• Technical

Dissecting COPODE 1.0: New APT Evolves Lockbit Strategies

1 year ago

Reading Time: 5 minsLumu's threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named 'Copode 1.0', leveraging…

  • Trends

Key Insights From The Forrester Wave™: Network Analysis and Visibility Q2 2023

1 year ago

Reading Time: 3 minsLumu has been named a leader in Forrester Research’s latest report, The Forrester Wave™: Network Analysis and…

  • Attacks

MOVEit Vulnerability: Active Exploitation by CL0P Ransomware

2 years ago

Reading Time: 3 minsThe recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches…

  • Trends

MSSP Security Must Adapt to Serve Customers

2 years ago

Reading Time: 8 minsManaged Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust technological…

  • Attacks
  • Blog
  • Stories

Comparing SecOps Models in the Face of a Ransomware Attack

2 years ago

This story is based on true events and dives into what happens when initial contact is made with some of…

  • Technical
  • Trends

RSA Conference 2023 Observations: Embracing the Paradigm Shift

2 years ago

Reading Time: 4 minsRSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that…

  • Technical
  • Trends

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

2 years ago

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

2 years ago

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

2 years ago

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…

  • Attacks
  • Trends

Clop Ransomware Blitz: Understanding and Mitigating This Pervasive Threat

2 years ago

Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…

  • Attacks

Manufacturing Industry Targeted by Ransomware

2 years ago

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…

  • Attacks

Lumu’s Ransomware Incident Response Playbook

2 years ago

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…

  • Trends

CISO Priorities 2023: Automation Over Cost-Cutting

2 years ago

Reading Time: 2 minsWe surveyed 213 U.S. cybersecurity executives on their priorities for the new year. Here’s what their responses…

  • Technical

The Power of a Threat-Informed Defense Strategy

2 years ago

Reading Time: 6 minsThreat-informed defense is a strategic approach to risk-based cybersecurity that even smaller organizations can get up and…

  • Technical

How Cybersecurity Analysts Can Do More With Less

2 years ago

Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.