Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Product Updates

Data Exfiltration Incidents

Ransomware groups have shifted to double extortion, often stealing sensitive data before a single file is ever encrypted.

Most modern attacks are “Living off the Land,” using legitimate tools like Rclone or Mega to move data. These connections often bypass traditional security rules because they look like normal cloud traffic.

March, 2026

Lumu AI

We are excited to announce that we are making Lumu AI a standard feature, available to every Lumu Defender customer, not as a luxury add-on. Lumu AI instantly transforms complex network telemetry into high-fidelity, actionable intelligence to bridge the response gap and accelerate your Mean Time to Understand (MTTU).

March, 2026

Lumu Agent with Built-in Response

The Lumu Agent now includes built-in automated response capabilities, expanding its role beyond data collection to enable direct action when threats are detected.

February, 2026

New Incidents Related to Anomalous User Behavior

Account takeover is one of the most common compromise paths, often achieved through phishing, info-stealers, or password reuse. Because attackers use valid credentials, they easily bypass traditional controls.

January, 2026

Lumu Discover: 3rd Party Ecosystem Risk

Lumu Discover now includes 3rd party risk assessment, giving you a complete picture of cybersecurity risks across your entire software ecosystem, including your technology vendors.

January, 2026

Maltiverse Threat Observatory

When global cyber threats feel like constant noise, the real question isn’t just what the threat is, but whether it’s actually targeting your industry, region, or peers.

January, 2026

The Next Generation of Continuous Compromise Assessment®

Since its inception, Lumu has built Continuous Compromise Assessment as the foundation of how organizations detect and respond to threats, and it has served as the backbone of how thousands of security teams operate cybersecurity on a daily basis.

December, 2025

Product Recap 2025

This year began with the launch of the Lumu SecOps Platform. Organizations no longer want vendor lock-in. They demand interoperability, open architectures, and the

December, 2025

Lumu Portal Audit Logs

Audit Logs give your team a clear, auditable record of what’s happening inside the Lumu Portal.

December, 2025

Your FREE compromise assessment is just a few clicks away

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.