Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Your Most Dangerous User Is Not Human: How AI Agents and MCP Servers Broke the Internal API Walled Garden

Last month, Microsoft quietly confirmed something that should keep every CISO up at night. As first reported by BleepingComputer and later detailed by TechCrunch, a bug in Microsoft Office allowed Copilot, the AI assistant embedded in millions of enterprise environments, to summarize confidential emails and hand them to users who had no business seeing them. Sensitivity labels? Ignored. Data loss prevention (DLP) policies? Bypassed entirely. This wasn't the work of a hacker or malware.

LevelBlue Named a Top 100 Security MSP by CRN

The cybersecurity industry’s leading channel publication CRN, named LevelBlue to CRN’s Managed Service Provider (MSP) 500 list for 2026 in the Security MSP 100 category. “The companies on our 2026 MSP 500 list are redefining what exceptional managed services look like—helping organizations of every size stay agile, maximize their IT investments and scale with confidence,” said Jennifer Follett, VP of U.S. Content and Executive Editor, CRN, The Channel Company.

Why I'm Finally Ditching YUM for DNF in 2026 (And You Should, Too)

If you’ve been managing Red Hat-based systems as long as I have, yum install is likely hardcoded into your muscle memory. For decades, YUM (Yellowdog Updater, Modified) served as the backbone of RPM Linux-based distributions, getting us through countless server setups and late-night patches. But the era of YUM is officially over. With RHEL 9, Fedora, and Rocky Linux fully embracing DNF, YUM has moved from “reliable veteran” to “legacy technical debt.”

Integrating Darknet Intelligence, AI-Powered Cloud Attack Simulation & Automated Brand Protection

In the fast-paced digital underworld of February 2026, where threats morph daily amid law enforcement pressures, our intelligence team uncovers a landscape dominated by resilient darknet markets and fragmented forums fueling cybercrime. These spaces, once centralized, now scatter across encrypted channels, driving everything from credential theft to coordinated attacks that ripple through global supply chains.

CCPA consent vs opt-out: What websites Get Wrong About User Choice

If you have a consent banner, a Do Not Sell link, and a preferences database logging every opt-out, you’re CCPA compliant, right? Not really. In July 2025, Healthline Media settled with the California Attorney General for $1.55 million. That’s one of the largest CCPA fines to date. They had opt-out forms. They had GPC support. They had a preference database. Yet, after users exercised all three, investigators found that 118 cookies were still active and 82 tracking tags were still operating.

Tag Manager Security: How to Control GTM, Adobe Launch & Tealium for Privacy Compliance

Marketing needs to ship campaigns in hours. IT and engineering move in days. Tag managers live at the center of that conflict. They’re essential infrastructure, enabling marketing velocity by letting marketing teams deploy analytics, advertising pixels, and conversion tracking without IT or production bottlenecks. So campaigns launch faster, testing happens in real time, and teams optimize performance mid-campaign. But that same architecture can create compliance exposure.

Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk

Security frameworks have always had a gap. They tell you to find vulnerabilities and fix them, but they’ve rarely provided a system to determine which ones actually matter before you tap into your most expensive resource: engineering time. CTEM changes the game by treating security as a continuous lifecycle rather than a series of silos.

1,500% Surge in New Malware: Why MSPs Must Act Now

The latest findings from WatchGuard Technologies reveal a stark reality for managed service providers: cyber threats are not only increasing—they’re evolving faster than traditional defenses can keep up. In its newest Internet Security Report, WatchGuard identified a 1,548% spike in new, unique malware from Q3 to Q4 2025. Nearly one in four threats bypassed signature-based detection, highlighting a critical gap in reactive security models still used across many customer environments.

From Data to Action: Key Insights About Advancing Security Practices

The cybersecurity landscape is in constant flux, shaped by emerging technologies, evolving threats, and increasing regulatory demands. As organisations strive to protect their digital ecosystems, the challenge isn’t just collecting data—it’s turning that data into actionable strategies that drive meaningful change. Next week, we’ll unveil the 16th edition of Veracode’s flagship State of Software Security (SoSS) report—a cornerstone of the cybersecurity calendar.