Search Blog

lumu forgepoint series b funding
Culture

Lumu’s Next Chapter: A Deep Dive into Our $30M Series B Funding

Reading Time: 3 mins Lumu Technologies is thrilled to announce a $30M Series B funding round led by Forgepoint Capital. This capital injection enables us to expand our reach and innovation in cybersecurity operations. Learn how this funding impacts our mission to empower organizations with real-time threat detection and response capabilities

EDITOR'S PICKS

How Lumu Enables Threat Hunting

Reading Time: 4 mins Threat hunting in cybersecurity can be a challenging practice. Learn how Lumu helps you build your way up the pyramid of pain and make your cybersecurity posture more difficult for threat actors to target.

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

lumu forgepoint series b funding
Culture

Lumu’s Next Chapter: A Deep Dive into Our $30M Series B Funding

Reading Time: 3 mins Lumu Technologies is thrilled to announce a $30M Series B funding round led by Forgepoint Capital. This capital injection enables us to expand our reach and innovation in cybersecurity operations. Learn how this funding impacts our mission to empower organizations with real-time threat detection and response capabilities

cybersecurity integrations questionnaire
Trends

Cybersecurity Integrations: A Buyer’s Guide

Reading Time: 3 mins Choosing the right cybersecurity solution is pivotal in today’s threat landscape. Our buyer’s guide zeroes in on cybersecurity integrations, offering key questions to ask vendors about API availability, out-of-the-box solutions, and technical support.

Threat hunting blog feature image
Trends

How Lumu Enables Threat Hunting

Reading Time: 4 mins Threat hunting in cybersecurity can be a challenging practice. Learn how Lumu helps you build your way up the pyramid of pain and make your cybersecurity posture more difficult for threat actors to target.

There is no zero trust without visibility
Trends

There Is No Zero Trust Without Visibility

Reading Time: 3 mins ‘Dr. Zero Trust’ Chase Cunningham looks at Zero Trust, network visibility’s importance, and the Forrester Wave™: Network Analysis and Visibility Q2 2023

Copode 1.0 feature image
Technical

Dissecting COPODE 1.0: New APT Evolves Lockbit Strategies

Reading Time: 5 mins Lumu’s threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named ‘Copode 1.0’, leveraging the LockBit Black code leaks for cyberattacks. This emerging threat underlines the need for stringent security practices and Lumu’s real-time monitoring offers an efficient response to such evolving challenges.

MOVEit vulnerability feature
Attacks

MOVEit Vulnerability: Active Exploitation by CL0P Ransomware

Reading Time: 3 mins The recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches in large and critical enterprises. Gain insight into the nature of this vulnerability, its exploitation by the CL0P Ransomware Group, who is at risk, and the necessary remedial measures to be taken.

MSSP cybersecurity stacks need to become more focused to deliver continued value to customers
Trends

MSSP Security Must Adapt to Serve Customers

Reading Time: 8 mins Managed Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust technological defenses. MSSPs must understand that they are not infallible and that challenges in their growth and operational model can lead to potential gaps in security coverage.

RSA Conference 2023 Recap
Technical

RSA Conference 2023 Observations: Embracing the Paradigm Shift

Reading Time: 4 mins RSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that a paradigm shift is needed in cybersecurity, it is clear that we would be stronger still if there were consensus around what that paradigm shift needs to look like.

EDR evasion feature image
Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 mins EDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers evade Endpoint Detection and Response (EDR) systems using various techniques. Learn about the common tactics used by cyber attackers to bypass endpoint defenses and how to better protect against these stealthy attacks.

3CX Desktop App Attack Advisory Alert Feature
Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 mins Our Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the 3CX Desktop App currently being exploited by threat actors. Learn how it could impact your company and how to respond in case adversaries leveraged this vulnerability to enter your organization.