Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development

Dependency management is one of the biggest challenges in modern software development. Large projects often rely on dozens or even hundreds of libraries. Each one can introduce new vulnerabilities or even malicious code. Attackers sometimes upload fake packages to popular open-source repositories, hoping that build systems will download these packages automatically. This problem is made worse by transitive dependencies, where a single library might include several other libraries under the hood.

How to Use the LevelBlue DDoS Defense Portal | Video Overview

Get up to speed with the essentials of the LevelBlue DDoS Defense Portal in this video tutorial. Learn how to analyze network traffic, monitor threats, and customize your security settings—all in one place. Whether you're managing alerts, viewing mitigations, or generating reports, this step-by-step guide ensures you're prepared. In this video, you’ll learn how to.

Understanding LevelBlue DDoS Alert Emails & Investigation Process | What to Expect

This video explains how LevelBlue DDoS Defense Service alert emails work and provides a clear overview of the investigation and escalation process triggered by high severity alerts. You’ll learn: When and why DDoS alert emails are sent The role of the LevelBlue Threat Management Team How investigations determine malicious vs. legitimate traffic Differences between pre-authorized and manual mitigation What each type of alert email means.

How to Manage DDoS Contacts in the LevelBlue Portal | Add, Edit & Notify Admins

Learn how to add and manage contacts in the LevelBlue DDoS Defense Portal, including how to ensure the right users receive DDoS mitigation alerts and notifications. This step-by-step guide walks company administrators through: Accessing the DDoS Defense Portal Adding contacts with Business Direct IDs Enabling email alerts for DDoS mitigation events Managing contact updates to keep your incident response team informed.

Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2

Our security monitoring systems recently flagged a suspicious npm package, os-info-checker-es6, which represents a sophisticated and evolving threat within the npm ecosystem. What initially appeared as a simple OS information utility quickly unraveled into a sophisticated multi-stage malware attack. This campaign employs clever Unicode-based steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final payload.

The Forgotten Threat: How Supply Chain Attacks Are Targeting Small Businesses

When people hear "supply chain attack," their minds often go to headline-grabbing breaches. But while analysts, CISOs, and journalists dissect those incidents, a more tactical and persistent wave of attacks has been unfolding in parallel; one that's laser-focused on small businesses as the point of entry. This isn't collateral damage. It's by design.

Ransomware Response Plan: What Steps Schools and Libraries Should Take After an Attack

In Part 1 of this blog series The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks, we discussed creating a pre-incident plan that includes a backup process, asset management, identity and access management, risk-based vulnerability management, and security awareness training to minimize the risk of ransomware attacks.

One Click Is All It Takes: The Danger of CSRF Attacks

CSRF attack or Cross-site request forgery is a very dangerous and stealthy web security vulnerability that exploits trust from a user's browser for a web application. A successful CSRF attack deceives an authenticated user into performing some operations without his consent-like account modification or payment or financial transaction against his will. Most alarming in such cases is that CSRF attacks usually remain unknown for end-users that make defending against them difficult.

Actions to Take Following the M&S Cyber Attack

In light of the recent disclosure by Marks & Spencer (M&S) regarding a cyber attack that resulted in the theft of customer data, we strongly recommend that if you are affected you take immediate and proactive steps to protect your digital identity and reduce the risk of further compromise.

How to Protect Your Business from Scattered Spider's Latest Attack Methods

Mandiant warns that the Scattered Spider cybercriminal group is using “brazen” social engineering attacks to target large enterprise organizations in a wide range of sectors. Specifically, the group targets “organizations with large help desk and outsourced IT functions which are susceptible to their social engineering tactics.” The threat actors impersonate employees and attempt to trick IT workers into granting them access. The group also poses as IT workers to target employees.