Click here to download all references as Bib-File.•
| 2019-09-22
⋅
Check Point Research
⋅
Rancor: The Year of The Phish 8.t Dropper Cobalt Strike |
| 2019-08-10
⋅
Check Point
⋅
SELECT code_execution FROM * USING SQLite; Azorult Loki Password Stealer (PWS) Pony |
| 2019-07-10
⋅
Check Point Research
⋅
Agent Smith: A New Species of Mobile Malware Agent Smith |
| 2019-07-09
⋅
Check Point
⋅
The 2019 Resurgence of Smokeloader SmokeLoader |
| 2019-06-20
⋅
Check Point
⋅
DanaBot Demands a Ransom Payment DanaBot |
| 2019-06-19
⋅
Check Point
⋅
Check Point’s Threat Emulation Stops Large-Scale Phishing Campaign in Germany Remcos |
| 2019-05-20
⋅
Check Point
⋅
Malware Against the C Monoculture AdWind jRAT GhostMiner Zebrocy |
| 2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
| 2019-04-22
⋅
Check Point
⋅
FINTEAM: Trojanized TeamViewer Against Government Targets FINTEAM |
| 2019-04-10
⋅
Check Point
⋅
The Muddy Waters of APT Attacks POWERSTATS |
| 2019-02-27
⋅
Check Point
⋅
Protecting Against WinRAR Vulnerabilities Orcus RAT |
| 2019-02-19
⋅
Check Point Research
⋅
North Korea Turns Against New Targets?! KEYMARBLE |
| 2018-12-02
⋅
Check Point
⋅
The Ransomware Doctor Without A Cure Dharma |
| 2018-11-30
⋅
Check Point
⋅
The Evolution of BackSwap BackSwap |
| 2018-10-17
⋅
Check Point
⋅
The Emergence of the New Azorult 3.3 Azorult |
| 2018-10-14
⋅
Check Point
⋅
Godzilla Loader and the Long Tail of Malware |
| 2018-08-20
⋅
Check Point
⋅
Ryuk Ransomware: A Targeted Campaign Break-Down Ryuk |
| 2018-08-05
⋅
Check Point
⋅
Ramnit’s Network of Proxy Servers Ngioweb Ramnit |
| 2018-07-24
⋅
Check Point
⋅
Emotet: The Tricky Trojan that ‘Git Clones’ Emotet |
| 2018-07-08
⋅
Check Point Research
⋅
APT Attack In the Middle East: The Big Bang Micropsia The Big Bang |