Research May 24, 2016 The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took ...
Research May 19, 2016 Everyday Malware Poses a Risk to Critical Infrastructure Many people believe that only state-sponsored attacks can endanger critical infrastructure. They claim that such ...
Research May 18, 2016 Hack In The Box: How Attackers Manipulate Root Access and Configuration Changes Securing iOS and Android smartphones and tablets is still a relatively new concept. Taking control ...
Research May 17, 2016 Inside Nuclear’s Core: Unraveling a Ransomware-as-a-Service Infrastructure The Check Point Research team has uncovered the entire operation of one of the world’s ...
Research May 9, 2016 Viking Horde: A New Type of Android Malware on Google Play The Check Point research team uncovered a new Android malware campaign on Google Play it ...
Research April 28, 2016 Marcher Marches On: The Anatomy of a Banker Malware Not very often do we have the chance to observe the full flow of an ...
Research April 26, 2016 Digging Deeper: How Ransomware and Malware use Microsoft Windows’ Known Binaries Since Windows 7 is the most popular operating system (OS) among PCs, many malware choose ...
Security April 8, 2016 Malvertising: When Advertising Becomes Dangerous Over the last several months, the BBC, the New York Times, and other major news ...
Security March 8, 2016 Top Malware Families Found in January 2016 Show DDoS on the Rise Distributed denial of service (DDoS) attacks are common threats that companies of all sizes have ...
Research February 11, 2016 Campaign Targeting WordPress: Users being Redirected to Angler Exploit Kit In the past week, a massive campaign targeting WordPress-based websites has been reported by several ...