Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Tag: supply chain attacks

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

snowflake supply chain attack feature
Attacks

Advisory Alert: Snowflake Supply Chain Attack

Reading Time: 3 minsExplore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures to protect your organization from similar threats

EDR evasion feature image
Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers evade Endpoint Detection and Response (EDR) systems using various techniques. Learn about the common tactics used by cyber attackers to bypass endpoint defenses and how to better protect against these stealthy attacks.

3CX Desktop App Attack Advisory Alert Feature
Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the 3CX Desktop App currently being exploited by threat actors. Learn how it could impact your company and how to respond in case adversaries leveraged this vulnerability to enter your organization.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.