Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-05CheckpointIdo Solomon, Omer Ventura, Ori Hamama
INJ3CTOR3 Operation – Leveraging Asterisk Servers for Monetization
2020-10-26CheckpointEyal Itkin, Itay Cohen
Exploit Developer Spotlight: The Story of PlayBit
Dyre Maze PyLocky Ramnit REvil
2020-10-26CheckpointEyal Itkin, Itay Cohen
Exploit Developer Spotlight: The Story of PlayBit
Dyre Maze PyLocky Ramnit REvil
2020-09-15CheckpointAmir Landau, David Driker
Rudeminer, Blacksquid and Lucifer Walk Into A Bar
Lucifer
2020-09-15CheckpointAmir Landau, David Driker
Rudeminer, Blacksquid and Lucifer Walk Into A Bar
Lucifer
2020-08-28CheckpointCheck Point Research
Gozi: The Malware with a Thousand Faces
DreamBot ISFB LOLSnif SaiGon
2020-08-27CheckpointAlex Ilgayev
An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods
QakBot
2020-07-21CheckpointCheckpoint
How scammers are hiding their phishing trips in public clouds
2020-07-09CheckpointAviran Hazum, Bogdan Melnykov, Israel Wernik
New Joker variant hits Google Play with an old trick
Joker
2020-07-09CheckpointAviran Hazum, Bogdan Melnykov, Israel Wernik
New Joker variant hits Google Play with an old trick
Joker
2020-07-09CheckpointAviran Hazum, Bogdan Melnykov, Israel Wernik
New Joker variant hits Google Play with an old trick
Joker
2020-05-07CheckpointCheck Point Research
Naikon APT: Cyber Espionage Reloaded
Aria-body
2020-05-05CheckpointCheck Point Research
Nazar: Spirits of the Past
EYService
2020-01-27CheckpointCheckpoint Research
Phorpiex Arsenal: Part I
Phorpiex
2019-07-10Check Point ResearchCheckpoint Research
Agent Smith: A New Species of Mobile Malware
Agent Smith
2019-02-04CheckpointCheckpoint
SpeakUp: A New Undetected Backdoor Linux Trojan
SpeakUp
2013-12-12CheckpointCheckpoint
Malware Research Group HIMAN Malware Analysis
himan