Research May 19, 2016 Everyday Malware Poses a Risk to Critical Infrastructure Many people believe that only state-sponsored attacks can endanger critical infrastructure. They claim that such ...
Research May 12, 2016 The Notorious TeslaCrypt V3 Ransomware: A Comprehensive Analysis As the current wave of ransomware rages on, one stands out in its ability to ...
Research April 26, 2016 Check Point Threat Alert: CryptXXX Ransomware CryptXXX ransomware has been observed in the wild as of March 2016, delivered via the ...
Research April 26, 2016 Digging Deeper: How Ransomware and Malware use Microsoft Windows’ Known Binaries Since Windows 7 is the most popular operating system (OS) among PCs, many malware choose ...
Research April 15, 2016 KOVTER RANSOMWARE – THE EVOLUTION: From Police Scareware to Click Frauds and then to Ransomware In terms of cyber security research, the Kovter malware family is very interesting. A wide-spread ...
Research April 11, 2016 Decrypting the Petya Ransomware Petya is a relatively new ransomware variant that first appeared on the cyber-crime scene at ...
Research April 11, 2016 New Locky Variant Implements Evasion Techniques Following Check Point’s recent discovery of a new communication scheme implemented by the Locky ransomware, ...
Research April 6, 2016 Ransomware: Cybercriminals New Attack of Choice In recent years, we’ve seen banker malware as the most prominent threat in the cyber ...
Research April 1, 2016 Check Point Threat Alert: Ransomware Campaigns Using .JS Inside Archives Recently there is noticeable increase in using JavaScript files inside archives as a means to ...
Research March 28, 2016 Check Point Threat Alert: SamSam and Maktub Ransomware Evolution Executive Summary New and evolving ransomware campaigns, dubbed ‘SamSam’ and ‘Maktub’, use techniques not commonly ...