Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fortifying Your Inbox: Advanced Email Security with Check Point & LevelBlue

As email-based cyberattacks surge, security teams are struggling to stay ahead of increasingly sophisticated phishing, Business Email Compromise (BEC), and AI-driven social engineering. With attackers exploiting platforms like Microsoft 365, Google Workspace, OneDrive, and SharePoint, organizations face growing pressure to strengthen protection, visibility, and compliance.

From Compliance to Covert Ops: Demystifying the Offensive Security Landscape

The merits of deploying offensive testing to strengthen an organization’s security posture are well-understood by today’s security leadership. Much to the relief of defenders, obtaining approval for an offensive security exercise has never been easier. However, the process of selecting the most appropriate offensive testing solution requires untangling overlapping definitions and vaguely defined terminology that leaves security teams more confused than when they started.

Black Friday 2025: Aligning Cyber Resilience and Business Goals to Protect Your Retail Business

Black Friday is only days away, and despite many stores sneaking holiday decorations onto their shelves since mid-September, it marks the official start of the December shopping frenzy. The coming days will not only bring a massive surge in sales, but also an equally large spike in cyber threats. For retailers of all sizes, this peak season is prime time for cybercriminals to exploit vulnerabilities.

Crowdsourced Penetration Testing: Understanding the Risks for Better Decision-Making

Crowdsourced penetration testing promises broad coverage, flexible resourcing, and cost efficiency by tapping into a distributed pool of security testers. Trustwave, A LevelBlue Company, realizes not every organization has the financial resources to partner with a security firm with dedicated penetration testing capabilities. At the same time, we want to make organizations aware of the many pitfalls in the crowdsourced pen-testing market and offer a few pointers on choosing the right vendors.

Art and Science: Cyber and Physical Security Convergence Deficiencies in the Louvre Heist

In eight short minutes on October 25, 2025, a group of thieves captured the world’s attention and imagination, perpetuating a daring heist in broad daylight and escaping with approximately €88 million worth of prized artwork from the planet’s most visited museum: The Louvre. Within the security community, the first successful robbery from the iconic Parisian landmark since 1998 was a bombshell story.

SharpParty: Process Injection in C#

As Anti-Virus and EDR solutions improve in detection and response capabilities, the job of a red teamer can become quite arduous. Malware payloads and techniques that once dominated networks have failed the test of time as EDR becomes aware of them. If your initial access payloads are detected immediately, your six-week long red team could be dead on arrival.

More Regulatory Scrutiny Means IRR Must Be a Priority | SEC, NIS2, and CIRCIA Compliance Insights

As global cybersecurity regulations tighten, security leaders are under increasing pressure to demonstrate strong Incident Readiness and Response (IRR). New requirements like the SEC cybersecurity disclosure rules, the EU’s NIS 2 Directive, and the forthcoming CIRCIA mandate faster reporting, stronger governance, and greater accountability. In this session, LevelBlue experts share insights from a survey of 500 security leaders on how organizations are adapting their IRR strategies for today’s regulatory climate.

Cyber Resilience in Healthcare: Insights from 2025 LevelBlue Spotlight Report

Join us for an insightful on-demand webcast exploring how healthcare organizations are strengthening cyber resilience to protect patients, safeguard data, and ensure care continuity. Based on findings from 220 healthcare cybersecurity leaders, the 2025 Spotlight Report reveals how hospitals and health systems are adapting to evolving threats, mitigating software supply chain risks, and aligning cybersecurity with clinical and business priorities.

Dissecting and Understanding APT Threat Group Activity

Government administration, defense, and finance sector organizations are the primary areas Advanced Persistent Threat (APT) groups are targeting, according to the most recent data from the Trustwave SpiderLabs’ Cyber Threat Intelligence (CTI) team. The team found most attacks are launched from China, Russia, and Iran, with the primary targets residing in the US, Ukraine, and, interestingly, Russia. The groups tracked include Lapsus$, ShinyHunters, and Silk Typhoon.

SpiderLabs Ransomware Tracker Update October 2025: Qlin Doubles Down on Attacks

The worldwide ransomware landscape saw a dramatic shift in attacks in October 2025, jumping 41% month over month, with the most prolific attacker, Qlin, more than doubling the number of attacks it launched, according to Trustwave, A LevelBlue Company, research. The US remained the primary recipient of ransomware attacks, but October saw manufacturing overtake technology as the most targeted vertical sector.

Elevate Your GRC Game: Automate Risk, Compliance & Resilience | LevelBlue + OneTrust

In today’s evolving world of Governance, Risk, and Compliance (GRC), organizations face new challenges—expanding digital boundaries, data sprawl, manual processes, and a constantly shifting regulatory landscape. “Elevate Your GRC Game” brings together LevelBlue and OneTrust to show how automation and AI can transform these challenges into opportunities. Discover the latest GRC trends—from proactive risk management and business-integrated frameworks to continuous compliance and data governance.