• Check Point Research Publications

Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)

July 9, 2024

by Haifei Li Introduction and Background Check Point Research recently discovered that threat actors have been using novel (or ...

  • Check Point Research Publications

Exploring Compiled V8 JavaScript Usage in Malware

July 8, 2024

Author: Moshe Marelus Introduction In recent months, CPR has been investigating the usage of compiled V8 JavaScript by malware ...

  • Check Point Research Publications
  • Crypto
  • How To Guides
July 2, 2024

Introduction Cryptographic attacks, even more advanced ones, are often made more difficult to ...

  • Check Point Research Publications
June 3, 2024

Research by:  Jiri Vinopal Highlights: Check Point Research (CPR) reveals the ...

  • Check Point Research Publications
  • Threat Research
May 28, 2024

Packers or crypters are widely used to protect malicious software from detection and static analysis. These ...

  • Check Point Research Publications
May 23, 2024

Key Findings Sharp Dragon’s (Formerly referred to as Sharp Panda) operations continue, expanding ...

  • Check Point Research Publications
May 20, 2024

Void Manticore is an Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS). ...

  • Check Point Research Publications
May 14, 2024

Research by: Antonis Terefos Introduction PDF (Portable Document Format) files have become an ...

Page 1

POPULAR POSTS