Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SharpParty: Process Injection in C#

As Anti-Virus and EDR solutions improve in detection and response capabilities, the job of a red teamer can become quite arduous. Malware payloads and techniques that once dominated networks have failed the test of time as EDR becomes aware of them. If your initial access payloads are detected immediately, your six-week long red team could be dead on arrival.

More Regulatory Scrutiny Means IRR Must Be a Priority | SEC, NIS2, and CIRCIA Compliance Insights

As global cybersecurity regulations tighten, security leaders are under increasing pressure to demonstrate strong Incident Readiness and Response (IRR). New requirements like the SEC cybersecurity disclosure rules, the EU’s NIS 2 Directive, and the forthcoming CIRCIA mandate faster reporting, stronger governance, and greater accountability. In this session, LevelBlue experts share insights from a survey of 500 security leaders on how organizations are adapting their IRR strategies for today’s regulatory climate.

Cyber Resilience in Healthcare: Insights from 2025 LevelBlue Spotlight Report

Join us for an insightful on-demand webcast exploring how healthcare organizations are strengthening cyber resilience to protect patients, safeguard data, and ensure care continuity. Based on findings from 220 healthcare cybersecurity leaders, the 2025 Spotlight Report reveals how hospitals and health systems are adapting to evolving threats, mitigating software supply chain risks, and aligning cybersecurity with clinical and business priorities.

Dissecting and Understanding APT Threat Group Activity

Government administration, defense, and finance sector organizations are the primary areas Advanced Persistent Threat (APT) groups are targeting, according to the most recent data from the Trustwave SpiderLabs’ Cyber Threat Intelligence (CTI) team. The team found most attacks are launched from China, Russia, and Iran, with the primary targets residing in the US, Ukraine, and, interestingly, Russia. The groups tracked include Lapsus$, ShinyHunters, and Silk Typhoon.

SpiderLabs Ransomware Tracker Update October 2025: Qlin Doubles Down on Attacks

The worldwide ransomware landscape saw a dramatic shift in attacks in October 2025, jumping 41% month over month, with the most prolific attacker, Qlin, more than doubling the number of attacks it launched, according to Trustwave, A LevelBlue Company, research. The US remained the primary recipient of ransomware attacks, but October saw manufacturing overtake technology as the most targeted vertical sector.

Elevate Your GRC Game: Automate Risk, Compliance & Resilience | LevelBlue + OneTrust

In today’s evolving world of Governance, Risk, and Compliance (GRC), organizations face new challenges—expanding digital boundaries, data sprawl, manual processes, and a constantly shifting regulatory landscape. “Elevate Your GRC Game” brings together LevelBlue and OneTrust to show how automation and AI can transform these challenges into opportunities. Discover the latest GRC trends—from proactive risk management and business-integrated frameworks to continuous compliance and data governance.

LevelBlue Named a Major Player in the IDC MarketScape: Worldwide Extended Detection and Response Software 2025 Vendor Assessment

LevelBlue was recognized as a Major Player in the IDC MarketScape: Worldwide Extended Detection and Response Software 2025 Vendor Assessment ( September 2025, IDC.) This recognition follows the analyst firm earlier this month naming Trustwave a Leader in the IDC MarketScape: APEJ Managed Detection and Response Services 2025 Vendor Assessment (doc, September 2025). LevelBlue acquired Trustwave in August 2025.

The Evolving Role of AI Governance: Turning Risk into Responsibility

This piece is part of a monthly series by Carisa Brockman and Bindu Sundaresan exploring the evolving world of AI governance, trust, and responsibility. Each month, we look at how organizations can use artificial intelligence safely, thoughtfully, and with lasting impact.

The Rise of Phantom Cyber Firms: How to Spot Them and What to Verify Before You Engage

It’s bad enough that organizations must worry about threat actors launching phishing attacks, injecting ransomware, or exploiting vulnerabilities; now, there is a new attack variant on the loose. Legal scammers. These are companies, which seem to be emerging particularly in Australia, are set up and registered as legal cybersecurity firms, but in the end just take a company’s money without delivering any services.