News

  • Google Thwarts Over 10,000 Attempts by Chinese Influence Operator

    Google warned of high levels of activity from Chinese influence operator Dragon Bridge, which is increasingly experimenting with generative AI tools to create content Read More

    Read More

  • Post Title

    There’s some possibly good news on the ransomware front. Companies are becoming more resilient to attacks, and the ransom payments extorted from businesses by hackers are on a downward trend. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Keep the Cloud Secure with CIS after Migrating to the Cloud

    Want to stay secure after migrating to the cloud? Download our white paper to learn how three resources from the Center for Internet Security can help. Read More

    Read More

  • CISOs Reveal Firms Prioritize Savings Over Long-Term Security

    The data from Bugcrowd also reveals 40% of them think most firms don’t understand breach risks Read More

    Read More

  • Operation First Light Seizes $257m in Global Scam Bust

    The operation, orchestrated by Interpol, resulted in the arrest of 3950 suspects Read More

    Read More

  • Navigating CentOS 7 EOL to Maintain Your Cloud Security

    EOL for an operating system can necessitate a shift in your security efforts, as is the case with the CentOS 7 EOL. Here’s how to navigate the process. Read More

    Read More

  • Majority of Critical Open Source Projects Contain Memory Unsafe Code

    A CISA analysis in collaboration with international partners concluded most critical open source projects potentially contain memory safety vulnerabilities Read More

    Read More

  • Security Analysis of the EU’s Digital Wallet

    A group of cryptographers have analyzed the eiDAS 2.0 regulation (electronic identification and trust services) that defines the new EU Digital Identity Wallet. Read More

    Read More

  • US Charges Russian Individual for Pre-Invasion Ukraine Hack

    The US government is offering up to $10m for information on Amin Timovich Stigal’s location or his malicious cyber activity Read More

    Read More

  • Memory Dump Analysis: Using LiME for Acquisition and Volatility for Initial Setup

    The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Memory dump analysis is a crucial aspect of digital forensics, offering a snapshot of a system’s volatile memory at a specific point in…

    Read More

News, Advisories and much more

Exit mobile version