• Check Point Research Publications
  • How To Guides
  • Ransomware

Inside Akira Ransomware’s Rust Experiment

December 3, 2024

Executive Summary Check Point Research analyzed the construction and control flow of Akira ransomware’s Rust version that ...

  • Check Point Research Publications
  • Crypto
  • How To Guides

Modern Cryptographic Attacks: A Guide for the Perplexed

July 2, 2024

Introduction Cryptographic attacks, even more advanced ones, are often made more difficult to understand than they need to be. ...

  • How To Guides

How to de-obfuscate a huge AutoIT script in less than two minutes

March 11, 2020

Imagine this scenario: you’re researching a malware sample which starts its execution with unpacking the archive (usually RAR or ZIP one) which ...

  • Check Point Research Publications
  • How To Guides

The Road to Qualcomm TrustZone Apps Fuzzing

November 14, 2019

Research By: Slava Makkaveev Trusted Execution Environment TrustZone is a security extension integrated by ARM into the Corex-A processor. ...

Page 1

POPULAR POSTS