Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-02-19Check Point ResearchCheck Point
North Korea Turns Against New Targets?!
KEYMARBLE
2018-12-02Check PointCheck Point Research
The Ransomware Doctor Without A Cure
Dharma
2018-11-30Check PointItay Cohen
The Evolution of BackSwap
BackSwap
2018-10-17Check PointIsrael Gubi
The Emergence of the New Azorult 3.3
Azorult
2018-10-14Check PointBen Herzog
Godzilla Loader and the Long Tail of Malware
2018-08-20Check PointBen Herzog, Itay Cohen
Ryuk Ransomware: A Targeted Campaign Break-Down
Ryuk
2018-08-20Check PointBen Herzog, Itay Cohen
Ryuk Ransomware: A Targeted Campaign Break-Down
Ryuk
2018-08-05Check PointAlexey Bukhteyev
Ramnit’s Network of Proxy Servers
Ngioweb Ramnit
2018-07-24Check PointBen Herzog, Ofer Caspi
Emotet: The Tricky Trojan that ‘Git Clones’
Emotet
2018-07-24Check PointBen Herzog, Ofer Caspi
Emotet: The Tricky Trojan that ‘Git Clones’
Emotet
2018-07-08Check Point ResearchCheck Point Research
APT Attack In the Middle East: The Big Bang
Micropsia The Big Bang
2018-06-12Check Point ResearchMark Lechtik
Deep Dive into UPAS Kit vs. Kronos
UPAS
2018-06-06Check PointCheck Point Research
Banking Trojans Under Development
Karius
2018-02-04Check PointMark Lechtik
DorkBot: An Investigation
NgrBot
2018-01-12Check PointBogdan Melnykov, Elena Root
Malware Displaying Porn Ads Discovered in Game Apps on Google Play
AdultSwine
2018-01-12Check PointBogdan Melnykov, Elena Root
Malware Displaying Porn Ads Discovered in Game Apps on Google Play
AdultSwine
2017-12-01Check PointNeomi Rona, Stanislav Skuratovich
Nine circles of Cerber
Cerber
2017-12-01Check PointNeomi Rona, Stanislav Skuratovich
Nine circles of Cerber
Cerber
2017-10-19Check PointCheck Point
A New IoT Botnet Storm is Coming
IoT Reaper
2017-07-13Check PointOfer Caspi
OSX/Dok Refuses to Go Away and It’s After Your Money