Endpoint Enigma | Privacy, security and everything in between

Follow Endpoint Enigma | Privacy, security and everything in between
Share on
Copy link to clipboard

This podcast series is brought to you by Lookout – the leader in mobile security. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.

Lookout


    • Jan 17, 2025 LATEST EPISODE
    • monthly NEW EPISODES
    • 15m AVG DURATION
    • 44 EPISODES


    Search for episodes from Endpoint Enigma | Privacy, security and everything in between with a specific topic:

    Latest episodes from Endpoint Enigma | Privacy, security and everything in between

    Cybersecurity Predictions: A Look into 2025's Security Landscape

    Play Episode Listen Later Jan 17, 2025 41:17


    2024 saw a surge in cyberattacks alongside rapid tech advancements, making it clear that staying ahead in the digital world is more important than ever. In this week's session, we'll explore the top cybersecurity predictions for 2025 — highlighting emerging threats, key trends, and the latest strategies for fortifying your defenses. Listen as our expert panel shares valuable insights and predictions on: New ransomware tactics and data breach methods How AI is shaping both security solutions and cyberattacks Growing threats from nation-states The latest security regulations and compliance frameworks

    Securing Democracy: Election Integrity, Threats and Solutions with Jim Coyle

    Play Episode Listen Later Oct 24, 2024 32:46


    On this week's episode of Security Soapbox, we are joined by Jim Coyle, US Public Sector Field CTO at Lookout. We're diving into the hot topic of election security; unpacking various threats, like disinformation campaigns, cyber espionage, and weaknesses in our election infrastructure — and who's behind them. We'll also chat about current protective measures and some innovative ideas, like using blockchain to fight misinformation. Watch the Billington Cybersecurity Summit session on Election Security here. Follow Hank on LinkedIn Follow Jim on LinkedIn

    Why is my CEO Texting me? What to do About Executive Impersonation Attacks

    Play Episode Listen Later Oct 16, 2024 5:12


    We've all received that urgent text message from our “CEO” asking us to take care of an urgent task. This form of social engineering has become a preferred tactic by threat actors who want to create a high-pressure situation in order to convince employees to send money or share sensitive data.  This week's episode will cover the why and how behind these attacks. We will also cover the critical role they play in the modern kill chain and how to protect against them.  To see how Lookout protects against advanced smishing and executive impersonation attacks, read our release blog or watch the short overview video below.  Blog: https://www.lookout.com/blog/smishing-prevention-executive-impersonation Video: https://vimeo.com/1009294652  

    Advanced Web Threats: Data Leaks, Shadow IT, and AI

    Play Episode Listen Later Oct 11, 2024 13:48


    On this week's episode of Security Soapbox, we are joined by Charity Spiri, who oversees the Security Service Edge (SSE) product portfolio at Lookout. Were challenging the common perception of web-based threats being solely network attacks. Web threats encompass a wider range of risks, including data leakage, shadow IT, and security concerns from AI platforms. While not entirely new issues, these pose significant challenges within the ever-evolving web-based threat landscape. For a deeper dive into advanced web threats and how to protect your organization, check out Charity's recent session, Defending Against Advanced Threats with a Modern Secure Web Gateway. Follow Hank Schless on LinkedIn Follow Charity Spiri on LinkedIn

    5 Minute Friday | A New EU Mandate Makes iOS Less Secure

    Play Episode Listen Later Mar 22, 2024 6:32


    In this week's episode of 5 Minute Friday, we discuss the new Digital Markets Act (DMA) in the EU and its potential impact on iOS security. We talk through the possible security risks and malware threats that could come from opening iOS devices to third-party app stores. To keep up to date on current threats: ⁠www.lookout.com/threat-intelligence --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | CryptoChameleon

    Play Episode Listen Later Mar 1, 2024 10:07


    In this week's episode of 5 Minute Friday, we discuss Lookout's discovery of CryptoChameleon, an ongoing advanced phishing kit targeting cryptocurrency platforms and the Federal Communications Commission (FCC). We will dive into the tactics used by the attackers, including SMS and voice phishing, and the success of the kit in stealing high-quality data from victims. For an in-depth analysis, visit: www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phishing-kit Join Lookout's upcoming exclusive threat briefing: www.lookout.com/community/webinars/cryptochameleon-phishing-kit --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | BadBazaar: iOS and Android Used to Target Tibetans and Uyghurs

