5 Results
Subramanian RajagopalanSenior Security Researcher
Posted: 13 Min Read

Disguised Malware Distribution Techniques

How attackers leverage fake software websites, search engines, social media platforms, and social engineering to deliver malwares

Disguised Malware Distribution Techniques
Armin BuescherSr. Principal Security Researcher, Norton Protection Labs
Posted: 14 Min Read

Tech Support Scammers? Not So Organized Criminals

Technical support scams have been around for years, but they’ve been rapidly increasing in popularity.

Tech Support Scammers? Not So Organized Criminals
Milo SalviaSenior Security Researcher, Norton Protection Labs
Posted: 3 Min Read

Threat Actors Cash in on COVID related Tax Refund Scams

Watch out for these attempts to get your money and personal identifying information

Threat Actors Cash in on COVID related Tax Refund Scams
Posted: 8 Min Read

The ProLock Ransomware

NortonLifeLock Security Response Technical Note

The ProLock Ransomware
Posted: 8 Min Read

Mercenary.Amanda

Professional Hackers for Hire carried out large-scale credential spearphishing campaigns since at least 2013

Mercenary.Amanda