Home
News
Tech Grid
Interviews
Anecdotes
Think Stack
Press Releases
Articles
  • Threat Intelligence

Check Point 2026 Report: 2,000 Weekly Attacks as AI Fuels Threats


Check Point 2026 Report: 2,000 Weekly Attacks as AI Fuels Threats
  • by: Source Logo
  • |
  • January 29, 2026

Check Point Software Technologies Ltd. has released its 14th annual Cyber Security Report 2026, highlighting a dramatic escalation in cyber threats. Organizations faced an average of 1,968 attacks per week in 2025—a 70% increase since 2023—as attackers leverage AI, automation, and multi-channel social engineering to scale operations and enhance effectiveness across industries.

Quick Intel

  • Global organizations experienced nearly 2,000 cyber attacks per week on average in 2025, up 70% from 2023.
  • AI is transforming attack mechanics, enabling faster reconnaissance, personalized social engineering, and autonomous techniques.
  • Ransomware ecosystem fragmented further, with a 53% rise in extorted victims and 50% increase in new ransomware-as-a-service groups.
  • ClickFix social engineering techniques surged 500%, while phone-based impersonation evolved into structured enterprise intrusions.
  • 89% of organizations encountered risky AI prompts over a three-month period, with 1 in 41 classified as high risk.
  • 40% of 10,000 Model Context Protocol (MCP) servers showed security weaknesses, exposing growing risks in AI infrastructure.

AI Accelerating the Threat Landscape

Attackers are embedding AI across workflows, moving from manual to increasingly autonomous operations. This shift allows rapid scaling, multi-channel coordination, and exploitation of trust in digital workspaces. Capabilities once limited to sophisticated actors are now democratized, enabling more targeted and persistent campaigns against organizations of all sizes.

“AI is changing the mechanics of cyber attacks, not just their volume,” said Lotem Finkelstein, VP of Research at Check Point Software. “We are seeing attackers move from purely manual operations to increasingly higher levels of automation, with early signs of autonomous techniques emerging. Defending against this shift requires revalidating security foundations for the AI era and stopping threats before they can propagate.”

Key Attack Trends and Vectors

  • Ransomware Fragmentation — Decentralized groups specialize and scale, using AI for targeting, negotiation, and efficiency.
  • Multi-Channel Social Engineering — Attacks span email, web, phone, and collaboration tools, with ClickFix and impersonation tactics surging.
  • Edge and Infrastructure Exploitation — Unmonitored devices, VPNs, and IoT systems serve as stealthy relay points.
  • AI Infrastructure Risks — Weaknesses in MCP servers and high-risk prompts highlight emerging exposures as AI integrates into enterprise environments.

Recommendations for Security Leaders

Check Point advocates a prevention-first strategy to counter machine-speed threats:

  • Revalidate security controls across networks, endpoints, cloud, email, and SASE for AI-era resilience.
  • Enable secure AI adoption with governance and visibility over sanctioned and unsanctioned usage.
  • Protect the digital workspace where human trust meets AI automation.
  • Harden edge devices, VPNs, and IoT to reduce hidden entry points.
  • Adopt unified visibility and prevention across hybrid environments to eliminate blind spots.

The full Cyber Security Report 2026 is available for download here. Check Point will host a livestream discussing key findings and recommendations.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers.

  • Cyber SecurityA Iin CyberCyber Threats
News Disclaimer
  • Share