    Play Episode Listen Later Jan 26, 2024 4:38


    In this week's episode of 5 Minute Friday, we discuss BadBazaar, an iOS & Android surveillanceware by China's APT-15, designed to target Uyghur Muslims. We take a dive into the invasive nature of Chinese "pre-criminal" surveillance and BadBazaar's recent expansion to iOS devices, providing insights into its early development and the evolving landscape of mobile threats. To keep up to date on current threats: www.lookout.com/threat-intelligence --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Critical Vulnerabilities in iOS & Android

    Play Episode Listen Later Dec 8, 2023 5:02


    In this week's episode of 5 Minute Friday, we discuss three critical vulnerabilities affecting both iOS and Android devices. We also discuss the importance of patching these vulnerabilities, and the modern phishing attack tactics used to exploit them. To keep up to date on current threats: www.lookout.com/threat-intelligence --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    Unveiling the Impact of Cyber Poverty with Ramy Houssaini

    Play Episode Listen Later Dec 7, 2023 28:52


    In this episode, host Hank Schless welcomes back Ramy Houssaini, Chief Cyber & Technology Risk Officer at BNP Paribas and Founding Chair of The Cyber Poverty Line Institute. They explore the concept of 'cyber poverty,' and shed light on the global disparity in cybersecurity resources, highlighting the critical need for inclusive cyber capability building to safeguard individuals and societies worldwide. For more information on the Cyber Poverty Line Institute, visit: www.cyberpovertyline.org For more information on Lookout, visit: www.lookout.com Connect with Ramy Houssaini on LinkedIn here: www.linkedin.com/in/strategicleadership Connect with Hank Schless on LinkedIn here: www.linkedin.com/in/hank-schless --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Robin Banks: A Poster Child for MFA Bypass

    Play Episode Listen Later Nov 17, 2023 3:32


    In this week's episode of 5 Minute Friday, we discuss the resurgence of the Robin Banks, a phishing-as-a-service kit, and its tactics like MFA bypass. We also discuss related threats such as 0ktapus, showcasing evolving cyber threats and the replication of successful attack methods among different groups. To stay up to date on recent threat intelligence, ⁠⁠click here⁠. --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Dropper as a Service

    Play Episode Listen Later Nov 10, 2023 4:36


    In this episode of 5 Minute Friday, we discuss droppers, a type of mobile malware that serves as a middleman between a target device and the threat actor's command and control server. Droppers are now being offered as a service, which could enable more advanced malware to get on more devices.  To stay up to date on recent threat intelligence, ⁠click here⁠. --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Arid Viper: The Mobile Malware Threat

    Play Episode Listen Later Nov 3, 2023 4:29


    In this episode of 5 Minute Friday, we discuss recent research related to the advanced persistent threat (APT) group Arid Viper. Learn about how their tactics for targeting mobile users are exemplary of an attack chain that many cybercriminals use and why it's so effective To stay up to date on recent threat intelligence, click here. --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Unveiling Infamous Chisel, Sandworm, and Deblind

    Play Episode Listen Later Nov 2, 2023 4:29


    In this episode of Five Minute Friday, we delve into the shadowy world of cyber espionage as we explore Infamous Chisel, Sandworm, and Deblind. Discover how the Russian APT group, Sandworm, known for major international cyberattacks, ventured into mobile surveillance with Infamous Chisel. Learn about Deblind, a system-level Android app that operates with unprecedented privileges, collecting user activity and suppressing security warnings. For more information, visit: www.lookout.com/threat-intelligence/article/russian-sandworm-apt-infamous-chisel-deblind-spyware --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Red Alert-Rocket Alerts: A Malicious Threat Exploiting Societal Disruption

    Play Episode Listen Later Nov 2, 2023 5:03


    In this episode of Five Minute Friday, we discuss how societal disruption creates opportunities for malicious actors to exploit people's uncertainties. In this case, we examine a recent case where a malicious version of the legitimate mobile app, RedAlert - Rocket Alerts, was distributed, targeting individuals in Israel. To stay protected against these types of mobile threats, click here. --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | iLeakage: The Hidden Threat to Your iOS Device

    Play Episode Listen Later Nov 2, 2023 3:46


    On this week's episode of 5 Minute Friday, we are discussing a recent iOS vulnerability, iLeakage, that exploits your web browser including opened tabs and login credentials. Learn more about iLeakage and the importance of protecting your mobile device —  the device that goes everywhere you do. For additional resources on protecting your mobile device, visit: www.lookout.com/products/endpoint-security/mobile-endpoint-security --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    5 Minute Friday | Scattered Spider, MGM, and Caesars

