CHKP Check Point Software Technologies Ltd.

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses

New report unveils four key AI-driven cyber threats and how organizations can outsmart attackers in an AI-driven world

SAN FRANCISCO, April 30, 2025 (GLOBE NEWSWIRE) -- RSA CONFERENCE, – (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today launched its inaugural at RSA Conference 2025. This report offers an in-depth exploration of how cyber criminals are weaponizing artificial intelligence (AI), alongside strategic insights for defenders to stay ahead.

As AI reshapes industries, it has also erased the lines between truth and deception in the digital world. Cyber criminals now wield generative AI and large language models (LLMs) to obliterate trust in digital identity. In today’s landscape, what you see, hear, or read online can no longer be believed at face value. AI-powered impersonation bypasses even the most sophisticated identity verification systems, making anyone a potential victim of deception on a scale.

"The swift adoption of AI by cyber criminals is already reshaping the threat landscape,” said Lotem Finkelstein, Director of Check Point Research. “While some underground services have become more advanced, all signs point toward an imminent shift - the rise of digital twins. These aren’t just lookalikes or soundalikes, but AI-driven replicas capable of mimicking human thought and behavior. It’s not a distant future - it’s just around the corner.”

Key Threat Insights from the AI Security Report:

At the heart of these developments is AI’s ability to convincingly impersonate and manipulate digital identities, dissolving the boundary between authentic and fake. The report uncovers four core areas where this erosion of trust is most visible:

  • AI-Enhanced Impersonation and Social Engineering: Threat actors use AI to generate realistic, real-time phishing emails, audio impersonations, and deepfake videos. Notably, attackers recently mimicked Italy’s defense minister using AI-generated audio, demonstrating that no voice, face, or written word online is safe from fabrication.
  • LLM Data Poisoning and Disinformation: Malicious actors manipulate AI training data to skew outputs. A case involving Russia’s disinformation network Pravda showed AI chatbots repeating false narratives 33% of the time, underscoring the need for robust data integrity in AI systems.
  • AI-Created Malware and Data Mining: Cyber criminals harness AI to craft and optimize malware, automate DDoS campaigns, and refine stolen credentials. Services like Gabbers Shop use AI to validate and clean stolen data, enhancing its resale value and targeting efficiency.
  • Weaponization and Hijacking of AI Models: From stolen LLM accounts to custom-built Dark LLMs like FraudGPT and WormGPT, attackers are bypassing safety mechanisms and commercializing AI as a tool for hacking and fraud on the dark web.

Defensive Strategies:

The report emphasizes that defenders must now assume AI is embedded within adversarial campaigns. To counter this, organizations should adopt AI-aware cyber security frameworks, including:

  • AI-Assisted Detection and Threat Hunting: Leverage AI to detect AI-generated threats and artifacts, such as synthetic phishing content and deepfakes.
  • Enhanced Identity Verification: Enhanced Identity Verification: Move beyond traditional methods and implement multi-layered identity checks that account for AI-powered impersonation across text, voice, and video—recognizing that trust in digital identity is no longer guaranteed.
  • Threat Intelligence with AI Context: Equip security teams with the tools to recognize and respond to AI-driven tactics.

"In this AI-driven era, cyber security teams need to match the pace of attackers by integrating AI into their defenses," added Finkelstein. "This report not only highlights the risks but provides the roadmap for securing AI environments safely and responsibly."

The full AI Security Report 2025 is available for download and join the for more insights about the report.

Follow Check Point via:

LinkedIn: 

X (Formerly known as Twitter): 

Facebook: 

Blog: 

YouTube: 

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers. 

Legal Notice Regarding Forward-Looking Statements 

This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

MEDIA CONTACT:INVESTOR CONTACT:
Liz WuKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies


EN
30/04/2025

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Unveils Quantum Firewall Software R82.10 to Secur...

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise New software release introduces more than 20 capabilities that secure AI transformation, enforce Zero Trust and unify hybrid mesh network protection REDWOOD CITY, Calif., Dec. 04, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybr...

 PRESS RELEASE

Check Point Software Announces Pricing of Upsized Private Offering of ...

Check Point Software Announces Pricing of Upsized Private Offering of $1.75 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 03, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), a pioneer and global leader of cyber security solutions, today announced the pricing of $1.75 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Securities Act”). The aggrega...

 PRESS RELEASE

Check Point Software Technologies Named a Leader in Gartner Magic Quad...

Check Point Software Technologies Named a Leader in Gartner Magic Quadrant for Email Security We Believe this Reinforces our Excellence in Email Security with AI-Powered Solutions that Combat Advanced Threats REDWOOD CITY, Calif., Dec. 03, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, announces that it has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security. Excelling across key areas such as core email protection, integrated email security, and outbound security, Check Point delivers AI-powered protect...

 PRESS RELEASE

Check Point Software Announces Proposed Private Offering of $1.5 Billi...

Check Point Software Announces Proposed Private Offering of $1.5 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 02, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its intention to offer, subject to market conditions and other factors, $1.5 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, a...

 PRESS RELEASE

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing I...

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing It Discover how to build resilient, prevention-first AI security — from models and agents to cloud workloads and connectivity. Live on December 4 REDWOOD CITY, Calif., Dec. 02, 2025 (GLOBE NEWSWIRE) -- Artificial intelligence is transforming the enterprise at unprecedented speed. AI now underpins critical workloads, cloud operations, identity systems, code pipelines, and everyday collaboration tools. As these systems expand across hybrid cloud and edge environments, organizations face a new challenge: how to secure AI ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch