Click here to download all references as Bib-File.
2020-06-08 ⋅ Check Point Research ⋅ GuLoader? No, CloudEyE. CloudEyE |
2020-05-07 ⋅ Checkpoint ⋅ Naikon APT: Cyber Espionage Reloaded Aria-body |
2020-05-05 ⋅ Checkpoint ⋅ Nazar: Spirits of the Past EYService |
2020-04-10 ⋅ Check Point Research ⋅ Threat Actors Migrating to the Cloud |
2020-03-12 ⋅ Check Point Research ⋅ Vicious Panda: The COVID Campaign 8.t Dropper Vicious Panda |
2020-03-12 ⋅ Check Point ⋅ Vicious Panda: The COVID Campaign 8.t Dropper BYEBY Enfal Korlia Poison Ivy |
2020-02-16 ⋅ Check Point Research ⋅ Hamas Android Malware On IDF Soldiers-This is How it Happened Unidentified APK 004 |
2020-02-03 ⋅ Check Point Research ⋅ Warzone: Behind the enemy lines Ave Maria |
2019-12-03 ⋅ Twitter (@_CPResearch_) ⋅ Tweet on Afrodita Ransomware Afrodita |
2019-09-22 ⋅ Check Point Research ⋅ Rancor: The Year of The Phish 8.t Dropper Cobalt Strike |
2019-07-10 ⋅ Check Point Research ⋅ Agent Smith: A New Species of Mobile Malware Agent Smith |
2019-04-24 ⋅ Check Point Research ⋅ Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2019-04-10 ⋅ Check Point ⋅ The Muddy Waters of APT Attacks POWERSTATS |
2019-02-19 ⋅ Check Point Research ⋅ North Korea Turns Against New Targets?! KEYMARBLE |
2018-12-02 ⋅ Check Point ⋅ The Ransomware Doctor Without A Cure Dharma |
2018-07-08 ⋅ Check Point Research ⋅ APT Attack In the Middle East: The Big Bang Micropsia The Big Bang |
2018-06-12 ⋅ Check Point Research ⋅ Deep Dive into UPAS Kit vs. Kronos UPAS |
2018-06-06 ⋅ Check Point ⋅ Banking Trojans Under Development Karius |
2015-03-31 ⋅ Check Point Research ⋅ Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |