Click here to download all references as Bib-File.•
2020-05-05
⋅
Checkpoint
⋅
Nazar: Spirits of the Past EYService |
2020-04-10
⋅
Check Point Research
⋅
Threat Actors Migrating to the Cloud |
2020-03-12
⋅
Check Point Research
⋅
Vicious Panda: The COVID Campaign 8.t Dropper Vicious Panda |
2020-03-12
⋅
Check Point
⋅
Vicious Panda: The COVID Campaign 8.t Dropper BYEBY Enfal Korlia Poison Ivy |
2020-02-16
⋅
Check Point Research
⋅
Hamas Android Malware On IDF Soldiers-This is How it Happened Unidentified APK 004 |
2020-02-03
⋅
Check Point Research
⋅
Warzone: Behind the enemy lines Ave Maria |
2019-12-03
⋅
Twitter (@_CPResearch_)
⋅
Tweet on Afrodita Ransomware Afrodita |
2019-09-22
⋅
Check Point Research
⋅
Rancor: The Year of The Phish 8.t Dropper Cobalt Strike |
2019-07-10
⋅
Check Point Research
⋅
Agent Smith: A New Species of Mobile Malware Agent Smith |
2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2019-04-10
⋅
Check Point
⋅
The Muddy Waters of APT Attacks POWERSTATS |
2019-02-19
⋅
Check Point Research
⋅
North Korea Turns Against New Targets?! KEYMARBLE |
2018-12-02
⋅
Check Point
⋅
The Ransomware Doctor Without A Cure Dharma |
2018-07-08
⋅
Check Point Research
⋅
APT Attack In the Middle East: The Big Bang Micropsia The Big Bang |
2018-06-12
⋅
Check Point Research
⋅
Deep Dive into UPAS Kit vs. Kronos UPAS |
2018-06-06
⋅
Check Point
⋅
Banking Trojans Under Development Karius |
2015-03-31
⋅
Check Point Research
⋅
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign Volatile Cedar |