
Why EDR Evasion is the New Threat Standard
Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are exploiting the ‘tuning gap’ in managed security. We look at how to regain the upper hand.
Already have an account? Sign in
Sign in
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are exploiting the ‘tuning gap’ in managed security. We look at how to regain the upper hand.

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is clearer than ever that manual defense is failing. We look at how to automate detection and response and win the battle.

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention

Reading Time: 6 minsWe have entered a new ‘Age of Adaptation’. The enemy is becoming more difficult to stop at the gate. We need to shift from reliance on perimeter defenses to continuous, real-time assessment.

Reading Time: 4 mins For cybersecurity operators, Large Language Models (LLMs) provide many potential uses. To help you maximize their value, here are 10 suggested cybersecurity prompts for anyone in the space to pose to their favorite AI chatbot.

Reading Time: 4 minsHow autonomous attacks, AI supply chain compromise, and geopolitical cybercrime will render traditional SOCs and endpoint security obsolete, requiring the establishment of a new viable “truth layer” capable of inferring intent in an environment.

Reading Time: 5 minsIn response to global cyber threats, a new White House executive order prioritizes network visibility to strengthen national cybersecurity. Why is network visibility important for your organization?

Reading Time: 6 minsSummer break is a high-risk period in cybersecurity for schools. Discover practical cybersecurity solutions for how to secure school networks over the summer.

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the stage for a more proactive cybersecurity approach.

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are mastering EDR bypass tactics. How can we defend against them?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations, local government, and education establishments.

Reading Time: 4 minsFor MSPs to proactively protect their clients they need good intelligence, such as the trends and tendencies in cyber threats revealed in the Lumu Compromise Report 2024.

Reading Time: 3 minsLumu’s new Compromise Report 2024 reveals the greatest current cybersecurity trends and how to defend against them. We look at the top three takeaways to watch out for in the report.

Reading Time: 4 minsWe are incredibly excited to share that Lumu has been recognized as one of the best Network Detection and Response (NDR) solutions for the second year running in the GigaOm Radar for NDRs.