malware

  • Attacks

Advisory Alert: Remcos RAT Real-Time Surveillance Platform

Reading Time: 7 minsHow does the 2026 Remcos RAT bypass your security to stream live surveillance? Understand the latest campaign…

2 days ago
  • Trends

How to Turn MISP from a Compliance Burden into Active Defense

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this…

3 weeks ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes the transition from human-led to…

1 month ago
  • Attacks

Advisory Alert: AsyncRAT – Analysis, Evolution, and Defense Strategies

Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global threat. We look at how…

2 months ago
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics and defense evasion, identified through…

2 months ago
  • Attacks

Advisory Alert: How DeathRansom Walks Straight Into Your Network

Reading Time: 5 minsDeathRansom ransomware has evolved, hiding in malicious PDFs to bypass defenses. It does not break down the…

4 months ago
  • Attacks

4 Ways Threat Actors Weaponize Domain Reputation to Bypass Your Defenses

Reading Time: 5 minsYour security stack is built on trusting domain reputation scores. But attackers now weaponize malicious domain detection…

5 months ago
  • Attacks

Advisory Alert APT-C-36: Blind Eagle’s Global Supply Chain Risk

Reading Time: 6 minsOur analysis of APT-C-36, Blind Eagle, breaks down how a regional phishing attack becomes a global supply…

5 months ago
  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

8 months ago
  • Attacks

Advisory Alert: BumbleBee Malware in the Spotlight

Reading Time: 6 minsBumbleBee malware facilitates severe attacks like ransomware or data theft. Threat intelligence shows increasing deployment across key…

8 months ago
  • Trends

Does Infostealer Malware Have US Organizations Under Siege?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations,…

1 year ago
  • Blog

Back-to-School K–12 Cybersecurity Tips

Reading Time: 4 minsEssential cybersecurity tips to safeguard K-12 schools during the back-to-school season.

2 years ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 minsThe Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in traditional perimeter defenses. Understand how Lumu's…

2 years ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 minsEfficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and user-friendly tool.

2 years ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 minsLockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.

2 years ago