Already have an account? Sign in

Sign in

Attacks
READING TIME: 5 MINS
Following the release of data from over 15,000 Fortinet devices, what can we do to protect against further compromise?
Technical
READING TIME: 4 MINS
Anonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities, complicating the detection and mitigation of attacks.
Attacks
READING TIME: 4 MINS
The December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?
Trends
READING TIME: 4 MINS
Lumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.
Trends
READING TIME: 5 MINS
Lumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the stage for a more proactive cybersecurity approach.
Attacks
READING TIME: 7 MINS
This is the story of a serious DNS tunneling attack on a multinational insurance provider — discover the importance of DNS tunneling detection, what we found when we investigated the attack, and how we contained it.

Join our pre-day 
workshop waitlist

  • By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.