Check Point Software: Leader in Cyber Security Solutions Archived: 2026-04-05 17:41:34 UTC Secure Your AI Transformation Join us Thursday, April 9th 2026 Pictured (left to right): David Haber, AI Security, Eyal Manor, Hybrid Mesh Network Security, Nataly Kremer, Chief Product Officer Pictured (left to right): Gil Friedrich, Workspace Security, Yochai Corem, VP External Risk Management Protecting Everything That's Connected Helping you secure AI where you use it. Everywhere. Hybrid Mesh Network Security Hybrid Mesh Network Security Zero Trust security on-premises, in the cloud, and at the coffee shop. Workspace Security Workspace Security Protect your people, their devices, and their apps wherever they are. Exposure Management Exposure Management Turn intelligence into action, now. AI Security AI Security Build your AI-first enterprise, safely. Protecting Customers Around the Globe We help our customers safeguard their IT estate, their data, their brand, and their reputation. Setting New Industry Standards https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/ Page 1 of 2 Building on our legacy of cyber security leadership every day. Get the Latest Security Insights and Innovations Staying ahead requires trustworthy insights you can count on. Keep One Step Ahead of Cyber Threats Real-time insight into global attacks, vulnerabilities, and risks. Animated Threat Map Test Drive Check Point Today Discover how our innovations secure your network, cloud, and user/access. Source: https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/ https://www.checkpoint.com/press/2022/march-2022s-most-wanted-malware-easter-phishing-scams-help-emotet-assert-its-dominance/ Page 2 of 2