malware

  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes the transition from human-led to…

2 weeks ago
  • Attacks

Advisory Alert: AsyncRAT – Analysis, Evolution, and Defense Strategies

Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global threat. We look at how…

1 month ago
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics and defense evasion, identified through…

2 months ago
  • Attacks

Advisory Alert: How DeathRansom Walks Straight Into Your Network

Reading Time: 5 minsDeathRansom ransomware has evolved, hiding in malicious PDFs to bypass defenses. It does not break down the…

4 months ago
  • Attacks

4 Ways Threat Actors Weaponize Domain Reputation to Bypass Your Defenses

Reading Time: 5 minsYour security stack is built on trusting domain reputation scores. But attackers now weaponize malicious domain detection…

4 months ago
  • Attacks

Advisory Alert APT-C-36: Blind Eagle’s Global Supply Chain Risk

Reading Time: 6 minsOur analysis of APT-C-36, Blind Eagle, breaks down how a regional phishing attack becomes a global supply…

4 months ago
  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

7 months ago
  • Attacks

Advisory Alert: BumbleBee Malware in the Spotlight

Reading Time: 6 minsBumbleBee malware facilitates severe attacks like ransomware or data theft. Threat intelligence shows increasing deployment across key…

8 months ago
  • Trends

Does Infostealer Malware Have US Organizations Under Siege?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations,…

1 year ago
  • Blog

Back-to-School K–12 Cybersecurity Tips

Reading Time: 4 minsEssential cybersecurity tips to safeguard K-12 schools during the back-to-school season.

2 years ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 minsThe Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in traditional perimeter defenses. Understand how Lumu's…

2 years ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 minsEfficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and user-friendly tool.

2 years ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 minsLockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.

2 years ago
  • Attacks

Infostealers: The Silent Threat Compromising the World One Password at a Time

Reading Time: 7 minsExplore how infostealers compromise global security, silently stealing data and offering adversaries Initial Access to networks.

2 years ago
  • Attacks

The Resurgence of Qakbot: Advisory Alert

Reading Time: 3 minsQakbot resurges with new updates, posing a greater cyber threat. Discover how it's evading defenses in our…

2 years ago