Subramanian RajagopalanSenior Security ResearcherPosted: 9 Apr, 202113 Min ReadSecurity ResponseDisguised Malware Distribution Techniques How attackers leverage fake software websites, search engines, social media platforms, and social engineering to deliver malwaresDisguised Malware Distribution Techniques
Subramanian RajagopalanSenior Security ResearcherPosted: 9 Apr, 202113 Min ReadDisguised Malware Distribution Techniques How attackers leverage fake software websites, search engines, social media platforms, and social engineering to deliver malwaresDisguised Malware Distribution Techniques
Armin BuescherSr. Principal Security Researcher, Norton Protection LabsPosted: 24 Mar, 202114 Min ReadTech Support Scammers? Not So Organized CriminalsTechnical support scams have been around for years, but they’ve been rapidly increasing in popularity. Tech Support Scammers? Not So Organized Criminals
Milo SalviaSenior Security Researcher, Norton Protection LabsPosted: 2 Feb, 20213 Min ReadThreat Actors Cash in on COVID related Tax Refund ScamsWatch out for these attempts to get your money and personal identifying information Threat Actors Cash in on COVID related Tax Refund Scams
Posted: 18 Jun, 20208 Min ReadThe ProLock RansomwareNortonLifeLock Security Response Technical NoteThe ProLock Ransomware
Norton LabsGlobal Innovation & ResearchPosted: 9 Jun, 20208 Min ReadMercenary.AmandaProfessional Hackers for Hire carried out large-scale credential spearphishing campaigns since at least 2013Mercenary.Amanda