Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DarkSword: Known Threats. Known Protection. Complete Visibility.

In moments. No warning. No trace. Total takeover. In March 2026, a new breed of mobile threat emerged: DarkSword. This sophisticated iOS exploit chain doesn’t need a phishing link or a malicious app download. Just one visit to a compromised website is enough to expose your entire enterprise. In this video, we dissect the DarkSword attack path—from the initial Safari iframe encounter to the kernel-level takeover—and show you how the threat disappears before most security teams even know it’s there.

Mobile Threat Report Briefing

In this video, David Richardson, Product CTO at Lookout, provides a strategic overview of the evolving mobile threat landscape based on Q3 2025 global enterprise data. Key Insights: Dominant Attack Vectors: Mobile phishing and social engineering remain the most significant threat categories. Attackers are increasingly using AI-powered tools to craft authentic-looking messages and conduct deep research for highly targeted attacks.

Smishing AI

Cybercriminals are evolving—and so are their tactics. Smishing, or SMS phishing, has become one of the fastest-growing mobile threats. With AI, attackers can now create convincing, personalized messages in seconds—removing language barriers and making scams harder than ever to detect. That’s where Lookout Smishing AI comes in. Our advanced AI-powered detection goes beyond scanning for malicious links. It identifies the intent behind every message—stopping social engineering attacks before they reach you. Whether there’s a URL or not, Lookout keeps your mobile workforce protected.

The Human Factor: Don't Let Your Identity Become App-Rehended

*Catch Lookout's On-Demand Session from Black Hat 2025!* Your digital identity is the crown jewel, and adversaries are bypassing traditional network and EDR defenses by weaponizing the human element. The modern kill chain has evolved, exploiting our most ubiquitous and often least-secured endpoints: mobile devices. This isn't theoretical; it's the operational reality for sophisticated threat actors.

The Modern Kill Chain: An On-Demand Session from FCW, NextGov and Lookout

As federal agencies shift beyond perimeter defenses, cyber threats are evolving—targeting identity, data, and mobile devices at the front line of today’s attacks, which can now infiltrate systems and exfiltrate data in minutes rather than months. While Zero Trust provides the foundation for defense, starting with a simple mobile threat defense solution can break down modernization barriers. Learn how a mobile-first approach strengthens Zero Trust, accelerates modernization, and safeguards federal networks from the modern kill chain.

Fed Gov Today: Breaking Security Barriers to Government Modernization

Jim Coyle, U.S. Public Sector CTO at Lookout, discusses the challenges government agencies face in embracing mobility, cloud security, and AI. While modernization efforts are progressing, many organizations still struggle with security concerns, particularly around mobile devices, which are increasingly targeted by cyber threats. Coyle highlights the need for stronger public-private partnerships to accelerate secure digital transformation. He also shares the importance of understanding data sovereignty in AI and improving endpoint security to protect classified and unclassified information.

The Modern Kill Chain - A defense in depth approach to cybersecurity

Cybercriminals continue to evolve their tactics to compromise your organization's security defenses. The modern approach is to start by targeting users on their mobile devices to steal their credentials. Learn how these cybercriminals have evolved their tactics, and how Lookout prevents and protects at each stage of the kill chain.