Mario Lobo

  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are…

1 month ago
  • Events

Our 3 Biggest Takeaways From DEFCON 32

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in…

4 months ago
  • Technical

Advisory Alert: CrowdStrike Outage – What We Know

Reading Time: 3 minsLearn about the recent CrowdStrike outage affecting Microsoft devices, its impact, recovery steps, and how Lumu can…

5 months ago
  • Attacks

Check Point VPN Vulnerability Advisory

Reading Time: 2 minsThis VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access…

6 months ago
  • Attacks

Local Government and Education Cybersecurity Advisory

Reading Time: 6 minsLocal Government and Education Institutions are under increasing threat from cyber criminals. Explore how these critical sectors…

6 months ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 minsThe Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in traditional perimeter defenses. Understand how Lumu's…

8 months ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 minsEfficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and user-friendly tool.

9 months ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 minsLockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.

10 months ago
  • Attacks

Infostealers: The Silent Threat Compromising the World One Password at a Time

Reading Time: 7 minsExplore how infostealers compromise global security, silently stealing data and offering adversaries Initial Access to networks.

10 months ago
  • Attacks

The Resurgence of Qakbot: Advisory Alert

Reading Time: 3 minsQakbot resurges with new updates, posing a greater cyber threat. Discover how it's evading defenses in our…

12 months ago
  • Technical

Cisco IOS XE Web UI Vulnerability: Critical Advisory & Immediate Mitigation Steps

Reading Time: 3 minsAlert: Severe Cisco IOS XE Web UI vulnerability risks full system control. Immediate action needed for users…

1 year ago
  • Technical

Dissecting COPODE 1.0: New APT Evolves Lockbit Strategies

Reading Time: 5 minsLumu's threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named 'Copode 1.0', leveraging…

1 year ago
  • Attacks

MOVEit Vulnerability: Active Exploitation by CL0P Ransomware

Reading Time: 3 minsThe recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches…

1 year ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

2 years ago