Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

SSL/TLS based Malware Attacks

This widget could not be displayed.
2 Comments
Ryan_St__Germai
Advisor

For real world examples take a look at any public detonation service like https://app.any.run, specifically post-exploitation activity. URLHaus is a good example of how many initial stage payloads are delivered over https.

the_rock
Legend
Legend

Well, considering you work for Check Point, you would have more access to it than any of us in the community. Maybe reach out to R&D or Sales to see if they can provide such a document.

By the way, I did google it, as well as looked on support site as well, but could not find anything similar to what you are looking for, sorry.