feature post

  • Trends

RSAC 2026 Recap: The Dawn of the Agentic Era

Reading Time: 3 minsAs RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on the industry’s shift toward the…

2 days ago
  • Trends

How to Turn MISP from a Compliance Burden into Active Defense

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this…

3 weeks ago
  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are exploiting the ‘tuning gap’ in…

4 weeks ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes the transition from human-led to…

1 month ago
  • Stories

Cybersecurity Trends 2026: Facing the Post-Malware, AI-Orchestrated Threat Landscape

Reading Time: 3 minsHow autonomous attacks, AI supply chain compromise, and geopolitical cybercrime will render traditional SOCs and endpoint security…

5 months ago
  • Attacks

Advisory Alert APT-C-36: Blind Eagle’s Global Supply Chain Risk

Reading Time: 6 minsOur analysis of APT-C-36, Blind Eagle, breaks down how a regional phishing attack becomes a global supply…

5 months ago
  • Technical

3 Ways Generative AI Can Improve Your Cybersecurity Workflow

Reading Time: 4 minsBy integrating generative AI with Lumu Defender’s carefully curated threat data, you can create a powerful virtual…

6 months ago
  • Attacks

Advisory Alert: Gunra Ransomware’s 5-Day Ultimatum

Reading Time: 7 minsGunra ransomware targets critical industries using a strict five-day payment deadline. Learn about Gunra and ransomware detection…

7 months ago
  • Product

How To Implement Zero Trust with Lumu

Reading Time: 5 minsLearning how to implement Zero Trust is more than just buying tools, you have to ensure they…

8 months ago
  • Attacks

Advisory Alert: Sarcoma Ransomware Double Extortion Threat

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You…

8 months ago
  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

8 months ago
  • Technical

How to Master the Threat Intelligence Lifecycle With Lumu

Reading Time: 4 minsTo defend against threats, organizations must use a structured cyber threat intelligence lifecycle. This turns knowledge about…

8 months ago
  • Attacks

Cybersecurity for Schools: Your Back-to-School Plan

Reading Time: 5 minsAs a new school year begins, cybersecurity for K-12 is more critical than ever. Let’s explore top…

8 months ago
  • Trends

New Executive Order Demands Network Visibility

Reading Time: 5 minsIn response to global cyber threats, a new White House executive order prioritizes network visibility to strengthen…

9 months ago
  • Trends

Cybersecurity for Schools: The Guide to Summer Break

Reading Time: 6 minsSummer break is a high-risk period in cybersecurity for schools. Discover practical cybersecurity solutions for how to…

9 months ago