    Play Episode Listen Later Sep 14, 2023 4:53


    Caesars Entertainment and MGM resorts were recently breached by a well-known cybercrime group, Scattered Spider. Listen to this week's 5 Minute Friday to learn about these attacks, how this group operates, and what you can do to avoid your organization being the next target. For a deeper dive, visit: www.lookout.com/documents/threat-reports/us/lookout_tg_scatteredspider.pdf --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    Soap Suds: Protect Your Data From Risky Apps Like TikTok

    Play Episode Listen Later Apr 24, 2023 6:23


    Recent hype around Chinese apps TikTok and Pinduoduo has put a spotlight on the risk surrounding mobile apps. In this quick-fire Soap Suds episode, host Hank Schless discusses the concerns behind these Chinese apps and highlights the reasons why organizations need to keep tabs on mobile apps in general to minimize the risk to their data. For more information on data collection related security threats and how to ban risky apps like TikTok, check out our blog: https://bit.ly/tiktok-podcast --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    Data Overload: Edge Computing Augmenting Our Cloud-first World (ft. Said Ouissal/ZEDEDA)

    Play Episode Listen Later Apr 10, 2023 22:30


    With more devices than humans in our world today, the amount of data being generated is higher than ever, with no sign of slowing down. Enter: edge computing. In this episode, host Hank Schless is joined by Said Ouissal, Founder and CEO at ZEDEDA, to discuss edge computing — from its business applications to the challenges of securing the technology and everything in between. --- Send in a voice message: https://podcasters.spotify.com/pod/show/securitysoapbox/message

    Don't Think Twice, Modern IT is Alright: Top Ways to Modernize Your IT Today (ft. Faz Sadikali, Cloud Insights)

    Play Episode Listen Later Dec 5, 2022 20:48


    Organizations are making big decisions to implement cloud solutions to boost collaboration and gain competitive advantage. But many aren't prepared to handle the risks that cloud services introduce. In this episode of Security Soapbox, host Hank Schless talks shop with Faz Sadikali, Founder of Cloud Insights, on how to build secure workstreams and level up IT to reap the benefits of the cloud while ensuring data remains secure. Read Faz's blog about IT modernization here: https://bit.ly/3h3qqlW --- Send in a voice message: https://anchor.fm/securitysoapbox/message

    The Sleeping Giant is Waking Up: the State of Mobile Security Today ft. Cile Montgomery/VMware

    Play Episode Listen Later Nov 14, 2022 17:08


    With the rapid adoption of BYOD and the growing remote workforce, IT and security teams are just catching on to the need for mobile security to protect corporate data and assets. In this episode, host Hank Schless is joined by Cile Montgomery, Product Line Marketing Manager at VMware, to discuss the new risks mobile devices present to organizations and what trends to expect in the next year for mobile security. --- Send in a voice message: https://anchor.fm/securitysoapbox/message

    Soap Suds: The Return of SharkBot

    Play Episode Listen Later Sep 21, 2022 6:07


    SharkBot, a notorious banking trojan, has just resurfaced since it was first spotted in the wild in October 2021. In this newest variation, the malware targets banking credentials through two apps with collectively over 60,000 downloads on Google Play. In this episode, host Hank Schless discusses what you need to know about SharkBot and how to protect yourself and your organization. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    The Twilio Breach and Phishing: Lessons Learned

    Play Episode Listen Later Aug 29, 2022 6:25


    Twilio, Cloudflare and other organizations reported employees were targeted with a phishing campaign leveraging a kit codenamed 0ktapus. Tune in for this short episode to learn more about the mechanisms behind the phishing campaign and tips for mitigating this threat. To learn more about this breach and how to protect your organization, check out our blog on this topic: https://bit.ly/3cuweCI --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Fast and Furious: How to Tackle Speed and Complexity in Security with Ramy Houssaini (BNP Paribas)

    Play Episode Listen Later Jun 30, 2022 16:53


    Cybersecurity challenges are moving at cloud speed and leaving legacy approaches in the dust. On this week's episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations CISOs should be aware of in this rapidly changing security environment. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Risky Business: How to Win Over Your Boards of Directors

