Episodios
-
On this week’s episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We’re diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who’s behind them. We’ll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation.
Watch the Billington Cybersecurity Summit session on Election Security here.
Follow Hank on LinkedIn
Follow Jim on LinkedIn
-
We’ve all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data.
This week’s episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them.
To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below.
Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation
Video: https://vimeo.com/1009294652
-
¿Faltan episodios?
-
On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape.
For a deeper dive into advanced web threats and how to protect your organization, check out Charity’s recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway.
Follow Hank Schless on LinkedIn
Follow Charity Spiri on LinkedIn
-
In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores.
To keep up to date on current threats: www.lookout.com/threat-intelligence
-
In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats.
To keep up to date on current threats: www.lookout.com/threat-intelligence
-
In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them.
To keep up to date on current threats: www.lookout.com/threat-intelligence
-
In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide.
For more information on the Cyber Poverty Line Institute, visit: www.cyberpovertyline.org
For more information on Lookout, visit: www.lookout.com
Connect with Ramy Houssaini on LinkedIn here: www.linkedin.com/in/strategicleadership
Connect with Hank Schless on LinkedIn here: www.linkedin.com/in/hank-schless
-
In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups.
To stay up to date on recent threat intelligence, click here.
-
In this episode of 5 Minute Friday, we discuss droppers, a type of mobile malware that serves as a middleman between a target device and the threat actor's command and control server. Droppers are now being offered as a service, which could enable more advanced malware to get on more devices.
To stay up to date on recent threat intelligence, click here.
-
In this episode of 5 Minute Friday, we discuss recent research related to the advanced persistent threat (APT) group Arid Viper. Learn about how their tactics for targeting mobile users are exemplary of an attack chain that many cybercriminals use and why it's so effective
To stay up to date on recent threat intelligence, click here.
-
In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings.
For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware
-
In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties. In this case, we examine a recent case where a malicious version of the legitimate mobile app, RedAlert - Rocket Alerts, was distributed, targeting individuals in Israel.
To stay protected against these types of mobile threats, click here.
-
On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device — the device that goes everywhere you do.
For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security
-
Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target.
For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf
-
Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data.
For more information on data collection related security threats and how to ban risky apps like TikTok, check out our blog: https://bit.ly/tiktok-podcast -
With more devices than humans in our world today, the amount of data being generated is higher than ever, with no sign of slowing down. Enter: edge computing.
In this episode, host Hank Schless is joined by Said Ouissal, Founder and CEO at ZEDEDA, to discuss edge computing — from its business applications to the challenges of securing the technology and everything in between.
-
Organizations are making big decisions to implement cloud solutions to boost collaboration and gain competitive advantage. But many aren’t prepared to handle the risks that cloud services introduce. In this episode of Security Soapbox, host Hank Schless talks shop with Faz Sadikali, Founder of Cloud Insights, on how to build secure workstreams and level up IT to reap the benefits of the cloud while ensuring data remains secure.
Read Faz's blog about IT modernization here: https://bit.ly/3h3qqlW -
With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security.
-
SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in the wild in October 2021. In this newest variation, the malware targets banking credentials through two apps with collectively over 60,000 downloads on Google Play. In this episode, host Hank Schless discusses what you need to know about SharkBot and how to protect yourself and your organization.
-
Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus. Tune in for this short episode to learn more about the mechanisms behind the phishing campaign and tips for mitigating this threat.
To learn more about this breach and how to protect your organization, check out our blog on this topic: https://bit.ly/3cuweCI
- Mostrar más