protect your company from future cyber attacks.
Did you know resource demand systems are rarely static across time? As a system’s usage grows the existing computer resources eventually become insufficient to support an application or service. Dive into our whitepaper, MacStadium DevOps Capacity Planning, for an overview of capacity planning for organizations that manage hardware resources for the purposes of running DevOps pipelines. Gain insight into how to assess and optimize current utilization, gather the necessary information needed to confidently forecast future needs and calculate the number of additional resources that will be required to meet those needs. Discover best practices, how to understand your current system utilization, and more!
Application Security Posture Management (ASPM) is a new category that Gartner expects to bring a fundamental change to the application world as it requires us to redefine our understanding of what an is application stands for: It's more than just code; it includes cloud components as well. In this eBook, Backslash dives deep dive into this new paradigm.
The defensive tax, which is the time AppSec teams spend chasing vulnerabilities vs. driving scalable cloud-native AppSec policies, is real and is being felt across enterprises of all sizes. Read this report to find out more.
Niche application security solutions can interfere with DevOps agility, and can impede with the security of microservices and workloads. This buyer’s guide outlines the considerations and questions to apply when choosing a third-party, end-to-end, enterprise-grade application security solution.
For developers, secret and credential leakage is a problem as old as public-facing repositories. In a rush to deliver, developers will often hard-code credentials in code or neglect to review code for exposed secrets. This paper reviews the dangers of secret leakage, the challenges in protecting secrets in the SDLC, and strategies for secret leakage mitigation.
Explore 21 GitHub security practices that can increase the robustness of your repositories and help implement a security-first approach for your development teams.
This buyers' guide explains the top considerations when evaluating a cloud native security solution, and best security practices to implement to secure applications from pre-build through the CI/CD pipeline, during build, registry and runtime.
This best practice buyers guide outlines the hurdles you may encounter when securing your cloud infrastructure, and opportunities to streamline your cloud security stack. It delves into various cloud security solutions to help your organization select the right tools for your cloud applications.