Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-06-01Check PointCheck Point
FIREBALL – The Chinese Malware of 250 Million Computers Infected
Fireball
2017-05-10Check PointCheck Point
DiamondFox modular malware – a one-stop shop
DiamondFox
2017-05-04Check Point Software Technologies LtdOfer Caspi
OSX Malware is Catching Up, and it wants to Read Your HTTPS Traffic
Dok
2017-03-10Check PointCheck Point
Preinstalled Malware Targeting Mobile Users
Loki
2017-01-24Check PointCheck Point
Charger Malware Calls and Raises the Risk on Google Play
Charger
2016-07-01Check PointCheck Point
From HummingBad to Worse
HummingBad
2016-06-17Check PointOren Koriat
In The Wild: Mobile Malware Implements New Features
Triada
2016-05-01Check PointStanislav Skuratovich
Looking into Teslacrypt
TeslaCrypt
2015-11-04Check PointCheck Point
“Offline” Ransomware Encrypts Your Data without C&C Communication
Cryakl
2015-11-01Check PointCheck Point
ROCKET KIT TEN: A CAMPAIGN WITH 9 LIVES
FireMalv MPKBot Woolger Cleaver Rocket Kitten
2015-10-01Check PointAliaksandr Trafimchuk, Stanislav Skuratovich
Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-10-01Check PointAliaksandr Trafimchuk, Stanislav Skuratovich
Digging for Groundhogs: Holes in your Linux server
XOR DDoS
2015-06-09Check PointCheck Point
New Data: Volatile Cedar Malware Campaign
Volatile Cedar
2015-06-01Check PointCheck Point
“Troldesh” – New Ransomware from Russia
Troldesh
2015-05-15Check PointStanislav Skuratovich
MATSNU
Matsnu
2015-03-31Check Point ResearchCheck Point Research
Volatile Cedar - Analysis of a Global Cyber Espionage Campaign
Volatile Cedar
2015-03-30Check PointCheck Point
Volatile Cedar
Volatile Cedar