editor’s picks

  • Attacks

Advisory Alert: Lumma Stealer Rebounds After Takedown

Reading Time: 5 minsLumma Stealer cyber threat resurfaces despite recent takedown. Discover the malware's resurgence and learn how to protect…

10 months ago
  • Attacks

Cybercrime in the Education Sector

Reading Time: 5 minsCybercrime in the education sector is having a field day while educational institutions are suffering at the…

11 months ago
  • Attacks

Akira Ransomware and the IoT Security Gap

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need…

12 months ago
  • Attacks

Advisory Alert: Stolen FortiGate Data Leak — How To Take Action

Reading Time: 5 minsFollowing the release of data from over 15,000 Fortinet devices, what can we do to protect against…

1 year ago
  • Technical

Anonymization: How Cybercriminals Hide Attacks and Identities

Reading Time: 4 minsAnonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities,…

1 year ago
  • Trends

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the…

1 year ago
  • Trends

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the…

1 year ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a multinational insurance provider — discover…

1 year ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect, where MSP leaders shared actionable…

1 year ago
  • Technical

The Hidden Pitfalls of Deep Packet Inspection

Reading Time: 6 minsExplore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and…

1 year ago
  • Technical

Lumu’s Journey to Log Retention: Reducing Costs and Enabling Compliance

Reading Time: 6 minsDiscover how Lumu's Playback feature improves visibility and efficiency while addressing the limitations of traditional SIEMs in…

1 year ago
  • Technical

How Lumu Helps MSPs Achieve CIS Compliance

Reading Time: 3 minsLearn how Lumu helps MSPs meet CIS compliance with real-time malware detection, network defense, and automated incident…

2 years ago
  • Blog

Back-to-School K–12 Cybersecurity Tips

Reading Time: 4 minsEssential cybersecurity tips to safeguard K-12 schools during the back-to-school season.

2 years ago
  • Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures…

2 years ago
  • Attacks

The Downsides of Platformization Show the Need for an Open SecOps Platform

Reading Time: 4 minsPlatformization can limit flexibility and innovation. Discover why an open SecOps Platform is essential for cybersecurity

2 years ago