Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Search Blog

AI-powered threats in 2026
Trends

What You Must Know about AI-Powered Threats in 2026

Reading Time: 5 minsCybercriminals are using AI today to accelerate attacks through deepfakes, smishing, exploit generation, and autonomous breach activity. This blog explores how AI is reshaping offensive cyber operations and what defenders must prioritize.

EDITOR'S PICKS

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Security operator using the Lumu Portal Remotely
Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your SOC more efficient in 3 easy steps.

Trends

From Zero Trust to Zero Compromises

Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.

Technical

Ransomware Attacks and How Lumu Helps

Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE, and how Lumu detects them.

Trends

2020 Compromise Flashcard

Reading Time: 3 minsWe’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.

Events

Illumination Summit Recap

Reading Time: 4 minsLumu’s Illumination Summit has come and gone, but you can still relive every talk and discussion in our highlight video or blog.

Attacks

Malware Delivery as a Service

Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware’s demand for access to compromised networks.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.