LevelBlue SpiderLabs: APAC Emerges as Primary Target for Manufacturing Cyberattacks

February 26, 2026

Poland’s Energy Sector Attack is a Wake-Up Call for Improving Edge Security

February 16, 2026 | Peter Hawes

The AI Authorization Revolution: Why "Who Can Do What" Is the New Security Battleground

January 20, 2026 | Bindu Sundaresan

Remember when security was simple? Users had roles. Roles had permissions. ...

LevelBlue SpiderLabs: Ransomware Attacks Up 17% in 2025

December 30, 2025

Global Ransomware Surges in 2025: Total ransomware attacks rose by 17.2% ...

LevelBlue Predictions 2026: The Never Ending Story Evolving Threats and Adversary Tactics

December 23, 2025

As 2025 closes and we look toward 2026, the cybersecurity industry is bracing ...

LevelBlue and Tenable Introduce Unlimited Enterprise-Grade Vulnerability Scanning in USM Platform at No Additional Cost

December 16, 2025

LevelBlue is redefining what clients and partners can expect from a managed ...

Extortion-as-a-Service: The Latest Threat Actor Criminal Ecosystem

December 11, 2025 | Serhii Melnyk

For centuries, threat actors, both cyber and physical, have understood the ...

SpiderLabs Ransomware Tracker Update November 2025: Qilin, Cl0p, and Akira Vie for Top Attacker

December 03, 2025

LevelBlue SpiderLabs ransomware tracker noted a slight dip in the overall ...

Defining and Defending Against a Zero Day Attack

December 02, 2025

Unexpected attacks are the hardest to fend off.

Black Friday 2025: Aligning Cyber Resilience and Business Goals to Protect Your Retail Business

November 25, 2025

Black Friday Cyber Threats: As retail sales peak, cybercriminals ramp up ...

SpiderLabs Ransomware Tracker Update October 2025: Qilin Doubles Down on Attacks

November 04, 2025

The worldwide ransomware landscape saw a dramatic shift in attacks in October ...

What Is Cloud Security and How Can It Benefit Your Business?

June 02, 2025 | Daniel Ghillione

Implementing cloud security policies and technologies has seen sustained growth ...

Why Strong Usernames Matter for Your Online Security

April 07, 2025 | Damian Archer

Protect Your Privacy: Using the same username across accounts can expose ...

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks

April 01, 2025 | Barry O’Connell

Insider threats are on the rise—understand how both intentional and ...

Cybersecurity Consulting and Ransomware Updates, March

April 01, 2025 | Bindu Sundaresan

Key Cybersecurity Risks and Protection Strategies This blog post provides a ...

How Hackers Steal Your Password

January 13, 2025 | Daniel Ghillione

Password Crackers – How Hackers Get Passwords In today’s digital business ...

From Retail Rampages to 2FA Fails: LevelBlue's Wild Ride Through the 2024 Cybersecurity Circus

December 30, 2024

As always in cybersecurity, hardly a dull day went by in 2024.

Analyzing Salt Typhoon: Telecom Attacker

December 12, 2024

Unveiling Salt Typhoon: A New Wave in Cyber Espionage Discover how this ...

Why a Zero Trust Architecture Must Include Database Security

November 27, 2024

Whether the means of a cyber-attack are phishing, ransomware, advanced ...

The Human Factor in Cybersecurity: Behavioral Insights and Mitigation Strategies

September 03, 2024 | Sam Bocetta

The content of this post is solely the responsibility of the author. LevelBlue ...

Why Vulnerability Scanning is an Offensive Security Program’s Secret Weapon

June 21, 2024

Knowing what you don’t know is the key to keeping an organization safe and the ...

OT Cybersecurity: Safeguard Our Infrastructure

June 10, 2024 | Kazi Arif

What is Operational Technology? Operational Technology (OT) is the backbone of ...

Why Firewalls Are Not Enough in Today's Cybersecurity Landscape

June 05, 2024 | Irfan Shakeel

The content of this post is solely the responsibility of the author. LevelBlue ...

Understanding Your Network's Security Posture: Vulnerability Scans, Penetration Tests, and Beyond

May 24, 2024

Organizations of all sizes need to be proactive in identifying and mitigating ...

The Hidden Threat in Plain Sight: Analyzing Subtextual Attacks in Digital Communications

April 09, 2024 | Nahla Davies

The content of this post is solely the responsibility of the author. LevelBlue ...

DarkGate malware delivered via Microsoft Teams - detection and response

January 30, 2024 | Peter Boyle

Executive summary While most end users are well-acquainted with the dangers of ...

Protecting energy infrastructure from cyberattacks

July 20, 2023 | Irfan Shakeel

The content of this post is solely the responsibility of the author. LevelBlue ...

GuLoader – a highly effective and versatile malware that can evade detection

February 15, 2023 | Luke Song

The content of this post is solely the responsibility of the author. LevelBlue ...