Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Category: Attacks

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

3CX Desktop App Attack Advisory Alert Feature
Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the 3CX Desktop App currently being exploited by threat actors. Learn how it could impact your company and how to respond in case adversaries leveraged this vulnerability to enter your organization.

The Manufacturing industry is targeted by ransomware more than any other. Take a look at the motivations and opportunities driving threat actor activity in this critical vertical.
Attacks

Manufacturing Industry Targeted by Ransomware

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a look at the motivations and opportunities driving threat actor activity in this critical vertical.

ransomware incident response playbook cover
Attacks

Lumu’s Ransomware Incident Response Playbook

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to prevent ransomware rather than what to do when ransomware hits. Our latest ransomware incident response playbook details comprehensive defense and response strategies against ransomware.

Conti ransomware group alliances
Attacks

Conti Ransomware Group: the Alliances Behind the Chaos

Reading Time: 4 minsThe Conti Ransomware Group has recently unleashed a series of attacks on nations including Costa Rica, resulting in the declaration of a state of emergency. The key to their success is the network of alliances that they have built with precursor malware operators.

ransomware flashcard 2022
Attacks

Ransomware Flashcard 2022: The Vicious Cycle

Reading Time: 3 minsTrends from 2021 indicate that 2022 will see an increased threat of ransomware on a global level. Here are some insights and background information to accompany the facts and figures provided by our Ransomware Flashcard 2022.

The Log4j vulnerability (also known as CVE-2021-44228) affects 1000's of software applications.
Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.

Attacks

Lessons from (Another) Florida Ransomware Attack

Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware attacks are evolving. Here’s what you can do to protect your organization.

SolarWinds
Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious breaches in recent U.S. history.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.