ransomware

  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 minsEfficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and user-friendly tool.

2 years ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 minsLockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.

2 years ago
  • Attacks

Infostealers: The Silent Threat Compromising the World One Password at a Time

Reading Time: 7 minsExplore how infostealers compromise global security, silently stealing data and offering adversaries Initial Access to networks.

2 years ago
  • Technical

Dissecting COPODE 1.0: New APT Evolves Lockbit Strategies

Reading Time: 5 minsLumu's threat intelligence team has identified a new Advanced Persistent Threat (APT) actor named 'Copode 1.0', leveraging…

3 years ago
  • Attacks

MOVEit Vulnerability: Active Exploitation by CL0P Ransomware

Reading Time: 3 minsThe recently discovered MOVEit vulnerability is an actively exploited zero-day threat, which is leading to significant breaches…

3 years ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

3 years ago
  • Attacks

Clop Ransomware Blitz: Understanding and Mitigating This Pervasive Threat

Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…

3 years ago
  • Attacks

Manufacturing Industry Targeted by Ransomware

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…

3 years ago
  • Attacks

Lumu’s Ransomware Incident Response Playbook

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…

3 years ago
  • Trends

Financial Sector Cybersecurity Pressure is Mounting

Reading Time: 5 minsLumu CTO Jeffrey Wheat takes a look at the factors placing pressure on financial sector cybersecurity teams…

4 years ago
  • Attacks

Conti Ransomware Group: the Alliances Behind the Chaos

Reading Time: 4 minsThe Conti Ransomware Group has recently unleashed a series of attacks on nations including Costa Rica, resulting…

4 years ago
  • Trends

Lumu’s Year in Review 2021

Reading Time: 2 minsIn 2021 Lumu grew from strength to strength—in every metric. Here's our Year in Review with all…

4 years ago
  • Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some quick…

4 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

4 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

4 years ago