    Play Episode Listen Later May 18, 2022 18:50


    When pitching to your board of directors, security should be treated like any other business unit. On this week's Security Soapbox, our host Hank Schless is joined by Paul Simmonds, CEO of the Global Identity Foundation and Former CISO of AstraZeneca, ICI and Motorola Cellular Infrastructure. They discuss how to cut through buzzwords and turn security into a business enabler. Check out Paul's guest blog on lookout.com to learn more: https://bit.ly/38zFunf --- Send in a voice message: https://anchor.fm/endpointenigma/message

    You Need All the Telemetry You Can Get: Zero Trust is a Shared Responsibility (feat. Google)

    Play Episode Listen Later Apr 21, 2022 18:08


    While Zero Trust is a popular framework, it doesn't come with a user manual. On this week's Security Soapbox, Ashish Kathapurkar and Nikhil Sinha from Google join Hank Schless to discuss how securing your cloud apps requires an approach that goes beyond the apps' capabilities. Check out our blog to learn more: https://bit.ly/3vAo15w --- Send in a voice message: https://anchor.fm/endpointenigma/message

    5-minute Fridays: Cyber Readiness And The Russia-Ukraine War

    Play Episode Listen Later Mar 11, 2022 4:10


    As the conflict in Ukraine continues, including in cyberspace, the rest of the world needs to be prepared. Listen in on this 5-minute Fridays episode where I discuss what's going on in Ukraine and how organizations can be cyber ready. For more information, also check out the blog I wrote on this topic: https://bit.ly/3MMIuMu --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Breaking the Chain: Are You the Unintended Victim of a Supply Chain Attack? (Ft. Vodafone Security Experts)

    Play Episode Listen Later Feb 18, 2022 19:29


    Between SolarWinds and Log4J, supply chain attacks have become a common occurrence over the past couple of years. In this episode, host Hank Schless is joined by Vodafone security experts Andy Deacon and Verity Carter-Johnson to define what a supply chain is, what the intended and unintended consequences are, and what legal ramifications exist for those who fall victim. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Let's Get Real About Zero Trust: How To Assess Your Security Posture

    Play Episode Listen Later Jan 5, 2022 23:14


    While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey. In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to scale back all the marketing noise surrounding the term and discuss how organizations can pragmatically get started with Zero Trust. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Is 2022 the Beginning of the End of On-prem Security?

    Play Episode Listen Later Dec 17, 2021 17:16


    Nearly two years after we were forced to experiment with remote work, 2022 will be an inflection point for both threats and cybersecurity solutions. Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year. We'll be discussing everything from software supply chains to threat hunting and data protection. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Ain't No Mountain High Enough: Achieving Zero Trust for a Mobile Workforce with Art Ashmann (VMware)

    Play Episode Listen Later Nov 22, 2021 20:22


    Widespread remote work has called for a paradigm shift in how we conduct enterprise cybersecurity. On this week's Endpoint Enigma, VMware Staff EUC Solutions Engineer, Art Ashmann joins Hank Schless to discuss how mobile and cloud technology have enabled us to manage both work and personal responsibilities from anywhere and what organizations can do to securely take advantage of it. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Know thy enemy: what is Pegasus and what can you do?

    Play Episode Listen Later Aug 6, 2021 18:48


    First uncovered by Lookout and Citizen Lab in 2016, the Pegasus spyware was confirmed to have been used on targets such as business executives and government officials. Veteran of the cybersecurity industry, Joseph Davis of Microsoft, walks us through how spyware came to be, its implications and how you can protect yourself and your organization against Pegasus. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Go cloud or go home: why cybersecurity needs to live in the cloud

    Play Episode Listen Later Aug 4, 2021 17:16


    Cloud-delivered security solutions offer unrivaled storage flexibility and computing power. But do they introduce new risks? Join host Hank Schless and Lookout head of sales engineering for International, Tom Davison, as they discuss the differences between on-premise security solutions and cloud-delivered ones. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    When your old reliable is no longer enough: why it's time to move on from VPNs

    Play Episode Listen Later Jun 28, 2021 22:01


    Businesses have relied on VPNs for over two decades. But with the rapid adoption of cloud services and mobile technology, the way we store and access data has changed. On this week's Endpoint Enigma, Lookout CTO of SASE Products Sundaram Lakshmanan joins Hank Schless to discuss why VPNs fall short when it comes to security and user experience and what the best alternative is for providing secure network access to your remote workers. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Healthcare Security in the Age of 5G and Remote Work

