• Trends

Lumu Hits Bullseye in GigaOm Radar for Network Detection and Response

3 years ago

Reading Time: 4 minsThe GigaOm Radar Report for Network Detection and Response (NDR) has just been released and we are…

  • Trends

How Lumu Enables Threat Hunting

3 years ago

Reading Time: 4 minsThreat hunting in cybersecurity can be a challenging practice. Learn how Lumu helps you build your way…

  • Trends

There Is No Zero Trust Without Visibility

3 years ago

Reading Time: 3 mins‘Dr. Zero Trust' Chase Cunningham looks at Zero Trust, network visibility’s importance, and the Forrester Wave™: Network…

  • Technical

Dissecting COPODE 1.0: New APT Evolves Lockbit Strategies

3 years ago

Reading Time: 5 minsLumu's threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named 'Copode 1.0', leveraging…

  • Attacks

MOVEit Vulnerability: Active Exploitation by CL0P Ransomware

3 years ago

Reading Time: 3 minsThe recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches…

  • Trends

MSSP Security Must Adapt to Serve Customers

3 years ago

Reading Time: 8 minsManaged Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust technological…

  • Attacks

Comparing SecOps Models in the Face of a Ransomware Attack

3 years ago

This story is based on true events and dives into what happens when initial contact is made with some of…

  • Events

RSA Conference 2023 Observations: Embracing the Paradigm Shift

3 years ago

Reading Time: 4 minsRSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that…

  • Technical
  • Trends

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

3 years ago

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

3 years ago

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

3 years ago

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…

  • Attacks

Clop Ransomware Blitz: Understanding and Mitigating This Pervasive Threat

3 years ago

Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…

  • Attacks

Manufacturing Industry Targeted by Ransomware

3 years ago

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…

  • Attacks

Lumu’s Ransomware Incident Response Playbook

3 years ago

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…

  • Trends

CISO Priorities 2023: Automation Over Cost-Cutting

3 years ago

Reading Time: 2 minsWe surveyed 213 U.S. cybersecurity executives on their priorities for the new year. Here’s what their responses…