I love to get stuck in and let the creative juices flow. My strengths lie in idea generation, development and execution. Over 5 years experience in B2B cybersecurity. I reign supreme when my imagination and creativity can run wild.
Following Cyberint’s acquisition by Check Point at the end of 2024, we’ve only accelerated across our platform and services. This year-in-review highlights the biggest achievements of 2025, spanning AI innovation, huge advancements in threat intelligence, brand protection, and attack surface management, global coverage and most importantly customer impact.
We deepened our use of AI to deliver clear, actionable insights. In addition to AI-powered summaries for threat intelligence alerts, we launched our MCP Server. Our MCP lets you ask questions of your own threat data in plain English and receive contextual answers in seconds
We introduced an integration with Check Point’s Quantum to make vulnerability remediation not just faster, but smarter. Traditionally, closing exposure gaps can take days or even weeks, leaving organizations vulnerable during that window. With Quantum, remediation is streamlined and automated. The issues are identified, prioritized, and patched quickly across your environment.
We were named a Leader and Outperformer in Attack Surface Management (ASM) by GigaOm, which is a testament to our strength in automation, threat intelligence, and solution maturity. The report evaluated 29 ASM solutions, placing us as a “top performer in the Maturity/Platform Play quadrant”.

According to GigaOm analyst Chris Ray, “Cyberint achieved its Outperformer status thanks to its innovative approach to threat intelligence and robust integration capabilities. The company’s continuous improvement of core features, along with an expanded scope of threat intelligence and more accurate alerts, positions it for significant market growth in the coming years.”
Together with the rest of the Check Point Infinity platform, our External Risk Management solution delivers:
This combination of automated asset discovery, continuous risk monitoring, and enriched threat context empowers security teams to manage external risks with confidence, responding swiftly to emerging threats, earning us the GigaOm accolade.
We advanced our threat intelligence offerings substantially. We scaled our malware and threat actor knowledgebase and added an attack knowledgebase. We also introduced a dedicated space for strategic intelligence within our threat intelligence module.
With Check Point telemetry absorbed into our global threat intelligence, we now process billions of data points. ThreatCloud AI aggregates and analyzes big data telemetry and millions of Indicators of Compromise (IoCs) daily. Our threat intelligence database is fed by 150,000
connected networks, millions of endpoint devices, Check Point Research (CP), and dozens of external feeds—powered by more than 50 engines with AI-based capabilities.
ThreatCloud AI employs advanced AI to detect and neutralize novel threats, using big data to update defenses with the latest IoCs. It enhances security across network (Quantum), cloud (CloudGuard), operations (Infinity), and user access (Harmony).
Not only that, but our new Threat Intelligence browser extension brings context to wherever you work, from webpages to SIEM, EDR, blogs, forums, and news. With one click, you get instant intel from the deep, dark, and open web, including:

Get the extension: https://chromewebstore.google.com/detail/threat-intelligence-by-cy/nkiomlfnhcldoiogembgepanimfdafip
You can now take risk assessment further by determining whether detected issues are actually exploitable. Instead of producing lists of passively observed risks, AEV identifies which vulnerabilities can be exploited by threat actors to breach your organization.
Through automated simulations of known CVE exploitation and mimicked attacks, such as credential stuffing, SQL injection, and path traversal, teams can see in real time which vulnerabilities across their attack surface are truly exploitable and should be prioritized.
AEV also uncovers risks outside traditional vulnerability databases, including issues in custom web applications that may lack assigned CVE numbers but still pose significant harm.
For example, a major vulnerability in a hospital’s natively developed patient management system would primarily affect that hospital and its patients, and typically wouldn’t receive a CVE. AEV surfaces these organization-specific risks so you can address them promptly.
Bonus for teams: You can assign alerts to analysts and filter alerts by owner to streamline prioritization and response.
Have a suspicious file? Upload it to our new sandbox module for automated analysis. Understand behavior with AI-powered detection, get malware classification, related indicators, and attack timelines, and export a full forensic report in seconds. It’s fast, automated, and built for threat hunters.

We delivered major advancements in brand protection, from lookalike domain monitoring to coverage across platforms like TikTok, to achieving unmatched takedown outcomes:
We met customers around the world and held events with them, from CPX with thousands of Check Point and Cyberint customers, to panels in the Philippines with more than 100 attendees, to intimate helicopter rides over London, and digital conversations during our Reddit AMA.
We also met prospects at hundreds of conferences and roadshows globally, spoke at renowned events such as RSA 2025.

We were featured in major outlets including Politico, CBS, Fox News, HackerNews, MSSP Alert, Bleeping Computer, and Dark Reading. This level of coverage isn’t just a badge of honor, it signals trust and relevance in the global cybersecurity conversation. It also amplifies our voice to decision-makers, security leaders, and practitioners worldwide, reinforcing Cyberint’s position as a thought leader and trusted partner in the fight against cyber threats.
Alongside this media presence, we produced a wealth of content in 2025, from countless ebooks and in-depth industry reports to breaking news stories, giving security teams actionable knowledge and practical guidance throughout the year.

We reached 15,000 followers on our LinkedIn page and continued to earn top marks from customers—with a 4.6/5 rating on G2—outperforming competitors across categories.

2026 looks no slower, in fact we are accelerating product growth. Stay tuned for a massive announcement in January.
Want more details or a demo of what’s coming? Reach out to us: https://www.cyberint.com/contact-us
©1994–2026 Check Point Software Technologies Ltd. All rights reserved.
Copyright | Privacy Policy | Cookie Settings | Get the Latest News
Fill in your business email to start