The Sword Has Been Drawn: What DarkSword’s Expansion in the Wild Means for Mobile Security and the Enterprise

The last few weeks have marked a chaotic turning point in the mobile threat landscape. We’ve seen mass exploitations across numerous iOS versions by multiple threat actors, driven by sophisticated exploit chains like Coruna and now DarkSword. What makes these threats different is not just their activity, but their trajectory.

Android and The Sideloading Security Gap

For years, debates about Android security have essentially focused on the wrong questions. Is the operating system secure enough? Are mobile exploits becoming more sophisticated? Are app stores doing enough to screen malicious software?

Attackers Wielding DarkSword Threaten iOS Users

World’s Largest Mobile Threat Intelligence Dataset Powers Discovery of Hit-and-Run Exploit Targeting iOS Users and Cryptocurrency Assets

Lookout Expands Protection Following Google’s Disruption of the IPIDEA Proxy Network

Last week, Google’s Threat Intelligence Group announced the disruption of IPIDEA, one of the largest and most abused residential proxy networks observed in the wild.

How to Leverage Threat Intelligence Feeds to Level Up Your Security Strategy

Learn how to leverage threat intelligence platforms to protect your organization’s mobile devices from vulnerabilities, malware, and social engineering.

The Role of Digital Forensics and Incident Response (DFIR) in Cybersecurity

Learn how to develop a comprehensive digital forensics and incident response (DFIR) strategy, which can help your organization recover after a data breach.

Exclusive Partner Briefing: Phishing for Financial Gain: UNC3944

Join our upcoming Exclusive Partner Briefing: Phishing for Financial Gain: UNC3944

The Dangers of Advanced Persistent Threat (APT) Groups and What Enterprise Security Teams Need to Know

APTs are often thought of as primarily targeting governments for cyber espionage. However in reality, they could have just as much impact on the private sector.

How APT 41 Is Using Mobile Devices to Target Your Organization

Join us for this exclusive partner security briefing for a breakdown of these threats and to see why they are now targeting mobile devices.

No items found.