We track the ongoing activities of more than 900 advanced threat actors; you can find our quarterly overviews here, here and here. Here we try to focus on what we consider to be the most interesting trends and developments of the last 12 months. This is based on our visibility in the threat landscape; and…
A new “TrickBoot” module scans for vulnerable firmware and has the ability to read, write and erase it on devices.
A raft of obfuscation techniques turn the heat up for the hacking-for-hire operation.
Breaking down the true cost of software tools in the context of reverse engineering and debugging may not be as clear-cut as it appears.
Cybercriminals try to steal the credentials of top companies associated with the COVID-19 vaccine supply chain in an espionage effort.
Lookout’s Hank Schless discusses accelerated threats to mobile endpoints in the age of COVID-19-sparked remote working.
The ransomware group pilfered payment-card data and credentials for over a year, before ending with an attack last month that shut down many of the South Korean retailer’s stores.
Incydr lets you monitor your high-risk users without impeding their ongoing work.
Patches for a flaw (CVE-2020-8913) in the Google Play Core Library have not been implemented by several popular Google Play apps, including Cisco Teams and Edge.