News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Phishing attacks hit all-time high
Phishing attacks hit all-time high

More than 30 percent of businesses and consumers were exposed to mobile phishing attacks in each quarter of 2022. Heavily regulated industries such as banking and insurance were hit the hardest. Lookout has released its Global State of Mobile Phishing Report. According to the data, 2022 saw the highest percentage of mobile phishing attacks ever, with an average of more than 30 percent of businesses and consumers exposed to these attacks each quarter. Lookout also found that users across all devices, whether personal or work, received more mobile phishing links...

Read more

Modern BEC phishing: billions of dollars stolen 
Modern phishing: billions of dollars stolen

Business email compromise (BEC) is big business for cybercriminals. According to the 2021 FBI Cybercrime Study, BEC phishing was responsible for nearly $2021 billion in losses in 2,4. BEC is basically a type of phishing attack. Lookout examines how modern phishing has evolved beyond email. With the proliferation of smartphones and tablets, attackers are now going far beyond email. They are now also using other platforms such as text messages, messaging apps like Signal and WhatsApp, and social media apps to attack their targets...

Read more

Focus on identities
Focus on identities

A new approach to IT security focuses on identities. In recent years, more and more companies have switched to hybrid and decentralized work environments. With this shift, IT teams have learned that they can't trust the network like they used to. Employees now have direct access to their company's resources over the Internet, bypassing traditional security tools such as virtual private networks (VPNs) and firewalls. The shift isn’t just limited to the network—remote working has proven that anyone, anywhere, with anyone…

Read more

Modernize IT infrastructure
B2B Cyber ​​Security ShortNews

During the winter holidays, Southwest Airlines, one of the US's largest and most respected airlines, was forced to cancel around 45 percent of its scheduled flights. It is likely due to outdated IT infrastructure and IT systems. Other airlines have also struggled with inclement weather and holiday traffic, but have not faced the same level of disruption. These few examples show that when companies are using an outdated, inefficient IT infrastructure, it will eventually buckle under the pressure of unexpected changes. Some companies hold on to their legacy systems because they don't see the point in doing anything...

Read more

Mobile: cloud security and endpoint security on one platform
Mobile: cloud security and endpoint security on one platform

Lookout's cloud security platform for all mobile endpoints brings together endpoint security and cloud security, reducing risk and enabling a unified response to application and data threats. Lookout has announced the addition of new capabilities and features to its Cloud Security Platform. The result is currently the only solution in the industry for endpoint to cloud security. The cloud-native platform includes a unified policy framework for managing and enforcing policies for all mobile, cloud, web, and proprietary applications. To the innovations...

Read more

Business Email Compromise: more than just phishing
B2B Cyber ​​Security ShortNews

Business email compromise (BEC) is big business for cybercriminals. According to the 2021 FBI Cybercrime Study, BEC was responsible for nearly $2021 billion in losses in 2,4. With the proliferation of smartphones and tablets, attackers are now going far beyond email. They are now also using other platforms such as text messages, messaging apps like Signal and WhatsApp, and social media apps to attack and compromise their targets. With so many SaaS applications employees use every day, a single successful phishing attack could impact the entire organization...

Read more

phone hacked? Dangers for SMEs
phone hacked? Dangers for SMEs

While the technology of modern smartphones offers great opportunities and convenience for business use, it can also pose a risk to a company's data inventory. Lookout lists key signs to know if your phone has been hacked. There are countless threats to mobile devices and the data stored on them. With smartphones becoming so widespread, hackers have evolved the way they attempt to access information. The most common methods for smartphone hacks Text messages: Malware and viruses are often spread through text messages. Malware is short for “malicious software”, so…

Read more

Is TikTok a threat to government workers' mobile devices? 
B2B Cyber ​​Security ShortNews

The US Senate has passed legislation to ban federal employees from using TikTok on state-owned devices. Is the Chinese operator of TikTok, ByteDance a danger? Possibly also for European or German officials and government employees? The vote is the latest action by US lawmakers to crack down on Chinese company ByteDance amid national security agencies' fears Beijing could misuse the TikTok app deployed on officials' mobile devices to spy on Americans. A comment from Akhilesh Dhawan, Senior Director of Security Solutions at Lookout. Want to spy on TikTok too?…

Read more

Spyware to monitor Uyghurs
Spyware for surveillance campaigns against Uyghurs

IT security analysts have uncovered two new surveillance spyware programs targeting Uyghurs in mainland China and abroad. One campaign introduced a novel Android monitoring tool Lookout has dubbed BadBazaar, which shares infrastructure with other previously discovered Uyghur-targeted tools. The other tool uses updated variants of a previously publicized tool, MOONSHINE, discovered by Citizen Lab that targeted Tibetan activists in 2019. Although there have been surveillance and detention campaigns against Uyghurs and other Turkish ethnic minorities for years, after…

Read more

Critical vulnerability in Apple devices
B2B Cyber ​​Security ShortNews

Apple recently released a software update for iOS and iPadOS 15.6.1 to fix a zero-day kernel vulnerability identified as CVE-2022-32917. This critical vulnerability in Apple devices allows code execution with kernel privileges. Lookout explains how. Apple is aware of a report mentioning active exploitation of the vulnerability in the wild. This vulnerability could allow a maliciously crafted application to execute arbitrary code with kernel privileges. This CVE could affect Apple iPhone, iPad and iPod Touch models, meaning anyone using one of these devices will have their device immediately…

Read more