Lookout Research @LookoutThreats
You may have heard of our discovery of #Pegasus and #Monokle. Follow us for the latest threat research from @Lookout. lookout.com/threatlab Joined August 2020-
Tweets63
-
Followers169
-
Following7
-
Likes52
Our researchers leverage the world’s largest mobile telemetry dataset to track APT activity, discover new mobile malware, and provide actionable intelligence. See all our latest discoveries here ➡️ lookout.com/threat-intelli… #threatIntelligence #ThreatLab
In this episode, we welcome back Ramy Houssaini to explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources. Listen to the full episode here: lookout.com/community/podc…
🚨 Read our analysis of a critical #vulnerability that has known active exploits in the wild. CVE-2023-6345 is a vulnerability in Skia, which is the 2D graphics engine for Google Chrome, ChromeOS, Android, and Microsoft Edge. Read more here ⬇️ lookout.com/threat-intelli…
Apple has recently disclosed two critical zero-day #vulnerabilities in #iOS 17.1.1 related to the WebKit engine supporting Safari. With over 20 zero-days affecting Apple devices this year, it's crucial to take action. Read more here. ⬇️ lookout.com/threat-intelli…
Robin Banks phishing as a service, is a #phishing kit that can circumvent MFAs. Since the most recent report in November 2022, #RobinBanks has gone unnoticed. We have discovered renewed phishing activities and a pivot to target cryptocurrency services. lookout.com/threat-intelli…
Attention security professionals! 🚨 CISA has issued an advisory about the threat actor group #ScatteredSpider. Stay informed. We are continuously tracking their activity to keep you updated. #threatintelligence @CISAgov security.lookout.com/threat-intelli…
5️⃣-Minute Friday Exploring #Droppers: mobile malware acting as a bridge between devices and the command and control server of a threat actor. Now offered as a service, posing a risk for advanced #malware spread. 🎙️ Listen here: podcasters.spotify.com/pod/show/secur…
In this episode of 5 Minute Friday, we will discuss how the mobile #malware threat group, Arid Viper targets high-profile individuals with mobile malware, and how this malware can be used to steal company data. Listen to the whole episode here: podcasters.spotify.com/pod/securityso…
🔒 Discover the inner workings of Advanced Persistent Threat (#APT) groups as @chmodxx_, Staff Security Intelligence Researcher, unveils their complete modus operandi. Check out the full webinar here: lookout.com/community/webi…
Global Director of Mobile Threat Intelligence Justin Albrecht joins @DarkReading to discuss #APT attacks targeting mobile users. Watch the whole interview here: darkreading.com/mobile/how-to-… #ThreatIntelligence #ThreatResearcher
#APT tactics and interests should be a top concern. Learn how Lookout's threat hunters find and prevent cross-platform attacks: lookout.com/community/webi…
#ScatteredSpider (or Øktapus) recently attacked #Caesars in their latest successful campaign. @Lookout CSO @aaron_cockerill dove into this group, their tactics, and how they successfully target enterprise organizations. To hear his deep dive, click here: lookout.com/community/webi…
Join @Lookout’s Director of Mobile Threat Intelligence at #BHUSA as he dives into trends and reporting on threats and provides insight into Lookout's own intelligence on #APT activity. Learn more here: web.cvent.com/event/0f4dbb1e…
Why Should Enterprises Care about #APTs? It's essential to recognize that APTs and organized cybercrime groups use similar techniques in their attack process. #APT41 #cyberthreats lookout.com/blog/mobile-ap…
lima @augustintech
3 Followers 1K FollowingAndrizzle @Andrizzle221
120 Followers 3K FollowingAskar @askardyuss
9 Followers 65 Following A security researcher with focus on malware analysis from KazakhstanNupur Sonar @nupursonar
467 Followers 1K FollowingCrookCatcher for andr.. @CrookCatcherApp
155 Followers 15 Following Stolen phone or unwanted visits? CrookCatcher takes a picture of anyone trying to unlock your phone and then sends it to your email with their location.chebatory @chebatory
0 Followers 5 Following IPAE! @ActorExpose
5K Followers 4K Following Expose phishing pages and sometimes malware on domain to either to get reported or exposed out public. Majority of these criminals are part of the underground.Alafouy @alafouy
6 Followers 55 FollowingEd T @mentechnology
6 Followers 38 Following1231 @MQ3hbApx0B56559
0 Followers 4 Followingwww.CloudMalwareAnaly.. @AnalysisGroups
