Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Living with AI: The Future We Once Imagined

Smartphones, smart homes, and virtual assistants like Alexa and Siri have seamlessly integrated into our daily lives. Yet, many of us rarely stop to think about the technology behind them. We enjoy the convenience these devices offer, but behind the scenes, artificial intelligence (AI) is reshaping the way we live, work, and interact with the world.

Securing Your Digital Footprint While Traveling in 2025

In an increasingly connected world, travel relies more on technology than ever. While digital tools enhance convenience, they also create new opportunities for cyber threats. Phishing attacks and malicious links targeting mobile devices are projected to triple compared to previous years as cybercriminals exploit public Wi-Fi networks and insecure booking platforms. To navigate these challenges, it’s essential to secure your digital footprint proactively.

Stories from the SOC: Caught in the Trap: Detecting and Defending Against RaccoonO365 Phishing Campaigns

In September 2024, LevelBlue conducted a comprehensive threat hunt targeting artifacts indicative of Phishing-as-a-Service (PhaaS) activity across our monitored customer fleet. During the investigation, the LevelBlue Managed Detection and Response (MDR) Blue Team discovered a new PhaaS kit, now identified as RaccoonO365. The hunt confirmed true-positive compromises of Office 365 accounts, prompting swift customer notifications and guidance on remediation actions.

3 Tips for Eliminating Attack Surface Blind Spots

In today’s rapidly evolving digital landscape, security professionals face many challenges in protecting their organizations from cyber threats. One common problem is the persistence of attack surface blind spots, which can be exploited by attackers and prevent an organization’s ability to stay ahead of threats.

How Hackers Steal Your Password

In today’s digital business environment, passwords are often the keys to your organization’s most sensitive assets—from financial records and customer accounts to intellectual property. Unfortunately, hackers are constantly developing methods to steal these passwords and gain unauthorized access. Understanding the techniques they use and how employees can protect themselves is crucial for maintaining digital security.