Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Zero Trust?

With the adoption of cloud computing, mobile devices, and the Internet of Things (IoT), the traditional network perimeter no longer exists. This has created challenges for security professionals, requiring a new approach to cybersecurity. Zero Trust has emerged as a transformative security model. Let’s take a closer look into what Zero Trust is, how it works, and the benefits it offers to modern enterprises.

Living with AI: The Future We Once Imagined

Smartphones, smart homes, and virtual assistants like Alexa and Siri have seamlessly integrated into our daily lives. Yet, many of us rarely stop to think about the technology behind them. We enjoy the convenience these devices offer, but behind the scenes, artificial intelligence (AI) is reshaping the way we live, work, and interact with the world.

Securing Your Digital Footprint While Traveling in 2025

In an increasingly connected world, travel relies more on technology than ever. While digital tools enhance convenience, they also create new opportunities for cyber threats. Phishing attacks and malicious links targeting mobile devices are projected to triple compared to previous years as cybercriminals exploit public Wi-Fi networks and insecure booking platforms. To navigate these challenges, it’s essential to secure your digital footprint proactively.

Stories from the SOC: Caught in the Trap: Detecting and Defending Against RaccoonO365 Phishing Campaigns

In September 2024, LevelBlue conducted a comprehensive threat hunt targeting artifacts indicative of Phishing-as-a-Service (PhaaS) activity across our monitored customer fleet. During the investigation, the LevelBlue Managed Detection and Response (MDR) Blue Team discovered a new PhaaS kit, now identified as RaccoonO365. The hunt confirmed true-positive compromises of Office 365 accounts, prompting swift customer notifications and guidance on remediation actions.

3 Tips for Eliminating Attack Surface Blind Spots

In today’s rapidly evolving digital landscape, security professionals face many challenges in protecting their organizations from cyber threats. One common problem is the persistence of attack surface blind spots, which can be exploited by attackers and prevent an organization’s ability to stay ahead of threats.

How Hackers Steal Your Password

In today’s digital business environment, passwords are often the keys to your organization’s most sensitive assets—from financial records and customer accounts to intellectual property. Unfortunately, hackers are constantly developing methods to steal these passwords and gain unauthorized access. Understanding the techniques they use and how employees can protect themselves is crucial for maintaining digital security.

Introducing LevelBlue's 24/7 Managed Threat Detection and Response Service for Government

As new threat vectors emerge and cybercriminals leverage sophisticated technologies to orchestrate more targeted attacks, staying ahead of threats is more challenging than ever. We are excited to announce the launch of a new managed security service designed to protect highly regulated data and help ensure critical services are efficiently delivered.

Physical Security In The Age Of Digital: Access Control System Vulnerabilities

Access control systems are the physical form of the layers of data, credential and identity controls underpinning the systems relied on every day. Yet, they can be an afterthought; even the most high-profile breaches of physical security systems can take years to rectify. Security Week highlights the vulnerabilities affecting Nice Linear, a widely used proprietary system in the world of smart homes. Over 2,500 individual vulnerabilities flagged in 2019 alone.

Tackling the Unique Cybersecurity Challenges of Online Learning Platforms

Online learning has expanded access to education across all levels. However, as beneficial as these platforms can be, they pose unique cybersecurity risks. Securing e-learning platforms will become increasingly crucial as more school systems embrace this technology.

Cybersecurity in a Cycle: Balancing Repair and Replacement for Optimal Security

Regularly updating your policies, software, and systems is crucial to your long-term cybersecurity efforts. However, failing to properly plan these updates can undermine your continuity plans and impede your business's productivity and profitability. As a cybersecurity specialist, you can balance repairs and replacements by creating a dynamic, adaptive strategy that accounts for industry trends and responds to emerging threats without causing unnecessary expenses to the company.