Technology ❯ Cybersecurity ❯ Malware
Data Theft Credential Theft Spear-Phishing Scams Data Wipers Iranian Cyber Operations AI-based Attacks Zero-Day Vulnerabilities Online Privacy Data Privacy Exploitation Techniques Text Message Scams Mobile Applications Windows Security Email Attacks RokRAT Social Engineering Fraudulent Apps SVG Files Noodlophile Stealer Remote Access Fraud UpCrypter APT37 Fake Applications Phishing-as-a-Service MatrixPDF
Google says the policy targets malware, phishing, fake apps.