Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Adversarial AI and Polymorphic Malware: A New Era of Cyber Threats

The state of cybersecurity has always been in flux, but the arrival of tools like ChatGPT heralded one of the most significant challenges for security teams in years. AI has the potential to unlock incredible potential in data processing and malware detection, but in the wrong hands, Large Language Models (LLMs) and other adversarial AI tools can be used to develop polymorphic malware that can escape detection, gain access to sensitive data, and poison data sets.

The Social Engineering Threats You Can't Ignore - And Why Most Are Inherently Mobile Problems

When most people think about cybersecurity, they picture firewalls, anti-virus software, and complex passwords. But the weakest link isn’t a server or a laptop—it’s a person. Social engineering attacks exploit human behavior rather than technical vulnerabilities, and four techniques dominate the landscape today: phishing, smishing, vishing, and quishing.

CISOs: Your Blind Spot Just Became Their Entry Point

As CISOs, you’ve invested heavily in desktop security, built out Zero Trust architectures, and hardened your perimeter. But there’s a critical gap many are still leaving exposed: mobile devices and the human behind the screen. In a world where your workforce runs on smartphones, overlooking mobile security is no longer an option.

A New Chapter in Mobile Security: Tackling Human Risk with AI-Powered Social Engineering Protection

This week marks a milestone in the evolution of mobile endpoint security. At a time when attackers are moving faster and targeting smarter, Lookout is proud to unveil a breakthrough initiative: AI-powered social engineering protection—the first solution of its kind built to detect and disrupt human-targeted attacks at the mobile edge.

What Is the MITRE ATT&CK Framework? Mapping to Today's Defensive Controls

Threat actors are constantly searching for new ways past your organization’s defenses. Learning these tactics, techniques, and procedures (TTPs) plays an enormous role in cybersecurity. If you understand how a threat actor plans to attack, you can align your defenses to stay one step ahead. The MITRE ATT&CK framework is designed to help you do exactly that. The MITRE ATT&CK framework is an ever-evolving catalog of the TTPs cyber criminals use in each phase of an attack.

Detecting APT Threats on Government Devices: Insights into Federal Cyber AI Strategies

Cybersecurity has long been a national security concern for world governments and the private corporations that develop solutions for them. However, the Russian invasion of Ukraine in 2022 and the subsequent rise of advanced persistent threats (APTs) were wake-up calls that the geopolitical landscape has shifted into uncharted territory.

How the CDM Program Strengthens Federal Cyber Resilience

For most organizations, a data breach can be catastrophic, resulting in loss of trust and revenue, and maybe even steep fines and penalties. When you add in a potential threat to national security, that breach becomes far more dangerous. That’s why the United States Department of Homeland Security implemented the Continuous Diagnostics and Mitigation (CDM) Program, which has become a cornerstone of federal cybersecurity.

Protecting Government Agencies From Mobile Threats: A Guide

If you work for (or alongside) the United States government, then threat actors want your sensitive data. In 2023, federal agencies fell victim to 11 major cybersecurity incidents, with threats continuing to evolve well into 2024. Safeguarding federal and critical infrastructure organizations requires a modern cybersecurity framework. In today’s mobile-enabled workplaces, that means extending your data protection strategy to wherever devices are being used.

Navigating FedRAMP Compliance: Why It's Crucial for Mobile Security

If your organization handles United States federal government data in cloud environments, it’s often a requirement to use FedRAMP-authorized solutions. The Federal Risk and Authorization Management Program (FedRAMP) provides consistent standards for protecting unclassified data that passes between the federal government and privately owned third parties.

Human-Directed Threats: The New Frontline in Cybersecurity

A constantly shifting threat landscape has given rise to a new cyberattack vector, driven by two powerful forces: the rapid migration of data to the cloud and the fundamental change in how employees access and interact with that data. Today’s workforce expects the freedom to work and access information from any device—especially mobile devices, which have become integral to their professional and personal lives.