Technical

  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics and defense evasion, identified through…

2 months ago
  • Technical

Is Your BYOD Policy a Gateway for Attackers? Here’s How to Secure It

Reading Time: 5 minsEmbracing remote work creates BYOD security challenges. Learn to secure the personal laptops and phones connecting to…

5 months ago
  • Technical

3 Ways Generative AI Can Improve Your Cybersecurity Workflow

Reading Time: 4 minsBy integrating generative AI with Lumu Defender’s carefully curated threat data, you can create a powerful virtual…

5 months ago
  • Technical

Beyond the Alert: Shifting Your MSSP From Reactive Response To True Resilience

Reading Time: 4 minsThe MSSP model of fast alert response is no longer enough. Success now requires shifting from simple…

5 months ago
  • Technical

How to Master the Threat Intelligence Lifecycle With Lumu

Reading Time: 4 minsTo defend against threats, organizations must use a structured cyber threat intelligence lifecycle. This turns knowledge about…

7 months ago
  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…

8 months ago
  • Technical

Defense Against Zero Day Attacks With Lumu

Reading Time: 7 minsDefense against zero day attacks requires constant vigilance and meticulous preparation, and Lumu should be an essential…

10 months ago
  • Technical

Cloud Network Threat Visibility and Response

Reading Time: 4 minsAchieve comprehensive cloud visibility across your hybrid and multi-cloud environments to proactively detect and respond to network…

1 year ago
  • Technical

Anonymization: How Cybercriminals Hide Attacks and Identities

Reading Time: 4 minsAnonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities,…

1 year ago
  • Technical

The Hidden Pitfalls of Deep Packet Inspection

Reading Time: 6 minsExplore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and…

1 year ago