Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Smishing?

Text messages used to be a safe space—quick birthday wishes, delivery updates, maybe the odd emoji from a friend. But in today’s digital world, not every ping on your phone is innocent. Some are traps, carefully crafted to trick, scare, or confuse. One of the sneakiest tricks out there? Smishing. Yep, it’s a mashup of “SMS” and “phishing.” If phishing is the scam that hides behind a shady email, smishing is its text-based cousin.

LevelBlue Momentum Continues with Two Acquisitions

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future.” Year one for LevelBlue was definitely a time of growth, change, and excitement! Today, I am writing to highlight LevelBlue’s continued momentum in the market through two recently announced acquisitions. On June 11, LevelBlue announced its acquisition of Aon’s Cybersecurity and IP Litigation Consulting groups, Stroz Friedberg and Elysium Digital.

Is Your Software Supply Chain a Weak Link?

Software complexity is increasing at unprecedented levels. The average software supply chain now contains artifacts from open-source repositories, internally developed code, software developed by third-parties, and commercial-off-the-shelf (COTS) software. All of this combines to run your business. The questions surrounding the software supply chain range from its visibility to its trustworthiness to the origin of the bits and bytes. The 2025 LevelBlue Data Accelerator.

How to Improve Computer Network Security for Your Business

Regardless of size or industry, all companies are exposed to potential cyber threats. Digitalization has brought countless benefits to today’s world, but as technology has evolved, so have the strategies used by cybercriminals to access and compromise company data and operations. Implementing computer network security has become a must. In recent years, cyberattacks have increased exponentially, posing a serious risk to organizational security.

AI in Endpoint Security

It’s no revelation to say that the world of connectivity has fundamentally changed since the pandemic. What may be more eye-opening, however, is how this shift has created a cybersecurity landscape more complex than ever before. Why? As companies increasingly embrace cloud computing, remote work, and BYOD (Bring Your Device) policies, endpoint security has become a critical pillar in defending against cyber threats. However, there is a challenge.

What Is an Advanced Persistent Threat (APT)?

If the term “cyber threat” alone is enough to make any company nervous, imagine a sophisticated cyberattack designed not only to infiltrate but to remain hidden within a network for extended periods. These threats are real, but they can also be countered. Let us introduce you to the infamous APTs or advanced persistent threats.

Why OCM Is Integral to AI Governance and Compliance

As organizations race to adopt artificial intelligence, many overlook a key success factor: Organizational Change Management (OCM). While AI governance and compliance frameworks provide the structure—policies, controls, and oversight, OCM addresses the human factors that brings these frameworks to life. AI governance requires more than technical controls; it demands cultural alignment, ethical awareness, and behavioral change across the enterprise. That’s where OCM becomes critical.

Stories from the SOC - ClickFix and Chill, Now Here's the Ransomware Bill

ClickFix has quickly become a rampant social-engineering tactic. First observed back in October 2023, it aims to trick users into pasting commands into the run dialog box under the guise of verifying the user’s connection and authenticity to the domain. Given its ease of use and ability to bypass technical security measures, adoption of ClickFix has been growing at an alarming rate.

What Is Phishing? Common Attacks Explained

Phishing remains one of the biggest cyber threats in circulation today. Billions of emails are sent every single day and together they claim thousands of victims, whether businesses or private individuals. Yet if the phishing attack is so well known, why do most people still fall for the trick? CSO Online reports that 80% of all security incidents are attributed to phishing.

What Is Cyber Risk

Did you know that it is estimated that 45% of organizations worldwide will have suffered attacks on their software supply chains this year? Cyber risk is real, and its consequences can be devastating. As digital transformation continues to reshape how businesses operate globally, cyber threats are increasing at a rapid and alarming pace. The term cyber risk refers to the damage posed by these cyber threats.