Check Point Software launched its AI Security Report, detailing AI's role in cybercrime and strategies for defense.
Quiver AI Summary
Check Point Software Technologies has released its first AI Security Report at the RSA Conference 2025, highlighting how cyber criminals are leveraging artificial intelligence to enhance their deceptive tactics. The report details the rise of AI-driven impersonation, social engineering, and malware creation, emphasizing that traditional methods of digital identity verification are increasingly inadequate due to AI's ability to fabricate authentic-looking content. Notable incidents, such as the AI impersonation of Italy's defense minister, illustrate the growing threat. Check Point stresses the need for organizations to adopt AI-aware cyber security frameworks to counter these emerging risks, suggesting enhanced identity verification and AI-assisted threat detection. The report asserts that cyber security teams must integrate AI into their defenses to keep pace with attackers, providing a roadmap for securing AI environments effectively.
Potential Positives
- Check Point Software Technologies launched its inaugural AI Security Report at the prestigious RSA Conference 2025, highlighting its role as a thought leader in the evolving landscape of cyber security.
- The report provides significant insights into how AI is being weaponized by cyber criminals, illustrating the urgency for organizations to adapt their security measures in response to these emerging threats.
- By offering defensive strategies and frameworks for AI-aware cyber security, the report positions Check Point as a proactive partner for businesses navigating the complexities of AI-driven threats.
Potential Negatives
- The press release highlights significant vulnerabilities within the cyber security landscape, indicating that even advanced security measures may be insufficient against AI-driven attacks, potentially undermining customer trust in Check Point's solutions.
- The report’s emphasis on the rapid advancement of AI-enabled cyber threats may imply that Check Point is struggling to keep pace with evolving threats, which could raise concerns about the effectiveness of its security offerings.
- The discussion of AI-driven impersonation and the ability of attackers to bypass sophisticated identity verification systems could suggest that existing solutions inadequately address emerging threats, leading to potential reputational damage for Check Point.
FAQ
What is the main focus of the AI Security Report 2025?
The report examines how cyber criminals are using AI to impersonate and manipulate digital identities, threatening online trust.
How are AI and cyber crime related?
AI allows cyber criminals to craft realistic phishing attempts, deepfake videos, and other deceptive strategies that undermine digital security.
What strategies does Check Point recommend for defense against AI threats?
Organizations should use AI-assisted detection, enhance identity verification, and employ threat intelligence that considers AI-driven tactics.
How has AI changed digital identity verification?
AI advancements allow impersonators to bypass traditional verification methods using realistic text, voice, and video, complicating identity verification.
Where can I access the full AI Security Report 2025?
The full report is available for download on Check Point's official website and insights can be gained from their livestream.
Disclaimer: This is an AI-generated summary of a press release distributed by GlobeNewswire. The model used to summarize this release may make mistakes. See the full release here.
$CHKP Hedge Fund Activity
We have seen 322 institutional investors add shares of $CHKP stock to their portfolio, and 346 decrease their positions in their most recent quarter.
Here are some of the largest recent moves:
- NORGES BANK added 2,185,633 shares (+1965.4%) to their portfolio in Q4 2024, for an estimated $408,057,681
- BESSEMER GROUP INC added 646,504 shares (+5396.1%) to their portfolio in Q1 2025, for an estimated $147,351,191
- CLEARBRIDGE INVESTMENTS, LLC added 538,064 shares (+inf%) to their portfolio in Q4 2024, for an estimated $100,456,548
- CAUSEWAY CAPITAL MANAGEMENT LLC added 487,823 shares (+33.8%) to their portfolio in Q4 2024, for an estimated $91,076,554
- ACADIAN ASSET MANAGEMENT LLC removed 456,097 shares (-11.2%) from their portfolio in Q4 2024, for an estimated $85,153,309
- MORNINGSTAR INVESTMENT SERVICES LLC removed 429,246 shares (-90.6%) from their portfolio in Q4 2024, for an estimated $80,140,228
- BANK OF NEW YORK MELLON CORP added 404,958 shares (+182.0%) to their portfolio in Q1 2025, for an estimated $92,298,027
To track hedge funds' stock portfolios, check out Quiver Quantitative's institutional holdings dashboard.
$CHKP Analyst Ratings
Wall Street analysts have issued reports on $CHKP in the last several months. We have seen 3 firms issue buy ratings on the stock, and 0 firms issue sell ratings.
Here are some recent analyst ratings:
- BMO Capital issued a "Outperform" rating on 04/23/2025
- Scotiabank issued a "Outperform" rating on 01/31/2025
- Jefferies issued a "Buy" rating on 12/19/2024
To track analyst ratings and price targets for $CHKP, check out Quiver Quantitative's $CHKP forecast page.
