editor’s picks

  • Technical

Cisco IOS XE Web UI Vulnerability: Critical Advisory & Immediate Mitigation Steps

Reading Time: 3 minsAlert: Severe Cisco IOS XE Web UI vulnerability risks full system control. Immediate action needed for users…

1 year ago
  • Technical

Online Learning vs Transfer Learning for Cybersecurity: Unpacking Lumu’s Use of AI

Reading Time: 5 minsExplore Online vs Transfer Learning in Cybersecurity: Unpacking Lumu's adaptive AI use for proactive threat defense and…

1 year ago
  • Trends

Leveraging Collective Defense and AI for Better Cybersecurity

Reading Time: 5 minsCollective Defense already plays a key role in shoring up the cyberdefenses of key industries. Alongside AI,…

1 year ago
  • Trends

Lumu Hits Bullseye in GigaOm Radar for Network Detection and Response

Reading Time: 4 minsThe GigaOm Radar Report for Network Detection and Response (NDR) has just been released and we are…

1 year ago
  • Trends

How Lumu Enables Threat Hunting

Reading Time: 4 minsThreat hunting in cybersecurity can be a challenging practice. Learn how Lumu helps you build your way…

1 year ago
  • Trends

There Is No Zero Trust Without Visibility

Reading Time: 3 mins‘Dr. Zero Trust' Chase Cunningham looks at Zero Trust, network visibility’s importance, and the Forrester Wave™: Network…

1 year ago
  • Trends

Key Insights From The Forrester Wave™: Network Analysis and Visibility Q2 2023

Reading Time: 3 minsLumu has been named a leader in Forrester Research’s latest report, The Forrester Wave™: Network Analysis and…

1 year ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

2 years ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

2 years ago
  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…

2 years ago
  • Attacks

Clop Ransomware Blitz: Understanding and Mitigating This Pervasive Threat

Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…

2 years ago
  • Attacks

Manufacturing Industry Targeted by Ransomware

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…

2 years ago
  • Attacks

Lumu’s Ransomware Incident Response Playbook

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…

2 years ago
  • Technical

How Cybersecurity Analysts Can Do More With Less

Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.

2 years ago
  • Technical

Lumu 2022 Product Recap

Reading Time: 3 minsThe 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over the…

2 years ago