Ryuk Ransomware: A Targeted Campaign Break-Down

August 20, 2018 3:14 pm

Over the past two weeks, Ryuk, a targeted and well-planned Ransomware, has attacked various organizations worldwide. So far the campaign... Click to Read More

Faxploit: Sending Fax Back to the Dark Ages

August 12, 2018 3:09 pm

Research By: Eyal Itkin and Yaniv Balmas Fax, the brilliant technology that lifted mankind out the dark ages of mail... Click to Read More

Man-in-the-Disk: Android Apps Exposed via External Storage

August 12, 2018 1:09 pm

Research By: Slava Makkaveev Recently, our researchers came across a shortcoming in the design of Android’s use of storage resources.... Click to Read More

FakesApp: A Vulnerability in WhatsApp

August 7, 2018 4:15 am

Research By: Dikla Barda, Roman Zaikin and Oded Vanunu As of early 2018, the Facebook-owned messaging application, WhatsApp, has over... Click to Read More

Ramnit’s Network of Proxy Servers

August 5, 2018 11:30 am

Research By: Alexey Bukhteyev As you may know, Ramnit is one of the most prominent banking malware families in existence today... Click to Read More

Osiris: An Enhanced Banking Trojan

July 31, 2018 8:54 am

Research By: Yaroslav Harakhavik and Nikita Fokin Following our recent analysis of the Kronos banking Trojan, we discovered that Kronos has... Click to Read More

A Malvertising Campaign of Secrets and Lies

July 30, 2018 6:00 am

Check Point Research has uncovered a large Malvertising campaign that starts with thousands of compromised WordPress websites, involves multiple parties... Click to Read More

Emotet: The Tricky Trojan that ‘Git Clones’

July 24, 2018 1:57 am

The Emotet Trojan downloader originally debuted in 2014 as a banking Trojan that took an unusual approach to stealing banking... Click to Read More

GlanceLove: Spying Under the Cover of the World Cup

July 12, 2018 6:02 am

When the whistle of the first match of the 2018 World Cup blew, it didn’t just signal the start of... Click to Read More

Cyber Attack Trends: 2018 Mid-Year Report

July 12, 2018 6:00 am

When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations, as well as the security... Click to Read More