Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sensitive Enterprise Data Is Flowing Into AI Tools at Scale

AI has no-so-quietly shifted from a single interface used by a small group of specialists into a mainstream capability embedded across enterprise infrastructure. Employees are now operationalizing AI for core business functions across departments. This shift fundamentally changes how organizations must think about data security.

FortiOS VPN Auth Bypass Flaw (CVE-2026-22153) Exposes Remote Access

LDAP is commonly used as a centralized authentication backend for VPN gateways. In a typical setup, users submit credentials to the VPN service, which forwards them to the LDAP server for validation. The VPN gateway then grants or denies access based on the response it receives. CVE-2026-22153 does not rely on malformed packets or memory corruption. Instead, it stems from flawed authentication logic, where certain LDAP response states can be misinterpreted under specific configurations.

What is Credential Stuffing? A Complete Prevention Guide for Enterprises

Credential stuffing attacks have become one of the most common, yet underestimated, cybersecurity threats facing businesses today. Even with strong firewalls and the latest endpoint protection, organizations still lose millions every year to stolen login credentials reused across accounts. What’s worse, these attacks often stay undetected until real damage occurs, which includes data breaches, customer account takeovers, and regulatory penalties.

6 Steps for Effective Data Exfiltration Incident Response

Data exfiltration incidents are some of the hardest cases to handle in DFIR. There’s no malware signature, no ransom demand, and usually, no clear intrusion point. You just get a vague alert (or worse, a tip from legal), and suddenly, you’re under pressure to figure out what data was taken, how it happened, and whether any evidence still exists. Miss one key detail, and you risk losing the trail. Or in some cases, corrupting evidence that legal teams or regulators will need later.

Lookout Expands Protection Following Google's Disruption of the IPIDEA Proxy Network

Last week, Google’s Threat Intelligence Group announced the disruption of IPIDEA, one of the largest and most abused residential proxy networks observed in the wild. IPIDEA quietly turned millions of consumer devices into proxy exit nodes, enabling cybercrime, espionage, and botnet activity—while putting users and enterprises at risk. At Lookout, we acted immediately.

Cyber Resilience: The New Standard for Trust in UK Law Firms

In the legal profession, trust has always been the foundation of the client-firm relationship. Today, that trust is no longer granted by default; it must be continuously earned and, more importantly, proven. For law firms across the UK, cyber resilience has evolved from a back-office IT issue into a critical component of client due diligence. Clients do not just expect you to protect their data—they require you to demonstrate your capability to do so under any circumstance.

What You Need to Know about the Substack Data Breach

Substack is a popular subscription-based digital publishing platform that allows writers, journalists, podcasters, and content creators to send newsletters directly to their subscribers while monetizing their work. Founded in 2017, the San Francisco-based company has grown significantly, becoming a major alternative to traditional media and offering independent creators a way to build direct relationships with their audiences.

What You Need to Know about the SoundCloud Data Breach

SoundCloud is one of the world's largest audio streaming and music distribution platforms, founded in Berlin, Germany in 2007 and headquartered in New York City. The platform has grown into an artist-first service hosting more than 400 million tracks from over 40 million creators worldwide. With approximately 175 million registered users globally, SoundCloud serves as a critical platform for independent musicians, podcasters, and audio creators to share their work directly with audiences.