Research July 8, 2018 APT Attack In the Middle East: The Big Bang Over the last few weeks, the Check Point Threat Intelligence Team discovered the comeback of ...
Research June 12, 2018 Deep Dive into UPAS Kit vs. Kronos By Mark Lechtik Introduction In this post we will be analyzing the UPAS Kit and ...
Research June 7, 2018 Scriptable Remote Debugging with Windbg and IDA Pro Required Background: Basic experience with virtual machines, i.e. creating a VM and installing an OS. ...
Research June 7, 2018 May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, ...
Research June 6, 2018 Banking Trojans Under Development Although banks themselves have taken measures to strengthen the security of their authentication processes, Banker ...
Research May 23, 2018 Handling BSODs in Your Sandbox: A Useful Addition to Your Emulation Toolbox In our malware laboratory sandbox, we emulate a large number of samples each day. These ...
Research May 14, 2018 April’s Most Wanted Malware: Cryptomining Malware Targeting Unpatched Server Vulnerabilities After analysing April’s threat data from a global network of sensors and millions of data ...
Research May 8, 2018 Remote Code Execution Vulnerability on LG Smartphones Research by: Slava Makkaveev Background A few months ago, Check Point Research discovered two vulnerabilities ...
Research May 7, 2018 Telegram: Cyber Crime’s Channel of Choice Introduction The Dark Web is a hive of illicit activity. From illegal guns and drug ...
Research May 1, 2018 SiliVaccine: Inside North Korea’s Anti-Virus By: Mark Lechtik and Michael Kajiloti Revealed: In an exclusive piece of research, Check Point ...