
How to Turn MISP from a Compliance Burden into Active Defense
Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Already have an account? Sign in
Sign in

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Reading Time: 4 minsThe Education sector is the number one global cyber target. It is clearer than ever that manual defense is failing. We look at how to automate detection and response and win the battle.
Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention
Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global threat. We look at how it works and the best way to defend against it.
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 5 minsLumma Stealer cyber threat resurfaces despite recent takedown. Discover the malware’s resurgence and learn how to protect your systems.

Reading Time: 7 minsDefense against zero day attacks requires constant vigilance and meticulous preparation, and Lumu should be an essential component of your strategy.

Reading Time: 4 minsAs global cybersecurity event, RSAC 2025, wraps for another year, Ricardo Villadiego, CEO of Lumu Technologies, reflects on the pulse of the cybersecurity industry.

Reading Time: 4 minsIntroducing the Lumu SecOps Platform, a fully integrated platform that brings together detection, response, automation, compliance, and threat intelligence. One platform, one experience, full context.

Reading Time: 5 minsA surge in malicious activity is targeting ConnectWise ScreenConnect. Attackers are attackers are misusing clients and exploiting vulnerabilities, posing a significant threat to organizations.

Reading Time: 5 minsCybercrime in the education sector is having a field day while educational institutions are suffering at the hands of cybercriminals. We look at some of the stats and reasons behind this worrying trend.

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need for organizations to adopt a Zero Trust architecture and continuous network monitoring.

Reading Time: 4 minsAchieve comprehensive cloud visibility across your hybrid and multi-cloud environments to proactively detect and respond to network threats.

Reading Time: 5 minsLumu has released Lumu Discover, giving real-time, actionable intelligence on your external attack surface.

Reading Time: 5 minsFollowing the release of data from over 15,000 Fortinet devices, what can we do to protect against further compromise?

Reading Time: 4 minsAnonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities, complicating the detection and mitigation of attacks.

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the stage for a more proactive cybersecurity approach.

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a multinational insurance provider — discover the importance of DNS tunneling detection, what we found when we investigated the attack, and how we contained it.