Technical

  • Technical

The Evolution of Lumu for MSPs in 2023

Reading Time: 4 mins Discover Lumu's 2023 MSP breakthroughs: Improved threat detection, incident management, and more.

4 months ago
  • Technical

A Look Back At Our Product in 2023

Reading Time: 4 mins 2023 at Lumu: Pioneering advancements in AI-driven cybersecurity solutions and partnerships, enhancing incident management and operational…

4 months ago
  • Technical

Visibility and Context: Securing State and Local Environments Against Ransomware

Reading Time: 2 mins Dr. Chase Cunningham discusses the critical need for state and local governments to secure against ransomware,…

5 months ago
  • Technical

Lumu for MSPs Lite: Streamlined Cybersecurity Solution for MSPs

Reading Time: 3 mins Introducing Lumu for MSPs Lite, a free, AI-driven cybersecurity solution for Managed Service Providers, democratizing advanced…

6 months ago
  • Technical

Cisco IOS XE Web UI Vulnerability: Critical Advisory & Immediate Mitigation Steps

Reading Time: 3 mins Alert: Severe Cisco IOS XE Web UI vulnerability risks full system control. Immediate action needed for…

6 months ago
  • Technical

Online Learning vs Transfer Learning for Cybersecurity: Unpacking Lumu’s Use of AI

Reading Time: 5 mins Explore Online vs Transfer Learning in Cybersecurity: Unpacking Lumu's adaptive AI use for proactive threat defense…

7 months ago
  • Technical

Dissecting COPODE 1.0: New APT Evolves Lockbit Strategies

Reading Time: 5 mins Lumu's threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named 'Copode 1.0',…

10 months ago
  • Technical

RSA Conference 2023 Observations: Embracing the Paradigm Shift

Reading Time: 4 mins RSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus…

12 months ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 mins Explore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers…

1 year ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 mins EDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how…

1 year ago