Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Category: Attacks

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Akira ransomware
Attacks

Akira Ransomware and the IoT Security Gap

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need for organizations to adopt a Zero Trust architecture and continuous network monitoring.

PowerSchool Data Breach
Attacks

Advisory Alert: PowerSchool Data Breach

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?

snowflake supply chain attack feature
Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures to protect your organization from similar threats

vpn vulnerability feature
Attacks

Check Point VPN Vulnerability Advisory

Reading Time: 2 minsThis VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access networks. Stay informed and secure your network promptly.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.