Why Vulnerability Scanning is an Offensive Security Program’s Secret Weapon

June 21, 2024

Knowing what you don’t know is the key to keeping an organization safe and the ...

OT Cybersecurity: Safeguard Our Infrastructure

June 10, 2024 | Kazi Arif

What is Operational Technology? Operational Technology (OT) is the backbone of ...

Why Firewalls Are Not Enough in Today's Cybersecurity Landscape

June 05, 2024 | Irfan Shakeel

The content of this post is solely the responsibility of the author. LevelBlue ...

Understanding Your Network's Security Posture: Vulnerability Scans, Penetration Tests, and Beyond

May 24, 2024

Organizations of all sizes need to be proactive in identifying and mitigating ...

The Hidden Threat in Plain Sight: Analyzing Subtextual Attacks in Digital Communications

April 09, 2024 | Nahla Davies

The content of this post is solely the responsibility of the author. LevelBlue ...

DarkGate malware delivered via Microsoft Teams - detection and response

January 30, 2024 | Peter Boyle

Executive summary While most end users are well-acquainted with the dangers of ...

Protecting energy infrastructure from cyberattacks

July 20, 2023 | Irfan Shakeel

The content of this post is solely the responsibility of the author. LevelBlue ...

GuLoader – a highly effective and versatile malware that can evade detection

February 15, 2023 | Luke Song

The content of this post is solely the responsibility of the author. LevelBlue ...

Identifying and securing your business’s dark data assets in the cloud

January 27, 2023 | Devin Morrissey

The content of this post is solely the responsibility of the author. LevelBlue ...

The biggest concerns within the US Financial Sector in 2022

October 13, 2022 | Anastasios Arampatzis

This blog was written by an independent guest blogger.

Establishing a Mobile Device Vulnerability Management Program

August 23, 2022 | Kazi Arif

The introduction of mobile devices has rapidly changed the world as we know it, ...

Everything you need to know about the new features in VSS & MVP

August 15, 2022 | Mieng Lim

This blog was written by an independent guest blogger.

The lifecycle of a software vulnerability

July 26, 2022 | Yoichi Sagawa

This is the second part of a three-blog series on startup security. Please ...

Quantum computing brings new security risks: How to protect yourself

February 01, 2022 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

Are vulnerability scan reports dangerous?

August 03, 2021 | Kason Smith

What is a vulnerability scan report? Vulnerability scan reports are requested ...