Gen Blogs | Home By Threat Research Team Archived: 2026-04-05 17:48:12 UTC News Keep up with Gen news as we create technology solutions for people to take full advantage of the digital world safely, privately, and confidently. View All News Family of Brands How AI Can Power Your Online Presence How Norton Revamp helps people build a consistent, trustworthy voice online. Iskander Sanchez-Rola March 19, 2026 • 5 min read Company News Leading the Way for AI Agent Safety Shaping the standards for a safer, freer Agentic Era Luis Corrons March 5, 2026 • 11 min read https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 1 of 12 Company News Introducing AARTS: An Open Standard for AI Agent Runtime Safety AARTS standardizes how AI agent platforms expose security events, enabling portable runtime protection across the growing agent ecosystem Jakub Křoustek March 5, 2026 • 8 min read Company News Gen Agent Trust Hub Introduces Agent Detection and Response: The Missing Security Layer for Agentic AI Inside the Gen Agent Trust Hub, ADR turns trust signals into real-world protection. Jakub Křoustek March 4, 2026 • 6 min read Company News Introducing Sage: Safety for Agents Closing the growing security gap between what Al agents can do and what keeps them in check https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 2 of 12 Threat Research Team February 19, 2026 • 6 min read Company News The trust layer for the agentic era Bringing transparent risk ratings to the AI skills ecosystem to help developers build boldly and users move confidently Luis Corrons February 17, 2026 • 2 min read Family of Brands 16 independent security awards show how Gen builds protection that scales Measuring what matters: Security, responsibility and what comes next Alisha Robinson January 23, 2026 • 4 min read Family of Brands https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 3 of 12 From helpful AI to harmful deepfakes: Where video scams cross the line From accessibility and creativity to financial scams and identity theft, the difference is not the technology but the intent Threat Research Team January 6, 2026 • 10 min read Family of Brands Spotting the Fakes: How Norton’s Media Shield and Video Analyzer Help You Fight Deepfake Scams Real-time protection meets real-world deception. Norton’s AI-powered tools help you tell truth from trick. Luis Corrons October 17, 2025 • 3 min read Family of Brands Deepfake detected: How Norton and Qualcomm are leveling up scam defense With Qualcomm’s NPU-powered AI and Norton’s deepfake detection, your next PC could be your strongest digital defense https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 4 of 12 Amit Sharma June 24, 2025 • 3 min read Insights Explore all our Gen™ blog insights. Discover the latest cybersecurity reports and research, and learn from the experts with our leadership perspectives. View All Insights Research Why Join the Navy if You Can Be a Pirate? Though you might sometimes become cargo. Inside the macOS Cracked Software Pipeline +1 Adolf Středa & 1 others March 31, 2026 • 12 min read Research From Celebrity Deepfakes to Avatar Farms, How Scammers Industrialize Trust When the face is familiar but the person isn’t real +2 Luis Corrons & 2 others March 26, 2026 • 10 min read https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 5 of 12 Research The Reservation Hijack Scam: How attackers hijack hotel accounts to target guests From Booking-themed lures to compromised hospitality software, criminals are using reservation data and trusted workflows to make fraud feel like customer service. +1 Martin Chlumecký & 1 others March 25, 2026 • 15 min read Research Torg Grabber: Anatomy of a New Credential Stealer A newly identified MaaS credential stealer evolves from Telegram exfiltration to encrypted TCP and full REST API infrastructure Threat Research Team March 24, 2026 • 68 min read Research The Malware with a Secret Identity: How We Unmasked Torg Grabber How a “Vidar” look‑alike turned out to be Torg Grabber—a fast‑growing infostealer-as-a-service with ClickFix lures, browser lockpicks and a sprawling criminal customer base https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 6 of 12 Luis Corrons March 24, 2026 • 7 min read Research The Scam Ad Machine: Part II How scam ads hide in plain sight, survive takedowns, and keep coming back +4 Luis Corrons & 4 others March 20, 2026 • 12 min read Research VoidStealer: Debugging Chrome to Steal Its Secrets A Novel Debugger-based ABE Bypass Spotted in the Wild Vojtěch Krejsa March 19, 2026 • 19 min read Research https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 7 of 12 Fingerprinting AI Agent Skills: The Missing Identity Layer for Agent Plugins Why AI agent skills need their own fingerprint: a content-based ID that stays stable across packaging, platforms and marketplaces Michal Salát March 17, 2026 • 17 min read Research Engineering the Future of Agentic Threat Hunting An Army for Every Analyst Luis Corrons March 13, 2026 • 7 min read Research Promptmorphism: How LLMs Are Mass-Producing Disposable Stage 1 Loaders How malware authors use LLM‑driven “promptmorphism” to endlessly reshape loaders—and what defenders must do to keep up Threat Research Team https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 8 of 12 March 13, 2026 • 8 min read People & Impact At Gen, we're driven by the positive impact we can have on all the communities in which we live and work. Explore stories on our efforts to make that impact a reality. View All People & Impact Community Helping Students Understand AI in the Classroom Gen partners with Discovery Education on new video series focused on AI literacy Kim Allman March 27, 2026 • 4 min read Community From Digital Skills to Digital Advocacy: Empowering Girls to Lead Online In celebration of International Women’s Day, Gen highlights its partnership with the World Association of Girl Guides and Girl Scouts Kim Allman March 9, 2026 • 4 min read Community Helping young people build strong financial habits https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 9 of 12 Gen announces new partnership with Jump$tart Coalition Kimberly Bishop February 24, 2026 • 4 min read Life@Gen How we build trust through our work and culture A closer look at Gen’s corporate responsibility efforts, workplace culture and global impact in 2025 Kim Allman February 11, 2026 • 4 min read Community Scam policy in action Gen continues building momentum in Washington Kim Allman February 11, 2026 • 4 min read Community https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 10 of 12 Working together for a better internet Gen celebrates Safer Internet Day with our nonprofit partners Kimberly Bishop February 10, 2026 • 5 min read Community Fighting Back Against Tech-Related Abuse Gen partners with National Network to End Domestic Violence and Tech Soup for National Stalking Awareness Month Kimberly Bishop January 20, 2026 • 4 min read Community Celebrating Three Years of Giving@Gen #WeAreGENerous volunteering and giving projects help drive impact in our communities Kimberly Bishop https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 11 of 12 December 15, 2025 • 4 min read Community A Safe and Scam-Free Holiday Season In addition to fighting scams with our products, Gen teams up with nonprofits and industry partners to help people spot and avoid scams Kimberly Bishop December 12, 2025 • 3 min read Community From classrooms to chatrooms: how students can avoid online scams and identity theft Practical tips for staying safe in today’s connected campus life. Alisha Robinson December 5, 2025 • 13 min read Source: https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire https://www.nortonlifelock.com/blogs/security-response/mercenary-amanda-professional-hackers-hire Page 12 of 12