AsyncRAT in Action: Fileless Malware Techniques and Analysis of a Remote Access Trojan
September 10, 2025 | Sean Shirley
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft
May 21, 2025 | Sean Shirley
Recently, our team came across an alert involving mshta.exe, a native Windows ...
MMRat: A New Banking Trojan
September 28, 2023 | Arjun Patel
The content of this post is solely the responsibility of the author. LevelBlue ...
The cat and mouse game: Staying ahead of evolving cybersecurity threats
September 07, 2023 | Anas Baig
The content of this post is solely the responsibility of the author. LevelBlue ...
OneNote documents have emerged as a new malware infection vector
May 10, 2023 | Philip Okoh
The content of this post is solely the responsibility of the author. LevelBlue ...
Dridex Malware, the Banking Trojan
March 28, 2023 | Benny Liu
The content of this post is solely the responsibility of the author. LevelBlue ...
GuLoader – a highly effective and versatile malware that can evade detection
February 15, 2023 | Luke Song
The content of this post is solely the responsibility of the author. LevelBlue ...
Back to the office…
July 12, 2021 | James Prince
As the world is starting to move out of lockdown, businesses are moving some of ...
The importance of creating a small business Cybersecurity plan
April 29, 2021 | Silvana Carpineanu
This blog was written by an independent guest blogger.
What is Vizom malware? Everything you need to know
December 01, 2020 | Theodoros Karasavvas
This blog was written by an independent guest blogger.
LokiBot Malware: What it is and how to respond to it
October 28, 2020 | Nahla Davies
This blog was written by an independent guest blogger.
How malware mimics the spread of COVID-19
May 27, 2020 | Katelyn Ilkani
It’s a weird time to be alive. Millions of people globally are living under ...
Recalling the ILOVEYOU worm from 20 years ago
May 06, 2020 | Edwardo Rodriguez
Twenty years ago, the ILOVEYOU worm utilized the most basic human emotion, the ...
Hacking prevention: tips to reduce your attack surface
March 19, 2020 | Mike Klepper
These days it seems that every time you open your favorite news source there is ...
6 Reasons you Should Consider an Annual Penetration Testing Especially in Healthcare
February 15, 2020 | Bindu Sundaresan
Breaches are widely observed in the healthcare sector and can be caused by many ...
Siegeware and BAS attacks, an emerging threat
April 17, 2019 | Joe Robinson
As technological solutions to cybercrime become increasingly advanced, able to ...
Explain YARA Rules to Me: What is YARA?
February 06, 2019 | Monty St John
Introduction I like YARA. Every time I hear its name spoken aloud it makes me ...
Life of a Worm
April 11, 2018 | Javvad Malik
This is a story of a computer worm, from the time it was coded and deployed ...
North Korean Cyber-Attacks and Collateral Damage
February 15, 2018 | Chris Doman
**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...
OTX Trends Part 2: Malware
January 23, 2018 | Chris Doman
By Javvad Malik and Christopher Doman
Fileless Attacks are Driving Up Security Complexity & Costs
January 03, 2018 | Mike Duffy
If you feel like it’s getting harder and more expensive to protect your company ...
The Impact of NotPetya and WannaCry
December 11, 2017 | Javvad Malik
Another wake up call Every time there is a major security incident many people ...
Newly Discovered Iranian APT Group Brings State-sponsored Cyber Espionage into Focus
October 17, 2017 | Jake Mosher
State-sponsored cyber espionage has been rising steadily in recent years. ...
2017 Ransomware Report
October 05, 2017 | Kate Brew
Cybersecurity Insiders, partnering with the 380,000+ member Information ...
One Man Cyber Attacked 4,000 Companies; Don't Let It Happen to You
August 29, 2017 | Kim Crawley
A cyber-attack over the past four months was discovered which targeted more ...
Stackhackr : Build Your Own Mock Malware, Then Test Your Own Security
August 15, 2017 | Jack Danahy
Over the past 25 years or so, while developing a variety of security products, ...
A RAT that Tweets: New ROKRAT Malware Hides behind Twitter, Amazon, and Hulu Traffic
June 21, 2017 | Danielle Russell
To carry out attacks, malware and botnets rely on communication with a Command ...
StoneDrill: Shamoon Wiper Attacks Reloaded – Notes from the Underground
March 28, 2017 | Danielle Russell
Nothing can tarnish a great film like a terrible sequel: The Matrix Reloaded, ...