Check Point Blog

Threat Research May 24, 2016

The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle

Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took place mainly to avoid signature-based detection employed by many security vendors. To understand how this is achieved, one must first…

Read More