Research October 17, 2018 The Emergence of the New Azorult 3.3 Research by: Israel Gubi During the last week, Check Point Research spotted a new version ...
Research October 14, 2018 Godzilla Loader and the Long Tail of Malware Research by: Ben Herzog To most victims, malware is a force of nature. Zeus, Wannacry, ...
Research October 3, 2018 Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware In this part we show how to deal with obfuscated Windows API calls in Ngioweb ...
Research October 3, 2018 Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm. In this part we show how to decrypt strings present in the module of Boleto ...
Research October 3, 2018 Labeless Part 4: Scripting In this part of our Labeless series, we will discuss the theory behind Labeless scripting. ...
Research September 27, 2018 The ‘Gazorp’ Dark Web Azorult Builder Research by: Nikita Fokin, Israel Gubi, Mark Lechtik On 17th September Check Point Research found ...
Research September 19, 2018 The Past, the Present, and the Future of Illicit Cryptomining: Cyber Threat Alliance Publishes Landmark White Paper Every month, Check Point publishes its Monthly Top Malware Report, tracking the latest trends and ...
Research September 13, 2018 Meet Black Rose Lucy, the Latest Russian MaaS Botnet Research By: Feixiang He, Bogdan Melnykov, Andrey Polkovnichenko An organization needs to have a collaborative ...
Research September 7, 2018 Domestic Kitten: An Iranian Surveillance Operation Chinese strategist Sun Tzu, Italian political philosopher Machiavelli and English philosopher Thomas Hobbes all justified ...
Research August 30, 2018 Ransom Warrior Decryption Tool On August 8th, a new ransomware, dubbed ‘RansomWarrior’, was found by the Malware Hunter Team. Going ...