Click here to download all references as Bib-File.
2023-01-06 ⋅ Check Point ⋅ OpwnAI: Cybercriminals Starting to use ChatGPT |
2022-12-15 ⋅ Check Point Research ⋅ Mobile #AlienBot malware starts utilizing an incorporated DGA module Alien |
2022-10-03 ⋅ Check Point ⋅ Bumblebee: increasing its capacity and evolving its TTPs BumbleBee Cobalt Strike Meterpreter Sliver Vidar |
2022-09-22 ⋅ Check Point ⋅ 7 Years of Scarlet Mimic’s Mobile Surveillance Campaign Targeting Uyghurs MobileOrder |
2022-09-21 ⋅ Check Point ⋅ Native function and Assembly Code Invocation MiniDuke |
2022-09-06 ⋅ Check Point ⋅ DangerousSavanna: Two-year long campaign targets financial institutions in French-speaking Africa AsyncRAT Meterpreter PoshC2 DangerousSavanna |
2022-08-29 ⋅ Check Point ⋅ Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications Nitrokod |
2022-07-13 ⋅ Check Point ⋅ A Hit is made: Suspected India-based Sidewinder APT successfully cyber attacks Pakistan military focused targets Unidentified 093 (Sidewinder) |
2022-06-28 ⋅ Twitter (@_CPResearch_) ⋅ Tweet on malware used against Steel Industry in Iran Meteor Predatory Sparrow |
2022-05-31 ⋅ Check Point Research ⋅ XLoader Botnet: Find Me If You Can Xloader |
2022-05-19 ⋅ Check Point ⋅ Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes |
2022-04-12 ⋅ Check Point ⋅ March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance Alien FluBot Agent Tesla Emotet |
2022-03-31 ⋅ State-sponsored Attack Groups Capitalise on Russia-Ukraine War for Cyber Espionage Loki RAT El Machete APT Backdoor Dropper Lyceum .NET DNS Backdoor Lyceum .NET TCP Backdoor Lyceum Golang HTTP Backdoor |
2022-03-10 ⋅ Leaks of Conti Ransomware Group Paint Picture of a Surprisingly Normal Tech Start-Up… Sort Of Conti |
2022-03-07 ⋅ Check Point Research ⋅ Lapsus$ Ransomware gang uses stolen source code to disguise malware files as trustworthy. Check Point customers remain protected LAPSUS |
2022-02-18 ⋅ Check Point ⋅ EvilPlayout: Attack Against Iran’s State Broadcaster EvilPlayout WinScreeny |
2022-02-16 ⋅ Check Point Research ⋅ A Modern Ninja: Evasive Trickbot Attacks Customers of 60 High-Profile Companies TrickBot |
2022-01-24 ⋅ Check Point Research ⋅ Scammers are creating new fraudulent Crypto Tokens and misconfiguring smart contract’s to steal funds |
2022-01-21 ⋅ Twitter (@_CPResearch_) ⋅ Tweet on WhiteLambert malware Lambert |
2022-01-11 ⋅ Check Point ⋅ APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit APT35 |