491 Followers 5K Following CloudMalwareAnalysisGroups@CloudMalwareAnalysisGroups.vulnerabilitiesPaulo Vecchio Júnior @paulovecchiojr
9 Followers 497 Following Adaptando... Se você acha a busca pelo autoconhecimento cara e trabalhosa, experimente ser obsoleto!king white @kingwhi57906320
0 Followers 158 FollowingSOMPO CYBER SECURITY @SompoCyber
264 Followers 1K Following SOMPOリスクマネジメント株式会社のサイバーセキュリティ事業であるSOMPO CYBER SECURITYの公式Xアカウントです。 「安心・安全・健康」に資する最高品質のサービスをご提供し、社会に貢献いたします。Øyvind Røed Bremnes @YvindEd
594 Followers 3K FollowingΚοῖος Γραι�.. @koiosgraikos
65 Followers 691 Following Breaking into #cyber one incident at a time. #incidentresponse #IR prior. Now #cti #threatintel #threatintelligence newbie analyst. Alter ego. Tweets are my ownMenuisier @HunterX0day
379 Followers 259 Followingsolo engineer @soloengineerxxx
453 Followers 655 Following Freelance Software Engineer | Blockchain | FIDOitoshinji @itoshinji80
5 Followers 207 FollowingBenjamin Adolphi @badolphi
23 Followers 145 Followingjagchandra @jag_chandra
611 Followers 351 Following Malware Research, Mobile malware, Reverse Engineering, DM me to report malware apps/URL. (On [email protected] )Benjamin Zalasky @bzalasky
4K Followers 4K Following Software engineer @Lookout. I build large-scale JavaScript applications, data visualizations, design systems and prototypes with uncompromising craftsmanship.EagleLobes @TosaNewsense
206 Followers 997 Following Hedonist, epicurean, daydreamer, optimist, logophile, inky fingered Democratic Socialist trying to empower my disenfranchised brethren, but oh, procrastinationAli Adel Morsy @aliadel828
129 Followers 3K FollowingEric Prunier @EricPrunier
196 Followers 2K Following Documentarist, author & creative producer in FranceMatt @matt_ac_t
9 Followers 453 FollowingOpen Tea News @openteanews
102 Followers 249 Following Spilling the tea — Open source, independent news outletLesliezc @Lesliezc71
1 Followers 3K FollowingAlbertYZhang @AlbertYZhang
2K Followers 4K Following Analyst @ASPI_org @ASPI_CTS Cyber, tech, intelligence, data science & securityHiryu Oyashio @Sokuo_Ichigeki
821 Followers 5K Following Latest information regarding Technology, Defense, Global Markets, Breaking News and NBA...as well as opinions on poignant topics... POIGNANT!🧐Peter J. Fry @peterjfry
882 Followers 5K Following infosec, human rights, privacy, tech. https://t.co/9CYxBeBCyBFr4 @_icebre4ker_
507 Followers 783 Following Mobile Security Researcher | Threat Hunting | Threat Intel | RE | Malware Analysis | Discoverer of: SharkBot, PixPirate, TeaBot and ReviveXenotype @Xenotyped
327 Followers 1K Following Forensics/mobile forensics/malware, general infosec and OSINT. Mostly here for news and the occasional rant into the void. NOT the DJ, but proficient in SpotifyKatrina Manson @KatrinaManson
15K Followers 3K Following Bloomberg @Business covering cyber and emerging tech. Stories here: https://t.co/IMUKDDeT6u Previous stories: https://t.co/x1l1p2Q22sGreg Walton ⚗️ (B.. @meta_lab
5K Followers 6K Following Senior Investigator, Cyber Threat Intelligence @SecDev | ex-@Ox_CyberSec, @oiioxford, @CitizenLab | @[email protected]Eli Jellenc @sej3l
154 Followers 2K Following International Security, Cyber Threat Intel, Policy Analysis, SocAnthro Methods, Statsmariam @mars0x_
313 Followers 202 Following cyber operations by day, wannabe threat researcher by night.Emmanuel Ekulu @EmmanuelEkulu
141 Followers 796 Following EXECUTIVE DIRECTOR - AFEGAI (African Forum for Ethics and Governance of Artificial Intelligence) + Responsible AI Expert @GPAI_PMIA & #AiJustice Researcherlestb04 @lestb0717
16 Followers 277 Followingjermaine @jermain42779789
32 Followers 403 FollowingRuna Sandvik @runasand
77K Followers 374 Following Founder of @GranittHQ, securing journalists and at-risk people around the world.KDR @kristindelrosso
1K Followers 914 Followingapurva @abby_kcs
379 Followers 1K Following Mobile Security Researcher @ MSFT. Sessional lecturer @ McMaster University. Threat intelligence and malware reverse engineering. #CTI #infosecPatrick Howell O'Neil.. @HowellONeill
18K Followers 3K FollowingKristina Balaam @chmodxx_
6K Followers 1K Following 💻 Senior Staff Threat Researcher @Lookout. 中文学习. Malware, Threat Intel, International Relations, Human Rights. Opinions my own.Lookout @Lookout
47K Followers 402 Following We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data.In this episode, we welcome back Ramy Houssaini to explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources. Listen to the full episode here: lookout.com/community/podc…
@LookoutThreats Good morning. Guys, Apple released 17.1.2.
