Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-12-30Check PointCheck Point
THREAT INTELLIGENCE REPORT
lampion
2019-12-03Twitter (@_CPResearch_)Check Point Research
Tweet on Afrodita Ransomware
Afrodita
2019-11-19Check PointAlexey Bukhteyev
Phorpiex Breakdown
Phorpiex
2019-09-22Check Point ResearchCheck Point Research
Rancor: The Year of The Phish
8.t Dropper Cobalt Strike
2019-08-10Check PointOmer Gull
SELECT code_execution FROM * USING SQLite;
Azorult Loki Password Stealer (PWS) Pony
2019-07-10Check Point ResearchCheckpoint Research
Agent Smith: A New Species of Mobile Malware
Agent Smith
2019-07-09Check PointIsrael Gubi
The 2019 Resurgence of Smokeloader
SmokeLoader
2019-06-20Check PointAliaksandr Chailytko, Yaroslav Harakhavik
DanaBot Demands a Ransom Payment
DanaBot
2019-06-19Check PointKobi Eisenkraft, Moshe Hayun
Check Point’s Threat Emulation Stops Large-Scale Phishing Campaign in Germany
Remcos
2019-05-20Check PointBen Herzog
Malware Against the C Monoculture
AdWind jRAT GhostMiner Zebrocy
2019-04-24Check Point ResearchItay Cohen
Deobfuscating APT32 Flow Graphs with Cutter and Radare2
Salgorea
2019-04-22Check PointCheck Point
FINTEAM: Trojanized TeamViewer Against Government Targets
FINTEAM
2019-04-10Check PointCheck Point Research
The Muddy Waters of APT Attacks
POWERSTATS
2019-02-27Check PointCheck Point
Protecting Against WinRAR Vulnerabilities
Orcus RAT
2019-02-19Check Point ResearchCheck Point
North Korea Turns Against New Targets?!
KEYMARBLE
2018-12-02Check PointCheck Point Research
The Ransomware Doctor Without A Cure
Dharma
2018-11-30Check PointItay Cohen
The Evolution of BackSwap
BackSwap
2018-10-17Check PointIsrael Gubi
The Emergence of the New Azorult 3.3
Azorult
2018-10-14Check PointBen Herzog
Godzilla Loader and the Long Tail of Malware
2018-08-20Check PointBen Herzog, Itay Cohen
Ryuk Ransomware: A Targeted Campaign Break-Down
Ryuk