What is Data Tracing? How It Works, and Why You Should Care

Security logs tell you who accessed a system, but they won’t tell you where a CSV file went after someone exported it. Files move between apps, users, and third-party vendors without anyone truly tracking where they go, who touches them, or how they’re used. And that’s a massive problem when a breach happens, when auditors come knocking, or when you’re trying to tighten internal controls.

What is Credential Stuffing? A Complete Prevention Guide for Enterprises

Credential stuffing attacks have become one of the most common, yet underestimated, cybersecurity threats facing businesses today. Even with strong firewalls and the latest endpoint protection, organizations still lose millions every year to stolen login credentials reused across accounts. What’s worse, these attacks often stay undetected until real damage occurs, which includes data breaches, customer account takeovers, and regulatory penalties.

Securing the Human Layer: The Evolution of Cyber Attacks | Podcast

In this one-off exclusive podcast, Oliver Simonnet, CultureAI's Lead Cyber Security Researcher, sits down with William Jardine, Director at Reversec, and Richard Moore, CISO at 10x Banking, to explore the evolving realities of cyber resilience, AI adoption, and security leadership in a world where AI-driven workflows are becoming the norm.

Exposed OpenClaw Deployments are Turning Agentic AI Into an Attack Surface: What To Do Next

SecurityScorecard's STRIKE Threat Intelligence team has uncovered tens of thousands of exposed OpenClaw instances, many of which are vulnerable to Remote Code Execution (RCE). These exposed OpenClaw instances leave users and organizations open to attacks. OpenClaw and other agentic AI tools are designed to take actions on a user’s behalf, interact with infrastructure, and move across connected services. That functionality is the appeal. It is also the risk for users around the globe.

Preemptive Defense Is No Longer Optional: Why Frost & Sullivan Is Calling for Earlier Fraud Intervention

Preemptive cybersecurity defense refers to the ability to detect and disrupt fraud and account takeover attempts before credentials are misused and damage occurs. According to a 2026 analyst brief from Frost & Sullivan, most enterprise fraud and cybersecurity controls still activate too late in the attack lifecycle to prevent loss.

Lookout Expands Protection Following Google's Disruption of the IPIDEA Proxy Network

Last week, Google’s Threat Intelligence Group announced the disruption of IPIDEA, one of the largest and most abused residential proxy networks observed in the wild. IPIDEA quietly turned millions of consumer devices into proxy exit nodes, enabling cybercrime, espionage, and botnet activity—while putting users and enterprises at risk. At Lookout, we acted immediately.

Training Humans and AI Agents

Managing the risks associated with the increasing use of AI agents and co-pilots is critical for every organization. A key challenge is that AI agents draft documents and influence decisions but they operate without a true understanding of a company's rules, culture, or risk. Like humans, AI agents are susceptible to failure. Humans are socially engineered, while AI agents are prompt engineered, and AI agents may "hallucinate" when context is missing, similar to how humans guess.