Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Search Blog

Rsac recap
Trends

RSAC 2026 Recap: The Dawn of the Agentic Era

Reading Time: 3 minsAs RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on the industry’s shift toward the Agentic Revolution and the move from chatbot interactions to autonomous security that operates at machine speed.

EDITOR'S PICKS

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

MOVEit vulnerability feature
Attacks

MOVEit Vulnerability: Active Exploitation by CL0P Ransomware

Reading Time: 3 minsThe recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches in large and critical enterprises. Gain insight into the nature of this vulnerability, its exploitation by the CL0P Ransomware Group, who is at risk, and the necessary remedial measures to be taken.

MSSP cybersecurity stacks need to become more focused to deliver continued value to customers
Trends

MSSP Security Must Adapt to Serve Customers

Reading Time: 8 minsManaged Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust technological defenses. MSSPs must understand that they are not infallible and that challenges in their growth and operational model can lead to potential gaps in security coverage.

RSA Conference 2023 Recap
Events

RSA Conference 2023 Observations: Embracing the Paradigm Shift

Reading Time: 4 minsRSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that a paradigm shift is needed in cybersecurity, it is clear that we would be stronger still if there were consensus around what that paradigm shift needs to look like.

EDR evasion feature image
Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers evade Endpoint Detection and Response (EDR) systems using various techniques. Learn about the common tactics used by cyber attackers to bypass endpoint defenses and how to better protect against these stealthy attacks.

3CX Desktop App Attack Advisory Alert Feature
Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the 3CX Desktop App currently being exploited by threat actors. Learn how it could impact your company and how to respond in case adversaries leveraged this vulnerability to enter your organization.

The Manufacturing industry is targeted by ransomware more than any other. Take a look at the motivations and opportunities driving threat actor activity in this critical vertical.
Attacks

Manufacturing Industry Targeted by Ransomware

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a look at the motivations and opportunities driving threat actor activity in this critical vertical.

ransomware incident response playbook cover
Attacks

Lumu’s Ransomware Incident Response Playbook

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to prevent ransomware rather than what to do when ransomware hits. Our latest ransomware incident response playbook details comprehensive defense and response strategies against ransomware.

2022 Lumu Product Recap
Product

Lumu 2022 Product Recap

Reading Time: 3 minsThe 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over the last year.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.