Cybersecurity in Hospitality: Defending a Highly Distributed Enterprise
March 26, 2026 | Bindu Sundaresan
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
LevelBlue SpiderLabs: APAC Emerges as Primary Target for Manufacturing Cyberattacks
February 26, 2026
The manufacturing sector faces a 793% surge in cyberattacks, with APAC ...
Poland’s Energy Sector Attack is a Wake-Up Call for Improving Edge Security
February 16, 2026 | Peter Hawes
The AI Authorization Revolution: Why "Who Can Do What" Is the New Security Battleground
January 20, 2026 | Bindu Sundaresan
Remember when security was simple? Users had roles. Roles had permissions. ...
LevelBlue SpiderLabs: Ransomware Attacks Up 17% in 2025
December 30, 2025
Global Ransomware Surges in 2025: Total ransomware attacks rose by 17.2% ...
LevelBlue Predictions 2026: The Never Ending Story Evolving Threats and Adversary Tactics
December 23, 2025
As 2025 closes and we look toward 2026, the cybersecurity industry is bracing ...
LevelBlue and Tenable Introduce Unlimited Enterprise-Grade Vulnerability Scanning in USM Platform at No Additional Cost
December 16, 2025
LevelBlue is redefining what clients and partners can expect from a managed ...
Extortion-as-a-Service: The Latest Threat Actor Criminal Ecosystem
December 11, 2025 | Serhii Melnyk
For centuries, threat actors, both cyber and physical, have understood the ...
SpiderLabs Ransomware Tracker Update November 2025: Qilin, Cl0p, and Akira Vie for Top Attacker
December 03, 2025
LevelBlue SpiderLabs ransomware tracker noted a slight dip in the overall ...
Defining and Defending Against a Zero Day Attack
December 02, 2025
Unexpected attacks are the hardest to fend off.
Black Friday 2025: Aligning Cyber Resilience and Business Goals to Protect Your Retail Business
November 25, 2025
Black Friday Cyber Threats: As retail sales peak, cybercriminals ramp up ...
SpiderLabs Ransomware Tracker Update October 2025: Qilin Doubles Down on Attacks
November 04, 2025
The worldwide ransomware landscape saw a dramatic shift in attacks in October ...
Back Up With Care, But Neglecting Patches can Leave You in Despair!
July 31, 2025 | Rox Harvey Rosales
CVE-2024-7348, which was discovered by Noah Misch, is a race condition ...
Is Your Software Supply Chain a Weak Link?
July 09, 2025 | Theresa Lanowitz
Knowing Your Software Supply Chain Software complexity is increasing at ...
What Is Cloud Security and How Can It Benefit Your Business?
June 02, 2025 | Daniel Ghillione
Implementing cloud security policies and technologies has seen sustained growth ...
Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow
April 15, 2025 | Danyel Loyd-Tate
Security teams are faced with an ongoing challenge when it comes to exposure ...
Why Strong Usernames Matter for Your Online Security
April 07, 2025 | Damian Archer
Protect Your Privacy: Using the same username across accounts can expose ...
Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks
April 01, 2025 | Barry O’Connell
Insider threats are on the rise—understand how both intentional and ...
Cybersecurity Consulting and Ransomware Updates, March
April 01, 2025 | Bindu Sundaresan
Key Cybersecurity Risks and Protection Strategies This blog post provides a ...
A Rose by Any Other Name: Exposure Management, a Category that Evolved from Vulnerability Management
February 07, 2025 | Danyel Loyd-Tate
As organizations increase their reliance on cloud services, remote work tools, ...
How Hackers Steal Your Password
January 13, 2025 | Daniel Ghillione
Password Crackers – How Hackers Get Passwords In today’s digital business ...
From Retail Rampages to 2FA Fails: LevelBlue's Wild Ride Through the 2024 Cybersecurity Circus
December 30, 2024
As always in cybersecurity, hardly a dull day went by in 2024.
Analyzing Salt Typhoon: Telecom Attacker
December 12, 2024
Unveiling Salt Typhoon: A New Wave in Cyber Espionage Discover how this ...
Why a Zero Trust Architecture Must Include Database Security
November 27, 2024
Whether the means of a cyber-attack are phishing, ransomware, advanced ...
Cybersecurity Threats: Top Risks Facing Your Startup
September 24, 2024 | David Balaban
The content of this post is solely the responsibility of the author. LevelBlue ...
The Human Factor in Cybersecurity: Behavioral Insights and Mitigation Strategies
September 03, 2024 | Sam Bocetta
The content of this post is solely the responsibility of the author. LevelBlue ...
The Hidden Risks of Internet of Bodies (IoB): Cybersecurity in Healthcare Devices
August 26, 2024 | Nahla Davies
The content of this post is solely the responsibility of the author. LevelBlue ...
Why Vulnerability Scanning is an Offensive Security Program’s Secret Weapon
June 21, 2024
Knowing what you don’t know is the key to keeping an organization safe and the ...