• Technical

Is Your BYOD Policy a Gateway for Attackers? Here’s How to Secure It

5 months ago

Reading Time: 5 minsEmbracing remote work creates BYOD security challenges. Learn to secure the personal laptops and phones connecting to…

  • Technical

3 Ways Generative AI Can Improve Your Cybersecurity Workflow

5 months ago

Reading Time: 4 minsBy integrating generative AI with Lumu Defender’s carefully curated threat data, you can create a powerful virtual…

  • Technical

Beyond the Alert: Shifting Your MSSP From Reactive Response To True Resilience

5 months ago

Reading Time: 4 minsThe MSSP model of fast alert response is no longer enough. Success now requires shifting from simple…

  • Attacks

Advisory Alert: Gunra Ransomware’s 5-Day Ultimatum

7 months ago

Reading Time: 7 minsGunra ransomware targets critical industries using a strict five-day payment deadline. Learn about Gunra and ransomware detection…

  • Product

How To Implement Zero Trust with Lumu

7 months ago

Reading Time: 5 minsLearning how to implement Zero Trust is more than just buying tools, you have to ensure they…

  • Attacks

Advisory Alert: Sarcoma Ransomware Double Extortion Threat

7 months ago

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You…

  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

8 months ago

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

  • Technical

How to Master the Threat Intelligence Lifecycle With Lumu

8 months ago

Reading Time: 4 minsTo defend against threats, organizations must use a structured cyber threat intelligence lifecycle. This turns knowledge about…

  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

8 months ago

Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…

  • Attacks

Advisory Alert: BumbleBee Malware in the Spotlight

8 months ago

Reading Time: 6 minsBumbleBee malware facilitates severe attacks like ransomware or data theft. Threat intelligence shows increasing deployment across key…

  • Attacks

Cybersecurity for Schools: Your Back-to-School Plan

8 months ago

Reading Time: 5 minsAs a new school year begins, cybersecurity for K-12 is more critical than ever. Let’s explore top…

  • Attacks

Advisory Alert: C&M Software Supply Chain Attack Affects Brazilian Banks

9 months ago

Reading Time: 4 minsA supply chain cyberattack on C&M Software has impacted Brazilian financial institutions. Learn about the incident, its…

  • Trends

New Executive Order Demands Network Visibility

9 months ago

Reading Time: 5 minsIn response to global cyber threats, a new White House executive order prioritizes network visibility to strengthen…

  • Trends

Cybersecurity for Schools: The Guide to Summer Break

9 months ago

Reading Time: 6 minsSummer break is a high-risk period in cybersecurity for schools. Discover practical cybersecurity solutions for how to…

  • Attacks

Advisory Alert: ClickFix Campaign Uses Fake CAPTCHA Pages to Spread Malware

9 months ago

Reading Time: 8 minsA current ClickFix campaign has compromised over 260,000 websites, turning trusted platforms into malware delivery systems that…