Webinar 29 min video Tracking APT41 with Mobile EDR APT41, a state-sponsored Chinese APT group active since 2012, targets both governments for espionage and private enterprises for financial gain. Indicted in 2019–2020, they compromised over 100 This Watch Video
Webinar 2025 Security Planning: How to Utilize Mobile Threat Intelligence to Protect Cloud Data Read Webinar
Report 1 min read Mobile Threat Landscape Report: Q3 2024 Lookouts Q3 Mobile Threat Landscape Report View Report Read Report
Webinar 34 min video Executive Impersonation and Smishing Attacks Why Does My CEO Want My Password? Cybercriminals are impersonating senior executives and IT teams to trick employees into sharing critical sensitive information and corporate credentials. Watch Video
Webinar 29 min video Goodbye VPN, Hello ZTNA: Secure Your Organization with Zero Trust Designed for traditional network architectures, VPNs are an outdated solution that no longer meet the security needs of today’s remote, multi-cloud environments. They are difficult to scale, complex Watch Video
Video 2 min video Lookout Mobile Endpoint Security (MES): Smishing and Executive Impersonation Protection This video illustrates how an organization can utilize the new Smishing and Executive Impersonation Protection features to add another layer to the “defense in depth” strategy required to protect the Watch Video
Video 32 min video Turning the Tables on Adversaries: Enhance Your SOC Playbooks With Mobile Threat actors are constantly evolving their tactics to stay a step ahead of your data security strategies. The latest trend is to target mobile devices to compromise employee identities, quietly your Watch Video
Video 5 min video The Hidden Dangers: A Guide for Government on Mobile Security Threats Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise, with hackers often using mobile devices as a backdoor into the agency’s Watch Video
Webinar 45 min video Interactive Workshop: Hunt for Threats with Lookout’s Industry-Leading Researchers Threat hunting is evolving as more adversaries use coordinated cross-platform attacks to infiltrate enterprise and government organizations. Now more than ever, security teams must understand how to Watch Video