Click here to download all references as Bib-File.•
2019-12-30
⋅
Check Point
⋅
THREAT INTELLIGENCE REPORT lampion |
2019-12-03
⋅
Twitter (@_CPResearch_)
⋅
Tweet on Afrodita Ransomware Afrodita |
2019-11-19
⋅
Check Point
⋅
Phorpiex Breakdown Phorpiex |
2019-09-22
⋅
Check Point Research
⋅
Rancor: The Year of The Phish 8.t Dropper Cobalt Strike |
2019-08-10
⋅
Check Point
⋅
SELECT code_execution FROM * USING SQLite; Azorult Loki Password Stealer (PWS) Pony |
2019-07-10
⋅
Check Point Research
⋅
Agent Smith: A New Species of Mobile Malware Agent Smith |
2019-07-09
⋅
Check Point
⋅
The 2019 Resurgence of Smokeloader SmokeLoader |
2019-06-20
⋅
Check Point
⋅
DanaBot Demands a Ransom Payment DanaBot |
2019-06-19
⋅
Check Point
⋅
Check Point’s Threat Emulation Stops Large-Scale Phishing Campaign in Germany Remcos |
2019-05-20
⋅
Check Point
⋅
Malware Against the C Monoculture AdWind jRAT GhostMiner Zebrocy |
2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2019-04-22
⋅
Check Point
⋅
FINTEAM: Trojanized TeamViewer Against Government Targets FINTEAM |
2019-04-10
⋅
Check Point
⋅
The Muddy Waters of APT Attacks POWERSTATS |
2019-02-27
⋅
Check Point
⋅
Protecting Against WinRAR Vulnerabilities Orcus RAT |
2019-02-19
⋅
Check Point Research
⋅
North Korea Turns Against New Targets?! KEYMARBLE |
2018-12-02
⋅
Check Point
⋅
The Ransomware Doctor Without A Cure Dharma |
2018-11-30
⋅
Check Point
⋅
The Evolution of BackSwap BackSwap |
2018-10-17
⋅
Check Point
⋅
The Emergence of the New Azorult 3.3 Azorult |
2018-10-14
⋅
Check Point
⋅
Godzilla Loader and the Long Tail of Malware |
2018-08-20
⋅
Check Point
⋅
Ryuk Ransomware: A Targeted Campaign Break-Down Ryuk |