Reading Time: 5 minsLumu's threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named 'Copode 1.0', leveraging…
Reading Time: 3 minsLumu has been named a leader in Forrester Research’s latest report, The Forrester Wave™: Network Analysis and…
Reading Time: 3 minsThe recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches…
Reading Time: 8 minsManaged Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust technological…
This story is based on true events and dives into what happens when initial contact is made with some of…
Reading Time: 4 minsRSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that…
Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…
Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…
Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…
Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…
Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…
Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…
Reading Time: 2 minsWe surveyed 213 U.S. cybersecurity executives on their priorities for the new year. Here’s what their responses…
Reading Time: 6 minsThreat-informed defense is a strategic approach to risk-based cybersecurity that even smaller organizations can get up and…
Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.