Skip to main content
Security Soapbox | Privacy, Security and Everything in Between

Security Soapbox | Privacy, Security and Everything in Between

By Lookout

This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
Available on
Apple Podcasts Logo
Castbox Logo
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

Go Cloud or go Home: Why Cybersecurity Needs to Live in the Cloud

Security Soapbox | Privacy, Security and Everything in BetweenAug 04, 2021

00:00
17:16
 5 Minute Friday | A New EU Mandate Makes iOS Less Secure
Mar 22, 202406:33
5 Minute Friday | CryptoChameleon

5 Minute Friday | CryptoChameleon

In this week’s episode of 5 Minute Friday, we discuss Lookout's discovery of CryptoChameleon, an ongoing advanced phishing kit targeting cryptocurrency platforms and the Federal Communications Commission (FCC). We will dive into the tactics used by the attackers, including SMS and voice phishing, and the success of the kit in stealing high-quality data from victims.


For an in-depth analysis, visit: www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phishing-kit


Join Lookout's upcoming exclusive threat briefing: www.lookout.com/community/webinars/cryptochameleon-phishing-kit

Mar 01, 202410:08
5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs
Jan 26, 202404:39
5 Minute Friday | Critical Vulnerabilities in iOS & Android

5 Minute Friday | Critical Vulnerabilities in iOS & Android

In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them.


To keep up to date on current threats: www.lookout.com/threat-intelligence

Dec 08, 202305:02
Unveiling the Impact of Cyber Poverty with Ramy Houssaini
Dec 07, 202328:53
5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass
Nov 17, 202303:32
5 Minute Friday | Dropper as a Service
Nov 10, 202304:37
5 Minute Friday | Arid Viper: The Mobile Malware Threat
Nov 03, 202304:30
5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind

5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind

In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings.


For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware

Nov 02, 202304:30
5 Minute Friday | Red Alert-Rocket Alerts: A Malicious Threat Exploiting Societal Disruption
Nov 02, 202305:03
5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device

5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device

On this week’s episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device —  the device that goes everywhere you do.


For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security

Nov 02, 202303:46
5 Minute Friday | Scattered Spider, MGM, and Caesars

5 Minute Friday | Scattered Spider, MGM, and Caesars

Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week’s 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target.


For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf

Sep 14, 202304:53
Soap Suds: Protect Your Data From Risky Apps Like TikTok

Soap Suds: Protect Your Data From Risky Apps Like TikTok

Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data.


For more information on data collection related security threats and how to ban risky apps like TikTok, check out our blog: https://bit.ly/tiktok-podcast

Apr 24, 202306:24
Data Overload: Edge Computing Augmenting Our Cloud-first World (ft. Said Ouissal/ZEDEDA)

Data Overload: Edge Computing Augmenting Our Cloud-first World (ft. Said Ouissal/ZEDEDA)

With more devices than humans in our world today, the amount of data being generated is higher than ever, with no sign of slowing down. Enter: edge computing.

In this episode, host Hank Schless is joined by Said Ouissal, Founder and CEO at ZEDEDA, to discuss edge computing — from its business applications to the challenges of securing the technology and everything in between.

Apr 10, 202322:30
Don’t Think Twice, Modern IT is Alright: Top Ways to Modernize Your IT Today (ft. Faz Sadikali, Cloud Insights)
Dec 05, 202220:49
The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security.

Nov 14, 202217:09
Soap Suds: The Return of SharkBot

Soap Suds: The Return of SharkBot

SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in the wild in October 2021. In this newest variation, the malware targets banking credentials through two apps with collectively over 60,000 downloads on Google Play. In this episode, host Hank Schless discusses what you need to know about SharkBot and how to protect yourself and your organization.

Sep 21, 202206:07
The Twilio Breach and Phishing: Lessons Learned

The Twilio Breach and Phishing: Lessons Learned

Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus. Tune in for this short episode to learn more about the mechanisms behind the phishing campaign and tips for mitigating this threat.

To learn more about this breach and how to protect your organization, check out our blog on this topic: https://bit.ly/3cuweCI

Aug 29, 202206:26
Fast and Furious: How to Tackle Speed and Complexity in Security with Ramy Houssaini (BNP Paribas)

Fast and Furious: How to Tackle Speed and Complexity in Security with Ramy Houssaini (BNP Paribas)

Cybersecurity challenges are moving at cloud speed and leaving legacy approaches in the dust. On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations CISOs should be aware of in this rapidly changing security environment.

To learn more about what Ramy spoke about, check out Hank's blog on this topic: https://bit.ly/3KtYMsI

Jun 30, 202216:54
Risky Business: How to Win Over Your Boards of Directors
May 18, 202218:50
You Need All the Telemetry You Can Get: Zero Trust is a Shared Responsibility (feat. Google)
Apr 21, 202218:09
5-minute Fridays: Cyber Readiness And The Russia-Ukraine War
Mar 11, 202204:11
Breaking the Chain: Are You the Unintended Victim of a Supply Chain Attack? (Ft. Vodafone Security Experts)
Feb 18, 202219:29
Let’s Get Real About Zero Trust: How To Assess Your Security Posture
Jan 05, 202223:14
Is 2022 the Beginning of the End of On-prem Security?
Dec 17, 202117:16
Ain’t No Mountain High Enough: Achieving Zero Trust for a Mobile Workforce (feat Art Ashmann from VMware)
Nov 22, 202120:23
Know Thy Enemy: What is Pegasus and What Can You Do?
Aug 06, 202118:49
Go Cloud or go Home: Why Cybersecurity Needs to Live in the Cloud
Aug 04, 202117:16
When Your Old Reliable is no Longer Enough: Why it’s Time to Move on From VPNs
Jun 28, 202122:01
Healthcare Security in the Age of 5G and Remote Work
May 26, 202121:00
Mission Possible: Kiersten Todt on Securing the Public Sector
Apr 21, 202123:20
Women Making Waves in Cybersecurity (feat. guest host Kristina Balaam)
Mar 03, 202133:09
New Year, New Challenges: What to Expect in 2021
Jan 25, 202121:12
The Supply Chain Reaction: Lessons from SolarWinds
Jan 08, 202118:59
Threat Hunt With the Right Red Thread: Why You Need Mobile EDR
Dec 16, 202020:59
Why Legacy Security Can't Protect Modern Devices
Oct 15, 202021:13
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs
Sep 03, 202028:33
The Dangers of Phishing in Our Modern World
Jul 31, 202019:28
Management Isn't Security: Why You Need More Than MDM
Jun 29, 202018:54
How to Secure Your Remote Workforce
May 28, 202020:10