    Play Episode Listen Later May 26, 2021 21:00


    The healthcare industry has undergone a major digital transformation since HIPAA was introduced in 1996. With technology rapidly outpacing regulations, keeping patient data safe and hospitals up and running has become more challenging than ever. On this week's Endpoint Enigma, Mike Murray, CEO of Scope Security and former Lookout CISO sits down with host Hank Schless to assess what healthcare looks like in the age of 5G and our work-from-anywhere world. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Mission Possible: Kiersten Todt on Securing the Public Sector

    Play Episode Listen Later Apr 21, 2021 23:20


    When it comes to defending a nation, a strong cybersecurity plan is vital. In this episode, we're joined by Kiersten Todt, Executive Director of the Presidential Commission on Enhancing National Security and Managing Director of the Cyber Readiness Institute to discuss the top cybersecurity challenges facing the U.S. public sector. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Women Making Waves in Cybersecurity

    Play Episode Listen Later Mar 3, 2021 33:09


    This episode, Lookout threat researcher Kristina Balaam takes over as guest host to discuss the importance of diversity in cybersecurity with federal sales engineer Victoria Mosby. Victoria is a member of the Day of Shecurity initiative and the Lookout Foundation. Tune in to hear their experiences as engineers in a traditionally male-dominated field and their advice for starting your career in cybersecurity. Don't forget, the 2021 Day of Shecurity is happening March 23 virtually. You can get more information at dayofshecurity.com. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    New Year, New Challenges?

    Play Episode Listen Later Jan 25, 2021 21:11


    2020 was an especially challenging year, including for the cybersecurity industry. But what should we expect for 2021? Join host Hank Schless, threat researcher Kristina Balaam and Christoph Hebeisen, head of the Lookout Threat Research team, to find out what's going on with privacy, COVID-19-related threats, ransomware and other trends. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    The Supply Chain Reaction

    Play Episode Listen Later Jan 8, 2021 18:58


    A software supply chain attack put SolarWinds in the headlines of every news publication in America. In this episode, we're joined by Tim LeMaster, Director of Systems Engineering at Lookout, to discuss what happened, whether this could happen to mobile devices and how a Zero Trust security model can safeguard your infrastructure. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Threat hunt with the right red thread

    Play Episode Listen Later Dec 16, 2020 20:58


    Offices are empty and people are working from home. Tablets and smartphones have become a primary way workers are staying productive. Alex Gladd, Principal Product Manager joins us to talk about why you can't stop breaches without including mobile devices as part of your threat hunting efforts. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Desktop security with wheels isn't mobile

    Play Episode Listen Later Oct 15, 2020 21:13


    Tablets and smartphones are increasingly becoming the center of our personal and professional lives. In this episode, we're joined by Aaron Cockerill, Chief Strategy Officer at Lookout. We discuss what's different about securing mobile endpoints compared to desktops and laptops, and why desktop security can't protect mobile. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Chinese Surveillance Campaigns

    Play Episode Listen Later Sep 3, 2020 28:32


    The Lookout Threat Intelligence team discovered a series of Chinese campaigns targeting the Uyghur Muslim minority spanning across 14 countries dating back to at least 2013. This week we're joined by threat researchers Apurva Kumar and Kristin Del Rosso and Threatpost.com reporter Lindsey O'Donnell to discuss the importance of this discovery and what we can learn from it. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    It's all about Phishing

    Play Episode Listen Later Jul 31, 2020 19:27


    With the proliferation of smartphones and tablets, phishing attacks are no longer what they used to be – delivered via email and opened on a desktop computer. Tune in to find out how the likes of WhatsApp, Twitter, and Tinder have made phishing so dangerous on the mobile device. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Management isn't security

    Play Episode Listen Later Jun 29, 2020 18:54


    In this episode, we chat with our mobile security experts about mobile device management. Why is MDM in and of itself not security. What's the best way to protect an organization's smartphones and tablets? Listen in to find out. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    For a Secure Remote Workforce

    Play Episode Listen Later May 28, 2020 20:09


    The outbreak of COVID-19 has forced many organizations to adapt and speed up the adoption of remote working. In parallel, cyber attackers responded with a variety of new emerging threats, taking advantage of the situation. In this pilot episode our guest, David Richardson, who brings more than 10 years of experience in the mobile industry, will expose some of those threats and review the challenges and solutions in order to quickly adapt to a secure remote workforce. --- Send in a voice message: https://anchor.fm/endpointenigma/message

    Claim Endpoint Enigma | Privacy, security and everything in between

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel