Log4j: What You Need to Know
Reading Time: 2 mins The Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.
Already have an account? Sign in
Sign in
Get the latest cybersecurity articles and insights straight from the experts.
Reading Time: 2 mins The Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.
Reading Time: 5 mins Ransomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and their weakest links.
Reading Time: 2 mins The monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here’s why that’s serious.
Reading Time: 4 mins The Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for security operators at SMEs.
Reading Time: 4 mins The $40 million attack on the Broward County public school district is an example of how ransomware attacks are evolving. Here’s what you can do to protect your organization.
Reading Time: 3 mins Supply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here’s how you can stop them.
Reading Time: 2 mins On December 13th, information was released about the SolarWinds hack, one of the most extensive and serious breaches in recent U.S. history.
Reading Time: 4 mins Over 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes leading to ransomware regret. Do you recognize any?
Reading Time: 4 mins Malware Delivery as a Service is a specialized service designed to meet ransomware’s demand for access to compromised networks.
Reading Time: 5 mins Financial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.
Reading Time: 3 mins In one of the largest data breaches ever, Capital One admitted recently that more than 100 million customer records were compromised.
Reading Time: 3 mins A recent report from NUIX stated that an attacker only needs 15 hours on average to breach a system and identify critical data.
© Lumu Technologies All rights reserved. | Legal information.