Follow the Money

Follow the Money: Cyber Threats to Financial Services (Part Two)

In this week’s installment of the Follow the Money series, we explore the most common attack ...
Follow the Money

Follow the Money: Threat Actors in the Financial Services Landscape (Part One)

As in most criminal enterprises, the objective is to make money. It is only natural for cyber ...
Email

Watch Your BEC This Tax Season

Raise your hand if you have ever received an email from an executive at your company, seemingly out ...
man at computer

Three Common Threat Actors and the One You Might Not Know About

We’ve all heard stories of espionage, mafia crime, and lone wolf attackers throughout history. ...
Saving Lives, Losing Data

Saving Lives, Losing Data: Data Breaches in Healthcare

As patient care and health records become digitalized, protecting the healthcare industry is more ...
ScoutThreat

Zero-Day Vulnerabilities: An Inside Look at Luxor2008

When it comes to breaches, we have seen this time and again: an exploited vulnerability that costs ...
CV of Cybercriminal

The CV of a Cybercriminal

What is more attractive than an undetectable, money-making, remote access malware to a ...
Catch a Phish

To Catch a Phish

Probably like you, LookingGlass Cyber Solutions, Inc.’s senior management was recently Phished. ...
Super Bowl Sunday Risk

Super Bowl Sunday Risk – What to look out for at Super Bowl LIII

Super Bowl LIII is less than a week away, and with over 1 million visitors expected in the Atlanta ...
Data Privacy Day 2019

Data Privacy Day: Protecting Your Executives

Today is Data Privacy Day, and we’re joining forces with hundreds of other companies, government ...