• CheckPoint.com
  • Facebook
  • Google Plus
  • LinkedIn
  • E-Mail Checked Point Research
  • RSS
  • Twitter
Check Point Research
  • Publications
    • Threat Research
    • CPRadio
    • Attack Reports
  • Tools
    • CPR Zero- Vulnerability Repository
    • Evasion techniques Encyclopedia
    • Anti-Debug Tricks
    • SandBlast File Analysis
    • How-To Guides
    • URL Categorization
    • Instant Security Assessment
    • Live Threat Map
  • About Us
  • Contact Us
  • Subscribe
  • Are You Under Attack?
MENU

Ransomversary : Wannacry’s 5th Anniversary Special and The Evolution of Ransomware

May 11, 2022

Five years ago today, the world witnessed the most destructive ransomware attack ever. Its name was Wannacry, and it changed everything. What happened, how has ransomware evolved since, and have we learned our lesson? Or could something just like it happen again?

Related Articles

Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

New Wormable Android Malware Spreads by Creating Auto-Replies to Messages in WhatsApp

Vulnerability in Google Play Core Library Remains Unpatched in Google Play Applications

Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints

Keeping the gate locked on your IoT devices: Vulnerabilities found on Amazon’s Alexa

New Joker variant hits Google Play with an old trick

Would you like some RCE with your Guacamole?

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure (Part I)

Canadian banks targeted in a massive phishing campaign

#ALHACK: One codec to hack the whole world

16th May – Threat Intelligence Report

9th May – Threat Intelligence Report

Inside Russia’s Biggest Ransomware Operation

Publications
  • GLOBAL CYBER ATTACK REPORTS
  • RESEARCH PUBLICATIONS
  • IPS ADVISORIES
  • CHECK POINT BLOG
  • DEMOS
Tools
  • SANDBLAST FILE ANALYSIS
  • URL CATEGORIZATION
  • INSTANT SECURITY ASSESSMENT
  • LIVE THREAT MAP
About Us
Contact Us
Subscribe

© 1994 Check Point Software Technologies LTD. All rights reserved.
Property of CheckPoint.com | Privacy Policy

Call For Papers