Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Search Blog

AI-powered threats in 2026
Trends

What You Must Know about AI-Powered Threats in 2026

Reading Time: 5 minsCybercriminals are using AI today to accelerate attacks through deepfakes, smishing, exploit generation, and autonomous breach activity. This blog explores how AI is reshaping offensive cyber operations and what defenders must prioritize.

EDITOR'S PICKS

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

DEFCON 32
Events

Our 3 Biggest Takeaways From DEFCON 32

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in Las Vegas, Nevada – and he highlights his big takeaways.

snowflake supply chain attack feature
Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures to protect your organization from similar threats

vpn vulnerability feature
Attacks

Check Point VPN Vulnerability Advisory

Reading Time: 2 minsThis VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access networks. Stay informed and secure your network promptly.

rsac 2024 recap feature
Events

Reflections from RSAC 2024

Reading Time: 4 minsMissed RSA Conference 2024? Explore Lumu CEO and RSAC veteran Ricardo Villadiego’s perspective on the key takeaways from RSAC 2024

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.