EDR

  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are exploiting the ‘tuning gap’ in…

6 days ago
  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

7 months ago
  • Events

Reflections from RSAC 2025

Reading Time: 4 minsAs global cybersecurity event, RSAC 2025, wraps for another year, Ricardo Villadiego, CEO of Lumu Technologies, reflects…

10 months ago
  • Attacks

Akira Ransomware and the IoT Security Gap

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need…

12 months ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are…

1 year ago
  • Trends

Does Infostealer Malware Have US Organizations Under Siege?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations,…

1 year ago
  • Attacks

Advisory: CISA Releases Advisory on RansomHub Ransomware Attacks

Reading Time: 4 minsRansomHub is a new ransomware group offering Ransomware as a Service that has already encrypted and exfiltrated…

2 years ago
  • Events

Our 3 Biggest Takeaways From DEFCON 32

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in…

2 years ago
  • Trends

They Call It XDR. We Call It Continuous Compromise Assessment.

Reading Time: 4 minsXDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the…

5 years ago