Check Point Press Releases

Check Point Software’s 2025 Security Report Finds Alarming 44% Increase in Cyber-Attacks Amid Maturing Cyber Threat Ecosystem

Highlights from the 13th annual report with data from 180 countries, include an analysis on evolving cyber wars, the pervasiveness of ransomware and recommendations for CISOs


Redwood City, CA  —  Tue, 14 Jan 2025

Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its annual report, The State of Global Cyber Security 2025. With an alarming 44% increase in global cyber-attacks year-over-year, the report unveils new cyber trends, emerging threat actor tactics, and actionable CISO guidance for navigating this changing landscape unscathed.

“Cyber security in 2025 is not only about protecting networks; it’s about safeguarding trust in our systems and institutions. The State of Global Cyber Security 2025 highlights the rapid evolution of threats and reinforces the need for resilience in the face of persistent and complex adversaries,” said Maya Horowitz, VP of Research at Check Point Software.

The year 2024 was marked by the increasing role of generative AI (GenAI) in cyber-attacks. From disinformation campaigns to deepfake videos, GenAI was used to accelerate cyber-attacks, steal money, and influence public opinion. At the same time, Infostealer attacks surged by 58%, revealing a maturing cyber ecosystem. Over 70% of infected devices were personal, as threat actors targeted bring-your-own device (BYOD) environments to breach corporate resources.

Key Findings from the 2025 Report:

  • Evolving Cyber Wars: Nation-states are shifting from acute attacks to chronic campaigns aimed at eroding trust and destabilizing systems. AI-powered disinformation and influence campaigns targeted one-third of global elections between September 2023 and February 2024.
  • Ransomware Evolution: Data exfiltration and extortion overtook encryption-based attacks as the primary ransomware tactic, simplifying operations and maximizing payouts. Healthcare became the second most targeted industry, with a 47% increase in attacks year-over-year.
  • Edge Device Exploitation: Compromised routers, VPNs, and other edge devices served as key entry points for attackers. Over 200,000 devices were controlled by advanced botnets like Raptor Train, operated by state-sponsored actors.
  • Prevalent Vulnerabilities: 96% of exploits in 2024 leveraged vulnerabilities disclosed prior to the year, underscoring the importance of proactive patch management.
  • Targeted Industries: For the fifth consecutive year, education remained the most targeted industry, experiencing a 75% increase in attacks year-over-yea

Recommendations for CISOs:

  1. Strengthen BYOD Security: Implement strict policies and deploy endpoint protection to mitigate risks from personal devices accessing corporate resources.
  2. Invest in Threat Intelligence: Leverage AI-driven tools to monitor and preempt disinformation campaigns and emerging threats.
  3. Enhance Patch Management: Address known vulnerabilities proactively to limit exposure to widespread exploits.
  4. Secure Edge Devices: Implement robust security measures for routers, VPNs, and IoT devices to prevent them from becoming operational relay boxes for attackers.
  5. Focus on Resilience: Prepare for persistent threats with comprehensive incident response plans and continuous monitoring.

Read the full report here: www.checkpoint.com/security-report/

 

Follow Check Point Software via:
X (Formerly known as Twitter): https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Platform Services for collaborative security operations and services.

Legal Notice Regarding Forward-Looking Statements
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

 

×
  反映意見
本網站使用cookies來實現其功能以及分析和行銷目的。 繼續使用本網站即表示您同意使用cookies 。 欲了解更多信息,請閱讀我們的cookies聲明