• Check Point Research Publications
  • Threat Research

Native function and Assembly Code Invocation

September 21, 2022

Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that ...

  • Check Point Research Publications
  • Threat Research

DangerousSavanna: Two-year long campaign targets financial institutions in French-speaking Africa

September 6, 2022

Introduction Recent studies show that more than 85% of financial institutions in Central and Western Africa have repeatedly been ...

  • Check Point Research Publications

Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications

August 29, 2022

Research by: Moshe Marelus Highlights: Check Point Research (CPR) detected a Turkish based crypto miner malware campaign, dubbed ...

  • Android Malware
  • Check Point Research Publications

Researching Xiaomi’s TEE to get to Chinese money

August 12, 2022

Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app ...

Page 27

POPULAR POSTS