$CHKP Price Targets
Multiple analysts have issued price targets for $CHKP recently. We have seen 7 analysts offer price targets for $CHKP in the last 6 months, with a median target of $235.0.
Here are some recent targets:
- Keith Bachman from BMO Capital set a target price of $250.0 on 04/23/2025
- Taz Koujalgi from Roth Capital set a target price of $215.0 on 04/22/2025
- Todd Weller from Stephens set a target price of $255.0 on 03/31/2025
- Shyam Patil from Susquehanna set a target price of $255.0 on 01/31/2025
- Shrenik Kothari from Robert W. Baird set a target price of $235.0 on 01/31/2025
- Joseph Gallo from Jefferies set a target price of $225.0 on 12/19/2024
- Brad Zelnick from Deutsche Bank set a target price of $200.0 on 12/02/2024
Full Release
SAN FRANCISCO, April 30, 2025 (GLOBE NEWSWIRE) -- RSA CONFERENCE, – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today launched its inaugural AI Security Report at RSA Conference 2025. This report offers an in-depth exploration of how cyber criminals are weaponizing artificial intelligence (AI), alongside strategic insights for defenders to stay ahead.
As AI reshapes industries, it has also erased the lines between truth and deception in the digital world. Cyber criminals now wield generative AI and large language models (LLMs) to obliterate trust in digital identity. In today’s landscape, what you see, hear, or read online can no longer be believed at face value. AI-powered impersonation bypasses even the most sophisticated identity verification systems, making anyone a potential victim of deception on a scale.
"The swift adoption of AI by cyber criminals is already reshaping the threat landscape,” said Lotem Finkelstein, Director of Check Point Research. “While some underground services have become more advanced, all signs point toward an imminent shift - the rise of digital twins. These aren’t just lookalikes or soundalikes, but AI-driven replicas capable of mimicking human thought and behavior. It’s not a distant future - it’s just around the corner.”
Key Threat Insights from the AI Security Report:
At the heart of these developments is AI’s ability to convincingly impersonate and manipulate digital identities, dissolving the boundary between authentic and fake. The report uncovers four core areas where this erosion of trust is most visible:
- AI-Enhanced Impersonation and Social Engineering: Threat actors use AI to generate realistic, real-time phishing emails, audio impersonations, and deepfake videos. Notably, attackers recently mimicked Italy’s defense minister using AI-generated audio, demonstrating that no voice, face, or written word online is safe from fabrication.
- LLM Data Poisoning and Disinformation: Malicious actors manipulate AI training data to skew outputs. A case involving Russia’s disinformation network Pravda showed AI chatbots repeating false narratives 33% of the time, underscoring the need for robust data integrity in AI systems.
- AI-Created Malware and Data Mining: Cyber criminals harness AI to craft and optimize malware, automate DDoS campaigns, and refine stolen credentials. Services like Gabbers Shop use AI to validate and clean stolen data, enhancing its resale value and targeting efficiency.
- Weaponization and Hijacking of AI Models: From stolen LLM accounts to custom-built Dark LLMs like FraudGPT and WormGPT , attackers are bypassing safety mechanisms and commercializing AI as a tool for hacking and fraud on the dark web.
Defensive Strategies:
The report emphasizes that defenders must now assume AI is embedded within adversarial campaigns. To counter this, organizations should adopt AI-aware cyber security frameworks, including:
- AI-Assisted Detection and Threat Hunting: Leverage AI to detect AI-generated threats and artifacts, such as synthetic phishing content and deepfakes.
- Enhanced Identity Verification: Enhanced Identity Verification: Move beyond traditional methods and implement multi-layered identity checks that account for AI-powered impersonation across text, voice, and video—recognizing that trust in digital identity is no longer guaranteed.
-
Threat Intelligence with AI Context:
Equip security teams with the tools to recognize and respond to AI-driven tactics.
"In this AI-driven era, cyber security teams need to match the pace of attackers by integrating AI into their defenses," added Finkelstein. "This report not only highlights the risks but provides the roadmap for securing AI environments safely and responsibly."
The full AI Security Report 2025 is available for download here and join the April 30 livestream for more insights about the report.
Follow Check Point via:
LinkedIn:
https://www.linkedin.com/company/check-point-software-technologies
X (Formerly known as Twitter):
https://www.twitter.com/checkpointsw
Facebook:
https://www.facebook.com/checkpointsoftware
Blog:
https://blog.checkpoint.com
YouTube:
https://www.youtube.com/user/CPGlobal
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. ( www.checkpoint.com ) is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers .
Legal Notice Regarding Forward-Looking Statements
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.
MEDIA CONTACT: | INVESTOR CONTACT: |
Liz Wu | Kip E. Meintzer |
Check Point Software Technologies | Check Point Software Technologies |
[email protected] | [email protected] |