Skip to main content

Check Point Software’s 2025 Security Report Finds Alarming 44% Increase in Cyber-Attacks Amid Maturing Cyber Threat Ecosystem

Highlights from the 13th annual report with data from 170 countries, include an analysis on evolving cyber wars, the pervasiveness of ransomware and recommendations for CISOs

REDWOOD CITY, Calif., Jan. 14, 2025 (GLOBE NEWSWIRE) —  Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its annual report, The State of Global Cyber Security 2025. With an alarming 44% increase in global cyber-attacks year-over-year, the report unveils new cyber trends, emerging threat actor tactics, and actionable CISO guidance for navigating this changing landscape unscathed.

“Cyber security in 2025 is not only about protecting networks; it’s about safeguarding trust in our systems and institutions. The State of Global Cyber Security 2025 highlights the rapid evolution of threats and reinforces the need for resilience in the face of persistent and complex adversaries,” said Maya Horowitz, VP of Research at Check Point Software.

The year 2024 was marked by the increasing role of generative AI (GenAI) in cyber-attacks. From disinformation campaigns to deepfake videos, GenAI was used to accelerate cyber-attacks, steal money, and influence public opinion. At the same time, Infostealer attacks surged by 58%, revealing a maturing cyber ecosystem. Over 70% of infected devices were personal, as threat actors targeted bring-your-own device (BYOD) environments to breach corporate resources.

Key Findings from the 2025 Report:

  • Evolving Cyber Wars: Nation-states are shifting from acute attacks to chronic campaigns aimed at eroding trust and destabilizing systems. AI-powered disinformation and influence campaigns targeted one-third of global elections between September 2023 and February 2024.
  • Ransomware Evolution: Data exfiltration and extortion overtook encryption-based attacks as the primary ransomware tactic, simplifying operations and maximizing payouts. Healthcare became the second most targeted industry, with a 47% increase in attacks year-over-year.
  • Edge Device Exploitation: Compromised routers, VPNs, and other edge devices served as key entry points for attackers. Over 200,000 devices were controlled by advanced botnets like Raptor Train, operated by state-sponsored actors.
  • Prevalent Vulnerabilities: 96% of exploits in 2024 leveraged vulnerabilities disclosed prior to the year, underscoring the importance of proactive patch management.
  • Targeted Industries: For the fifth consecutive year, education remained the most targeted industry, experiencing a 75% increase in attacks year-over-year.

Recommendations for CISOs:

  1. Strengthen BYOD Security: Implement strict policies and deploy endpoint protection to mitigate risks from personal devices accessing corporate resources.
  2. Invest in Threat Intelligence: Leverage AI-driven tools to monitor and preempt disinformation campaigns and emerging threats.
  3. Enhance Patch Management: Address known vulnerabilities proactively to limit exposure to widespread exploits.
  4. Secure Edge Devices: Implement robust security measures for routers, VPNs, and IoT devices to prevent them from becoming operational relay boxes for attackers.
  5. Focus on Resilience: Prepare for persistent threats with comprehensive incident response plans and continuous monitoring.

Read the full report here: https://www.checkpoint.com/security-report/

Follow Check Point via:
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
X: https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd. 
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Platform Services for collaborative security operations and services.

Legal Notice Regarding Forward-Looking Statements
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

MEDIA CONTACT:                               
Liz Wu                                                    
Check Point Software Technologies
press@us.checkpoint.com                
INVESTOR CONTACT:
Kip E. Meintzer
Check Point Software Technologies
ir@us.checkpoint.com

Disclaimer & Cookie Notice

Welcome to GOLDEA services for Professionals

Before you continue, please confirm the following:

Professional advisers only

I am a professional adviser and would like to visit the GOLDEA CAPITAL for Professionals website.

Important Notice for Investors:

The services and products offered by Goldalea Capital Ltd. are intended exclusively for professional market participants as defined by applicable laws and regulations. This typically includes institutional investors, qualified investors, and high-net-worth individuals who have sufficient knowledge, experience, resources, and independence to assess the risks of trading on their own.

No Investment Advice:

The information, analyses, and market data provided are for general information purposes only and do not constitute individual investment advice. They should not be construed as a basis for investment decisions and do not take into account the specific investment objectives, financial situation, or individual needs of any recipient.

High Risks:

Trading in financial instruments is associated with significant risks and may result in the complete loss of the invested capital. Goldalea Capital Ltd. accepts no liability for losses incurred as a result of the use of the information provided or the execution of transactions.

Sole Responsibility:

The decision to invest or not to invest is solely the responsibility of the investor. Investors should obtain comprehensive information about the risks involved before making any investment decision and, if necessary, seek independent advice.

No Guarantees:

Goldalea Capital Ltd. makes no warranties or representations as to the accuracy, completeness, or timeliness of the information provided. Markets are subject to constant change, and past performance is not a reliable indicator of future results.

Regional Restrictions:

The services offered by Goldalea Capital Ltd. may not be available to all persons or in all countries. It is the responsibility of the investor to ensure that they are authorized to use the services offered.

Please note: This disclaimer is for general information purposes only and does not replace individual legal or tax advice.