cyberattacks

  • Attacks

Advisory Alert: Sarcoma Ransomware Double Extortion Threat

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You…

7 months ago
  • Attacks

Advisory Alert: C&M Software Supply Chain Attack Affects Brazilian Banks

Reading Time: 4 minsA supply chain cyberattack on C&M Software has impacted Brazilian financial institutions. Learn about the incident, its…

9 months ago
  • Attacks

Advisory Alert: Stolen FortiGate Data Leak — How To Take Action

Reading Time: 5 minsFollowing the release of data from over 15,000 Fortinet devices, what can we do to protect against…

1 year ago
  • Technical

Anonymization: How Cybercriminals Hide Attacks and Identities

Reading Time: 4 minsAnonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities,…

1 year ago
  • Attacks

Advisory Alert: PowerSchool Data Breach

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us…

1 year ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a multinational insurance provider — discover…

1 year ago
  • Events

Our 3 Biggest Takeaways From DEFCON 32

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in…

2 years ago
  • Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures…

2 years ago
  • Trends

The SOC of the Future

Reading Time: 4 minsLumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental…

4 years ago
  • Trends

Top Questions Lumu’s Customers Are Asking Now

Reading Time: 4 minsIn April of 2022, it seems that cybersecurity is more unsettled than ever. Here are the top…

4 years ago
  • Trends

White House Ransomware Open Letter: 5 Takeaways

Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate…

5 years ago
  • Attacks

Critical Infrastructure Ransomware Attacks Escalate

Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…

5 years ago
  • Stories

Cybersecurity 2020: What You Should Know before Heading into the New Year

Reading Time: 3 mins2019 showed that no business is immune to security breaches. Turn your attention to these 8 key…

6 years ago
  • Attacks

When Compromised Infrastructure Has Catastrophic Consequences

Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

6 years ago
  • Attacks

Capital One Breach Demands New Approach to Cybersecurity

Reading Time: 3 minsIn one of the largest data breaches ever, Capital One admitted recently that more than 100 million…

7 years ago