Author Archives for Richard Clayton

Labeless Part 2: Installation

August 23, 2018 4:16 am Published by Comments Off on Labeless Part 2: Installation

In this part we will be guiding you through the installation of Labeless. Post install steps to verify that installation was done correctly are also provided below. Of course, if you’re new to... Click to Read More


Labeless Part 1: An Introduction

August 23, 2018 4:15 am Published by Comments Off on Labeless Part 1: An Introduction

Labeless, a plugin for both IDA and popular debuggers, is an invaluable tool in the researcher’s tool kit. In this first part of a four part series, we will be mainly introducing Labeless... Click to Read More


Ryuk Ransomware: A Targeted Campaign Break-Down

August 20, 2018 3:14 pm Published by Comments Off on Ryuk Ransomware: A Targeted Campaign Break-Down

Over the past two weeks, Ryuk, a targeted and well-planned Ransomware, has attacked various organizations worldwide. So far the campaign has targeted several enterprises, while encrypting hundreds of PC, storage and data centers... Click to Read More


FakesApp: A Vulnerability in WhatsApp

August 7, 2018 4:15 am Published by Comments Off on FakesApp: A Vulnerability in WhatsApp

Research By: Dikla Barda, Roman Zaikin and Oded Vanunu As of early 2018, the Facebook-owned messaging application, WhatsApp, has over 1.5 billion users with over one billion groups and 65 billion messages sent... Click to Read More


Ramnit’s Network of Proxy Servers

August 5, 2018 11:30 am Published by Comments Off on Ramnit’s Network of Proxy Servers

Research By: Alexey Bukhteyev As you may know, Ramnit is one of the most prominent banking malware families in existence today and lately Check Point Research monitored a new massive campaign of Ramnit, dubbed... Click to Read More


Osiris: An Enhanced Banking Trojan

July 31, 2018 8:54 am Published by Comments Off on Osiris: An Enhanced Banking Trojan

Research By: Yaroslav Harakhavik and Nikita Fokin Following our recent analysis of the Kronos banking Trojan, we discovered that Kronos has also now been enhanced to hide its communication with C&C server using Tor.... Click to Read More