LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

September 23, 2025 | Dora Miranda

10 Critical Capabilities of API Detection and Response

August 26, 2025 | Tawnya Lancaster

Web Application and API Protection (WAAP) solutions have become increasingly ...

What Is Social Engineering in Cybersecurity?

July 29, 2025 | Daniel Ghillione

How many times have you heard the phrase “don’t trust strangers”? The key point ...

What Is a DDoS Attack?

July 22, 2025 | Daniel Ghillione

Companies face increasingly complex challenges every day, including ...

Different Types of Malware Explained

July 17, 2025 | Daniel Ghillione

The internet isn’t always a safe place. Behind every click, every download, and ...

What Is Smishing?

July 14, 2025 | Daniel Ghillione

Text messages used to be a safe space—quick birthday wishes, delivery updates, ...

LevelBlue Momentum Continues with Two Acquisitions

July 10, 2025 | Sundhar Annamalai

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, ...

Cybersecurity Consulting and Ransomware Updates, May

June 10, 2025 | Bindu Sundaresan

What CISOs Need to Know Now Each month brings new evidence that cybersecurity ...

Looking Ahead: A Conversation with LevelBlue Leaders on What's Next for the Company

June 10, 2025 | Daniel Ghillione

One year into our journey, we’re not just celebrating where we’ve been, but ...

How We Break Into Companies (So You Can Stop Us)

May 29, 2025 | Kazi Arif

When most people think of cybersecurity breaches, they imagine hackers cracking ...

Hunting Malware with MSHTA and CyberChef: A Deep Dive into Obfuscation in Malicious Scripts and Credential Theft

May 21, 2025 | Sean Shirley

Recently, our team came across an alert involving mshta.exe, a native Windows ...

It’s Time! All PCI 4.0 Requirements Are Now in Effect

May 06, 2025 | Robert Davidson

Since April 2025, version 4.0.1 of the PCI DSS standard has become the sole ...