• Blog

Detecting Cyberattacks Hidden via Anonymization

5 days ago
Mario Lobo

Reading Time: 4 minsDetecting and stopping attacks using anonymization techniques can give your team the upper hand against cyber criminals…

  • Blog

Advisory Alert: PowerSchool Data Breach

7 days ago

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us…

  • Blog

Lumu & the MSP Community: 2024 in Review

1 month ago

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the…

  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

1 month ago

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the…

  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

1 month ago

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a multinational insurance provider — discover…

  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

2 months ago

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect, where MSP leaders shared actionable…

  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

2 months ago

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine cybersecurity, pushing organizations to adapt…

  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

3 months ago

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are…

  • Trends

Does Infostealer Malware Have US Organizations Under Siege?

3 months ago

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations,…

  • Trends

Lumu Compromise Report 2024: 2 Essential Tips for MSPs to Protect Clients

3 months ago

Reading Time: 4 minsFor MSPs to proactively protect their clients they need good intelligence, such as the trends and tendencies…

  • Technical

The Hidden Pitfalls of Deep Packet Inspection

3 months ago

Reading Time: 6 minsExplore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and…

  • Trends

3 Cybersecurity Trends From the Lumu Compromise Report 2024

4 months ago

Reading Time: 3 minsLumu’s new Compromise Report 2024 reveals the greatest current cybersecurity trends and how to defend against them.…

  • Technical

Lumu’s Journey to Log Retention: Reducing Costs and Enabling Compliance

4 months ago

Reading Time: 6 minsDiscover how Lumu's Playback feature improves visibility and efficiency while addressing the limitations of traditional SIEMs in…

  • Technical

Advisory: CISA Releases Advisory on RansomHub Ransomware Attacks

5 months ago

Reading Time: 4 minsRansomHub is a new ransomware group offering Ransomware as a Service that has already encrypted and exfiltrated…

  • Events

Our 3 Biggest Takeaways From DEFCON 32

5 months ago

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in…