Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-16Check Point ResearchCheck Point Research
Hamas Android Malware On IDF Soldiers-This is How it Happened
Unidentified APK 004
2020-02-03Check Point ResearchYaroslav Harakhavik
Warzone: Behind the enemy lines
Ave Maria
2019-12-03Twitter (@_CPResearch_)Check Point Research
Tweet on Afrodita Ransomware
Afrodita
2019-09-22Check Point ResearchCheck Point Research
Rancor: The Year of The Phish
8.t Dropper Cobalt Strike
2019-07-10Check Point ResearchCheckpoint Research
Agent Smith: A New Species of Mobile Malware
Agent Smith
2019-04-24Check Point ResearchItay Cohen
Deobfuscating APT32 Flow Graphs with Cutter and Radare2
Salgorea
2019-04-10Check PointCheck Point Research
The Muddy Waters of APT Attacks
POWERSTATS
2019-02-19Check Point ResearchCheck Point
North Korea Turns Against New Targets?!
KEYMARBLE
2018-12-02Check PointCheck Point Research
The Ransomware Doctor Without A Cure
Dharma
2018-07-08Check Point ResearchCheck Point Research
APT Attack In the Middle East: The Big Bang
Micropsia The Big Bang
2018-06-12Check Point ResearchMark Lechtik
Deep Dive into UPAS Kit vs. Kronos
UPAS
2018-06-06Check PointCheck Point Research
Banking Trojans Under Development
Karius
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar