Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-10-14Check PointBen Herzog
Godzilla Loader and the Long Tail of Malware
2018-08-20Check PointBen Herzog, Itay Cohen
Ryuk Ransomware: A Targeted Campaign Break-Down
Ryuk
2018-08-05Check PointAlexey Bukhteyev
Ramnit’s Network of Proxy Servers
Ngioweb Ramnit
2018-07-24Check PointBen Herzog, Ofer Caspi
Emotet: The Tricky Trojan that ‘Git Clones’
Emotet
2018-07-08Check Point ResearchCheck Point Research
APT Attack In the Middle East: The Big Bang
Micropsia The Big Bang
2018-06-12Check Point ResearchMark Lechtik
Deep Dive into UPAS Kit vs. Kronos
UPAS
2018-06-06Check PointCheck Point Research
Banking Trojans Under Development
Karius
2018-02-04Check PointMark Lechtik
DorkBot: An Investigation
NgrBot
2018-01-12Check PointBogdan Melnykov, Elena Root
Malware Displaying Porn Ads Discovered in Game Apps on Google Play
AdultSwine
2017-12-01Check PointNeomi Rona, Stanislav Skuratovich
Nine circles of Cerber
Cerber
2017-10-19Check PointCheck Point
A New IoT Botnet Storm is Coming
IoT Reaper
2017-07-13Check PointOfer Caspi
OSX/Dok Refuses to Go Away and It’s After Your Money
2017-06-01Check PointCheck Point
FIREBALL – The Chinese Malware of 250 Million Computers Infected
Fireball
2017-05-10Check PointCheck Point
DiamondFox modular malware – a one-stop shop
DiamondFox
2017-05-04Check Point Software Technologies LtdOfer Caspi
OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic
Dok
2017-03-10Check PointCheck Point
Preinstalled Malware Targeting Mobile Users
Loki
2017-01-24Check PointCheck Point
Charger Malware Calls and Raises the Risk on Google Play
Charger
2016-07-01Check PointCheck Point
From HummingBad to Worse
HummingBad
2016-06-17Check PointOren Koriat
In The Wild: Mobile Malware Implements New Features
Triada
2016-05-01Check PointStanislav Skuratovich
Looking into Teslacrypt
TeslaCrypt
2015-11-04Check PointCheck Point
“Offline” Ransomware Encrypts Your Data without C&C Communication
Cryakl
2015-11-01Check PointCheck Point
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES
FireMalv MPKBot Woolger Cleaver Rocket Kitten
2015-10-01Check PointAliaksandr Trafimchuk, Stanislav Skuratovich
Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-06-09Check PointCheck Point
New Data: Volatile Cedar Malware Campaign
Volatile Cedar
2015-06-01Check PointCheck Point
“Troldesh” – New Ransomware from Russia
Troldesh
2015-05-15Check PointStanislav Skuratovich
MATSNU
Matsnu
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-03-30Check PointCheck Point
Volatile Cedar
Volatile Cedar