
Advisory Alert: Lumma Stealer Rebounds After Takedown
Reading Time: 5 minsLumma Stealer cyber threat resurfaces despite recent takedown. Discover the malware’s resurgence and learn how to protect your systems.
Already have an account? Sign in
Sign in
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 5 minsLumma Stealer cyber threat resurfaces despite recent takedown. Discover the malware’s resurgence and learn how to protect your systems.

Reading Time: 5 minsCybercrime in the education sector is having a field day while educational institutions are suffering at the hands of cybercriminals. We look at some of the stats and reasons behind this worrying trend.

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need for organizations to adopt a Zero Trust architecture and continuous network monitoring.

Reading Time: 5 minsFollowing the release of data from over 15,000 Fortinet devices, what can we do to protect against further compromise?

Reading Time: 4 minsAnonymization, though designed to protect privacy, is increasingly exploited by cybercriminals to mask their origins and identities, complicating the detection and mitigation of attacks.

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the stage for a more proactive cybersecurity approach.

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a multinational insurance provider — discover the importance of DNS tunneling detection, what we found when we investigated the attack, and how we contained it.

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect, where MSP leaders shared actionable advice on building effective cybersecurity stacks, pricing services, and managing client success

Reading Time: 6 minsExplore DPI’s limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and threat detection.

Reading Time: 6 minsDiscover how Lumu’s Playback feature improves visibility and efficiency while addressing the limitations of traditional SIEMs in handling vast amounts of network data.

Reading Time: 3 minsLearn how Lumu helps MSPs meet CIS compliance with real-time malware detection, network defense, and automated incident response.

Reading Time: 4 minsEssential cybersecurity tips to safeguard K-12 schools during the back-to-school season.

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures to protect your organization from similar threats

Reading Time: 4 minsPlatformization can limit flexibility and innovation. Discover why an open SecOps Platform is essential for cybersecurity