Vulnerabilities & Exploits

New Check Point Report Flags Ransomware Surge, Supply‑Chain Threats, Credential‑Stuffing Spike

New Check Point Report Flags Ransomware Surge, Supply‑Chain Threats, Credential‑Stuffing Spike

Check Point’s February 2, 2026 Threat Intelligence Report highlights a sharp uptick in ransomware activity, more sophisticated supply‑chain exploitation, and a resurgence of credential‑stuffing attacks across finance, healthcare, retail, and critical infrastructure. The ransomware landscape now favors double‑extortion tactics, where threat actors encrypt data and threaten
7secure