Get the latest advisory info on #BlastPass. ⬇️
🚨BlastPass Advisory 🚨 Apple has released a security update 16.6.1 for iOS and iPadOS, addressing vulnerabilities exploited by the BlastPass exploitation chain. This update is critical for all iPhone and iPad users. #BlastPass #iOS #iPadOS
Lookout has been covering #AhMyth since January 2018. We have you protected. ✅ arstechnica.com/information-te…
.@LookoutThreats confirmed Android apps exploited a zero-day #vulnerability that allowed them to surreptitiously take control of millions of end-user devices to steal personal data and install malicious apps. Read the full story here 👇 bit.ly/3nofoL3
.@LookoutThreats discovered nearly 300 loan apps that exhibit predatory behavior such as exfiltrating excessive user data from mobile devices and harassing borrowers for repayment. Learn tips on how to protect yourself.⬇️ bit.ly/3OOamRF
.@LHreports just released their findings into RCS Lab, the #spyware vendor behind #Hermit, and Tykelab, one of its subsidiaries. Check out the full story with insights from @LookoutThreat researchers Justin Albrecht and Paul Shunk to learn more. bit.ly/3Tk19T3
Thankful for 4 years of research and growth with @LookoutThreats ✨🎂
Anubis is being spread under the guise of an application from Orange S.A. (a leading telecoms company). The #Android banking trojan is targeting clients of 400 financial orgs and cryptocurrency wallets. Nice analysis by @LookoutThreats @chmodxx_ resources.lookout.com/blog/anubis-ta…
Etats-Unis 🇺🇸: la société de #cybersécurité @Lookout cherche à entraver une campagne de #phishing qui vise les familles de #militaires américains. L'argent apparaît comme la principale motivation de ces #cybercriminels qui ont créé ~50 sites internet depuis le Nigeria. @chmodxx_
We are currently working to take down this active, long-running #phishing campaign targeting families of U.S military personnel and individuals interested in pursuing romantic relationships with soldiers. bit.ly/3Ej2ykO
iPhones of 11 US officials have been infected by #Pegasus, making this the widest known attack of U.S. officials by the #spyware. Check out the updated Pegasus blog to learn how to protect yourself and your organization from the #spyware. bit.ly/3p4XEBy
#Hacking competitions can be invaluable for vendors, but they aren't without risk. Participants can sell or exploit #vulnerabilities they’ve found outside of the competition, says @LookoutThreats researcher @chmodxx_. Read this @Forbes article for more. forbes.com/sites/daveywin…
In August 2016, @citizenlab and @Lookout collaborated on analyzing a version of NSO's Pegasus spyware for iOS. The technical report is worth a look, especially for those interested in cyber paleontology. #ProjectPegasus info.lookout.com/rs/051-ESQ-475…
We just reached a new milestone of 200 million devices protected globally! 🎉 Request a demo to learn why our Mobile Endpoint Security is trusted by hundreds of millions of users: bit.ly/3x5nBUt #EndpointtoCloud #MTD #mobilethreatdefense #mobilesecurity #cybersecurity
Another fascinating discovery by @LookoutThreats! With #cryptocurrency so hot these days, it's the perfect opportunity for scammers. Read this @threatpost article to learn how apps without any malicious code were able to steal from nearly 100,000 people. bit.ly/2TMYHdL
The latest @LookoutThreats discovery has been picked up by @CyberScoopNews! Check out this article to understand how these benign apps were able to scam tens of thousands of people. bit.ly/2VhQYF0
#BREAKING: @LookoutThreats has identified nearly 200 #Android apps both on and off #GooglePlay that have scammed at more than 93,000 people with fake #cryptocurrency mining services. Check out this blog by Ioannis Gasparis to learn more. bit.ly/2SNjqxE
With #data going wherever it’s needed— from the #endpoint to the #cloud, you need to know how to protect it in a way that respects personal privacy. Join us for a live webinar with @HHSchless to learn more. #E2CSecurity #endpointtoCloud bit.ly/3uTmC7S
@Lookout’s #ThreatLab is now live on our website. Here you’ll find threat data and guidance for notable industry finds including those from @LookoutThreats, interactive material, @EndpointEnigma episodes and more. Check it out! 👾🕵 bit.ly/31FM5FN
#Attackers on the #DarkWeb are recruiting people with software engineering skills to develop #phishing sites, #malware or conduct illegal penetration tests, says Kristina Balaam @chmodxx_, @LookoutThreats researcher. Check out this @dice article for more. insights.dice.com/2021/03/08/why…