Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Ousaban: LATAM Banking Malware Abusing Cloud Services

Ousaban (a.k.a. Javali) is a banking malware that emerged between 2017 and 2018, with the primary goal of stealing sensitive data from financial institutions in Brazil. This malware is developed in Delphi and it comes from a stream of LATAM banking trojans sourced from Brazil, sharing similarities with other families like Guildma, Casbaneiro, and Grandoreiro.

How do you measure up on the 9 Core Security Capabilities essential for Zero Trust in IoT?

Machine Identities, Zero Trust….how do these relate to your IoT project? Today’s PKI vendors have specific solutions for managing non-human identities – machines – like servers, laptops, software applications, API’s and other assets found within a corporate network.

An Inside Look at How to Keep Open Source Software Dependencies Up-to-Date and Secure

Today, open source software provides the foundation for the vast majority of applications across all industries, and software development has slowly moved toward software assembling. Because of this change in the way we deliver the software, new attack surfaces have evolved and software security is facing new challenges inherent with dependency on open source software.

Google Play Store Announces New Standards In Countering Misinformation And Improving Security

Google has unveiled new Play Store policies designed to reduce the spread of misinformation, limit advertiser behaviour, address alarms, VPNs & impersonation issues and enhance security. The app marketplace is constantly in flux, and app store proprietors must adjust their policies accordingly to keep up. Today, Google announced a bevy of Google Play Store policies that will go into effect over the coming months.

Continued leadership in open and transparent security

Elastic Security has long been open — with open source roots, open development, and the release of our SIEM in 2019. In 2020, we further embraced the openness of Elastic and released our open detection-rules repo to collaborate with our users and be transparent about how we protect customers. That repo is focused on our SIEM and Security Analytics use cases and did not yet include Elastic Endpoint Security artifacts.

Vodafone Bundles Lookout with Google Workspace to Protect Small Businesses

Even before working from anywhere became the norm, organizations of every size were already becoming more reliant on mobile devices and productivity apps. But this reliance has also opened users, devices and data up to more risk. This is why we are thrilled to see our friends at Vodafone offering a new bundle for small businesses that brings together Lookout for Small Business mobile security and Google Workspace, a suite of collaboration and productivity apps by Google.

Lookout contributes to 2022 Verizon MSI With Mobile and Cloud Security Insights

One of the best ways to stay up to date on how mobile devices affect your organization's security is by reading the Mobile Security Index (MSI) by Verizon. Lookout is a long-time contributor to the report, including the 2022 edition that was just published. This year’s MSI is especially interesting, as it dives deeper into the interconnectivity that now exists between endpoint devices and cloud applications.

Is Cybersecurity Hard? The Basics Made Easy To Understand

Being online means that we are constantly interacting with others and sharing information across borders. It also means that Google is tracking you. This virtual international travel creates countless opportunities for cybercriminals to access our personal data. If you dive into how the internet works and how to protect your privacy, you’ll start to hear the word cybersecurity a lot. But what is cybersecurity exactly? Is cybersecurity hard?