Mario Lobo

Mario Lobo Romero is a Cybersecurity Specialist and Threat Analyst with over 18 years in InfoSec and Cyber Intelligence. As a Cyber Threat Intelligence Researcher at Lumu Technologies, his focus is on the independent collection, analysis, and curation of threat intelligence. His experience includes senior intelligence roles at critical sectors like National Defense and Finance. He is highly skilled in Penetration Tests, Malware Analysis, and implementing cybersecurity frameworks. Mario holds an Msc. in Cybersecurity and certifications including GIAC-GSEC and ISO 27000.
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics and defense evasion, identified through…

2 months ago
  • Trends

10 Cybersecurity Prompts to Ask Your Favorite LLM

Reading Time: 4 mins For cybersecurity operators, Large Language Models (LLMs) provide many potential uses. To help you maximize their…

2 months ago
  • Attacks

4 Ways Threat Actors Weaponize Domain Reputation to Bypass Your Defenses

Reading Time: 5 minsYour security stack is built on trusting domain reputation scores. But attackers now weaponize malicious domain detection…

4 months ago
  • Attacks

Advisory Alert: Sarcoma Ransomware Double Extortion Threat

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You…

7 months ago
  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

7 months ago
  • Technical

How to Master the Threat Intelligence Lifecycle With Lumu

Reading Time: 4 minsTo defend against threats, organizations must use a structured cyber threat intelligence lifecycle. This turns knowledge about…

7 months ago
  • Attacks

Advisory Alert: C&M Software Supply Chain Attack Affects Brazilian Banks

Reading Time: 4 minsA supply chain cyberattack on C&M Software has impacted Brazilian financial institutions. Learn about the incident, its…

9 months ago
  • Attacks

Advisory Alert: Stolen FortiGate Data Leak — How To Take Action

Reading Time: 5 minsFollowing the release of data from over 15,000 Fortinet devices, what can we do to protect against…

1 year ago
  • Technical

Anonymization: How Cybercriminals Hide Attacks and Identities

Reading Time: 4 minsAnonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities,…

1 year ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a multinational insurance provider — discover…

1 year ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are…

1 year ago
  • Events

Our 3 Biggest Takeaways From DEFCON 32

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in…

2 years ago
  • Attacks

Advisory Alert: CrowdStrike Outage – What We Know

Reading Time: 3 minsLearn about the recent CrowdStrike outage affecting Microsoft devices, its impact, recovery steps, and how Lumu can…

2 years ago
  • Attacks

Check Point VPN Vulnerability Advisory

Reading Time: 2 minsThis VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access…

2 years ago
  • Attacks

Local Government and Education Cybersecurity Advisory

Reading Time: 6 minsLocal Government and Education Institutions are under increasing threat from cyber criminals. Explore how these critical sectors…

2 years ago