Discover how Lookout make security easy for the modern, mobile workplace.
Keep everything running smoothly through mergers and acquisitions.
Move to the cloud faster while improving security and productivity.
Everything you need to detect and mitigate threats in real time.
Workers and data are everywhere, your security should be too.
Collaborate securely and productively from anywhere in the world.
Workers and data are everywhere, your security should be too.
Protect student data without sacrificing privacy.
Meet demand for Zero Trust mandates with unified data protection.
Provide digital-first services while protecting customer data.
Protect patient data, minimize risk, and maximize compliance.
Protect valuable data and IP no matter where it goes.
Securely move to the cloud and safeguard mobile devices.
Learn about the data-centric technologies that power Lookout’s platform.
The capabilities you need to protect data no matter where it goes.
Detects and classifies data in real time, ensuring that you know what policies to enforce.
Protects your data even when it flows to applications and endpoints you don’t manage.
Identifies and secures cloud data across applications and services to reduce the risk of data exfiltration.
In-depth insights and uniform policy enforcement to effectively safeguard your data.
Monitors user activities and threats with precision, ensuring you're ready for any threats.
Streamlines security, making sure that data protection is consistent and effective.
Automates security analysis and decision-making processes.
We ensure that your data is protected, whether it’s from inbound web threats or software weaknesses in your mobile fleet.
Convicts phishing threats from any communications channels.
Protects your mobile fleet from vulnerabilities with AI and crowdsourced data.
Explore how we're creating the future of data security and ensuring peace of mind for all.
Data protection that lets businesses prosper.
Learn more about our leaders.
Creating positive impact in our communities.
Learn more about our customers.
Get in touch with our team.
Take your next career step alongside a diverse team built on a foundation of trust and innovative spirit.
Browse job openings and explore roles that are shaping the future of data security.
Find insights and information about keeping your data safe.
Find the latest community events, webinars, podcasts and more from Lookout.
Explore all business data security related resources to uncover information, insights, and more.
Enjoy our Security Soapbox podcast, listen in to learn about the latest threat intel and more.
Explore our many conversations with top industry leaders in cybersecurity.
View our ever growing library of informative videos, use-case explanations and more.
Meet our team and learn from cybersecurity experts in one of our upcoming events.
Stay up to date with the newest terminology and technologies in the space.
Threat Intelligence
Q&A: With Christoph Hebeisen, Head of Threat Intelligence
We sat down with our Head of Threat Intelligence, Christoph Hebeisen, to learn what it means to be a security researcher in a world of constantly evolving threats.
Exclusive Partner Briefing: Phishing for Financial Gain: UNC3944
Join our upcoming Exclusive Partner Briefing: Phishing for Financial Gain: UNC3944
Security Briefing for Lookout Partners: Mobile Threats By the Numbers
From phishing attacks to sophisticated device exploits, cybercriminals are increasingly targeting mobile devices as the primary access point into an organization.
The Dangers of Advanced Persistent Threat (APT) Groups and What Enterprise Security Teams Need to Know
APTs are often thought of as primarily targeting governments for cyber espionage. However in reality, they could have just as much impact on the private sector.
How APT 41 Is Using Mobile Devices to Target Your Organization
Join us for this exclusive partner security briefing for a breakdown of these threats and to see why they are now targeting mobile devices.
5 Minute Friday | CryptoChameleon
In this week’s episode of 5 Minute Friday, we discuss Lookout's discovery of CryptoChameleon, an ongoing advanced phishing kit targeting cryptocurrency platforms and the Federal Communications Commission (FCC). We will dive into the tactics used by the attackers, including SMS and voice phishing, and the success of the kit in stealing high-quality data from victims. For an in-depth analysis, visit: www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phishing-kit Join Lookout's upcoming exclusive threat briefing: www.lookout.com/community/webinars/cryptochameleon-phishing-kit
5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs
In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats. To keep up to date on current threats: www.lookout.com/threat-intelligence
5 Minute Friday | Critical Vulnerabilities in iOS & Android
In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them. To stay up to date on current threats, visit: www.lookout.com/threat-intelligence
Unveiling the Impact of Cyber Poverty with Ramy Houssaini
In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide.
5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass
In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups. Stay up to date on recent threat intelligence here: www.lookout.com/threat-intelligence
5 Minute Friday: iLeakage- The Hidden Threat to Your iOS Device
On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device — the device that goes everywhere you do.
5 Minute Friday: Red Alert-Rocket Alerts | A Malicious Threat Exploiting Societal Disruption
In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties
5 Minute Friday: Unveiling Infamous Chisel, Sandworm, and Deblind
Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel.
5 Minute Friday: Scattered Spider, MGM, and Caesars
Caesars Entertainment and MGM resorts were recently a target for a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target.
Soap Suds: The Return of SharkBot
SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in the wild in October 2021. In this newest variation, the malware targets banking credentials through two apps with collectively over 60,000 downloads on Google Play. In this episode, host Hank Schless discusses what you need to know about SharkBot and how to protect yourself and your organization.
The Twilio Breach and Phishing: Lessons Learned
Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus. Tune in for this short episode to learn more about the mechanisms behind the phishing campaign and tips for mitigating this threat.
Know Thy Enemy: What Is Pegasus and What Can You Do?
First uncovered by Lookout and Citizen Lab in 2016, the Pegasus spyware was confirmed to have been used on targets such as business executives and government officials. Veteran of the cybersecurity industry, Joseph Davis of Microsoft, walks us through how spyware came to be, its implications and how you can protect yourself and your organization against Pegasus.