(Q4745)
Jump to navigation
Jump to search
Statements
10 June 2020
0 references
Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies. [..]. This research reveals a glimpse into some of the applications threat actors are actively distributing, and there are likely numerous others in the wild that have not yet been detected.
0 references