Player FM - Internet Radio Done Right
Checked 5M ago
Added five years ago
Content provided by Lookout. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lookout or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Security Soapbox | Privacy, Security and Everything in Between
Mark all (un)played …
Manage series 2781537
Content provided by Lookout. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lookout or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
43 episodes
Mark all (un)played …
Manage series 2781537
Content provided by Lookout. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lookout or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
43 episodes
All episodes
×
1 Cybersecurity Predictions: A Look into 2025's Security Landscape 41:17
41:17
Play Later
Play Later
Lists
Like
Liked41:17
2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this week's session, we’ll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses. Listen as our expert panel shares valuable insights and predictions on: New ransomware tactics and data breach methods How AI is shaping both security solutions and cyberattacks Growing threats from nation-states The latest security regulations and compliance frameworks…

1 Securing Democracy: Election Integrity, Threats and Solutions with Jim Coyle 32:46
32:46
Play Later
Play Later
Lists
Like
Liked32:46
On this week’s episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We’re diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who’s behind them. We’ll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation. Watch the Billington Cybersecurity Summit session on Election Security here. Follow Hank on LinkedIn Follow Jim on LinkedIn…

1 Why is my CEO Texting me? What to do About Executive Impersonation Attacks 5:12
5:12
Play Later
Play Later
Lists
Like
Liked5:12
We’ve all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data. This week’s episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them. To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below. Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation Video: https://vimeo.com/1009294652…

1 Advanced Web Threats: Data Leaks, Shadow IT, and AI 13:48
13:48
Play Later
Play Later
Lists
Like
Liked13:48
On this week’s episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape. For a deeper dive into advanced web threats and how to protect your organization, check out Charity’s recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway. Follow Hank Schless on LinkedIn Follow Charity Spiri on LinkedIn…

1 5 Minute Friday | A New EU Mandate Makes iOS Less Secure 6:32
6:32
Play Later
Play Later
Lists
Like
Liked6:32
In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores. To keep up to date on current threats: www.lookout.com/threat-intelligence…

1 5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs 4:38
4:38
Play Later
Play Later
Lists
Like
Liked4:38
In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats. To keep up to date on current threats: www.lookout.com/threat-intelligence…

1 5 Minute Friday | Critical Vulnerabilities in iOS & Android 5:02
5:02
Play Later
Play Later
Lists
Like
Liked5:02
In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them. To keep up to date on current threats: www.lookout.com/threat-intelligence…

1 Unveiling the Impact of Cyber Poverty with Ramy Houssaini 28:52
28:52
Play Later
Play Later
Lists
Like
Liked28:52
In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide. For more information on the Cyber Poverty Line Institute, visit: www.cyberpovertyline.org For more information on Lookout, visit: www.lookout.com Connect with Ramy Houssaini on LinkedIn here: www.linkedin.com/in/strategicleadership Connect with Hank Schless on LinkedIn here: www.linkedin.com/in/hank-schless…

1 5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass 3:32
3:32
Play Later
Play Later
Lists
Like
Liked3:32
In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups. To stay up to date on recent threat intelligence, click here.…
In this episode of 5 Minute Friday, we discuss droppers, a type of mobile malware that serves as a middleman between a target device and the threat actor's command and control server. Droppers are now being offered as a service, which could enable more advanced malware to get on more devices. To stay up to date on recent threat intelligence, click here.…

1 5 Minute Friday | Arid Viper: The Mobile Malware Threat 4:29
4:29
Play Later
Play Later
Lists
Like
Liked4:29
In this episode of 5 Minute Friday, we discuss recent research related to the advanced persistent threat (APT) group Arid Viper. Learn about how their tactics for targeting mobile users are exemplary of an attack chain that many cybercriminals use and why it's so effective To stay up to date on recent threat intelligence, click here .…

1 5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind 4:29
4:29
Play Later
Play Later
Lists
Like
Liked4:29
In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings. For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware…

1 5 Minute Friday | Red Alert-Rocket Alerts: A Malicious Threat Exploiting Societal Disruption 5:03
5:03
Play Later
Play Later
Lists
Like
Liked5:03
In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties. In this case, we examine a recent case where a malicious version of the legitimate mobile app, RedAlert - Rocket Alerts, was distributed, targeting individuals in Israel. To stay protected against these types of mobile threats, click here .…

1 5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device 3:46
3:46
Play Later
Play Later
Lists
Like
Liked3:46
On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device — the device that goes everywhere you do. For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security…

1 5 Minute Friday | Scattered Spider, MGM, and Caesars 4:53
4:53
Play Later
Play Later
Lists
Like
Liked4:53
Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target. For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.