The CyberWire Pro Research Briefing for 2.25.20
Malware uses packet headers to communicate through firewalls. LTE networks and users subject to impersonation attacks. Transparent Tribe is active. Mobile security is commonly sacrificed for expediency. VPN apps vulnerable to man-in-the-middle attacks.