
Recently, Atlassian issued a major security notice to all of its users about a critical vulnerability, identified as CVE-2022-26134, in its widely-used Confluence Server solution. The vulnerability would allow an unauthenticated malicious actor to execute arbitrary code on a Confluence Server or Data Center instance that could grant an attacker full command of the vulnerable server.
When a leading financial technology provider began posting record success, it needed a holistic security strategy to protect its customer data and comply with regulations. The firm turned to Lookout to help secure their online financial platform.
Even five years after Lookout and Citizen Lab discovered it, advanced mobile spyware Pegasus remains highly relevant as revelation of its widespread usage and evolving capabilities — such as the ability to deliver zero-click attacks — continue to surface.
One of the largest commercial and civil contractors in the United States moved to the cloud to help unlock operational efficiencies. See why they turned to Lookout to help them protect sensitive data, monitor unsanctioned apps and mitigate threats.
See why this large oil and gas company chose Lookout as they migrated to the cloud to help implement granular access control for sensitive HR data, achieve compliance, and prevent malware from being uploaded to their infrastructure.
Today we live in a closely interconnected world, where no one country is less connected than another. As a result, the cyber threats initially directed at Ukrainian government bodies and infrastructure could easily be targeted at other nations, whether they be attacks on supply chains or the deployment of ransomware and other advanced malware.
The alarming part of any software supply chain attack is the domino effect it has. To better understand these attacks and how organizations can better protect themselves, I invited Vodafone security experts Andy Deacon and Verity Carter-Johnson to the Lookout podcast.
At the Beijing games, QR codes are a huge part of everyday life. While the codes make navigating activities at the Games easy and contactless, it creates opportunities for them to be abused for phishing purposes.
For this leading university hospital system, the move to the cloud enabled better collaboration but also opened them up to greater risk. See how Lookout helped them protect their sensitive data and meet compliance regulations.
This large financial services firm needed to ensure they were protecting data in email without increasing complexity or limiting productivity. Learn how Lookout helps them identify and secure their sensitive data in email messages.
Why were hospitals so frequently breached by attacks? To answer that question, I turned to an old friend of Lookout — former CISO Mike Murray. Mike, who’s currently the Founder and CEO of Scope Security, a cybersecurity company focused on providing managed detection and response solutions for healthcare, joined me on Endpoint Enigma to dig deeper into this topic.
Attackers launched a ransomware attack against the Colonial Pipeline that demonstrated how cybercrime groups exploit diminishing visibility, legacy security systems, and mobile devices to successfully extort money from targets.
To better understand how the financial industry reacted to this digital shift, I took a deep dive into the tens of millions of device, app and phishing threat data in the Lookout Security Graph. To get a full rundown of what I uncovered, take a look at the Financial Services Threat Report.
This campaign is the latest example of how attacks are leveraging various mobile-targeting methods to maximize their return. FluBot is a cheap but highly customizable baking trojan. SMS phishing takes advantage of the trust we put on our mobile devices. By fusing the two together, the attacker has created a dangerous apparatus that puts your personal and organizational data at risk.