• Attacks

Advisory Alert: How DeathRansom Walks Straight Into Your Network

5 months ago

Reading Time: 5 minsDeathRansom ransomware has evolved, hiding in malicious PDFs to bypass defenses. It does not break down the…

  • Product

Lumu 2025 Product Recap

5 months ago

Reading Time: 5 minsThis year's Lumu 2025 Product Recap highlights our commitment to simplifying SecOps and leading cybersecurity transformation. Key…

  • Attacks

4 Ways Threat Actors Weaponize Domain Reputation to Bypass Your Defenses

6 months ago

Reading Time: 5 minsYour security stack is built on trusting domain reputation scores. But attackers now weaponize malicious domain detection…

  • Trends

Cybersecurity Predictions 2026: The Post-Malware & AI Era

6 months ago

Reading Time: 4 minsHow autonomous attacks, AI supply chain compromise, and geopolitical cybercrime will render traditional SOCs and endpoint security…

  • Stories

Cybersecurity Trends 2026: Facing the Post-Malware, AI-Orchestrated Threat Landscape

6 months ago

Reading Time: 3 minsHow autonomous attacks, AI supply chain compromise, and geopolitical cybercrime will render traditional SOCs and endpoint security…

  • Attacks

Advisory Alert APT-C-36: Blind Eagle’s Global Supply Chain Risk

6 months ago

Reading Time: 6 minsOur analysis of APT-C-36, Blind Eagle, breaks down how a regional phishing attack becomes a global supply…

  • Technical

Is Your BYOD Policy a Gateway for Attackers? Here’s How to Secure It

7 months ago

Reading Time: 5 minsEmbracing remote work creates BYOD security challenges. Learn to secure the personal laptops and phones connecting to…

  • Technical

3 Ways Generative AI Can Improve Your Cybersecurity Workflow

7 months ago

Reading Time: 4 minsBy integrating generative AI with Lumu Defender’s carefully curated threat data, you can create a powerful virtual…

  • Technical

Beyond the Alert: Shifting Your MSSP From Reactive Response To True Resilience

7 months ago

Reading Time: 4 minsThe MSSP model of fast alert response is no longer enough. Success now requires shifting from simple…

  • Attacks

Advisory Alert: Gunra Ransomware’s 5-Day Ultimatum

8 months ago

Reading Time: 7 minsGunra ransomware targets critical industries using a strict five-day payment deadline. Learn about Gunra and ransomware detection…

  • Product

How To Implement Zero Trust with Lumu

9 months ago

Reading Time: 5 minsLearning how to implement Zero Trust is more than just buying tools, you have to ensure they…

  • Attacks

Advisory Alert: Sarcoma Ransomware Double Extortion Threat

9 months ago

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You…

  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

9 months ago

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

  • Technical

How to Master the Threat Intelligence Lifecycle With Lumu

9 months ago

Reading Time: 4 minsTo defend against threats, organizations must use a structured cyber threat intelligence lifecycle. This turns knowledge about…

  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

10 months ago

Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…