Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Storm-0558 and the Dangers of Cross-Tenant Token Forgery

Modern cloud ecosystems often place a single identity provider in charge of handling logins and tokens for a wide range of customers. This approach certainly streamlines single sign-on (SSO) for end users, but it also places enormous trust in a single set of signing keys. If those private keys are compromised, attackers can create tokens that appear valid to any service that relies on them.

DDoS Protection: Insurance Policy or Proactive Defense?

Historically, smaller organizations or those outside highly targeted industries for distributed-denial-of-service (DDoS) attacks have thought of DDoS protection more akin to an insurance policy than proactive cyber defense, i.e. we’ll put some reactive processes in place “in case we get hit,” but not much more.

What Is Scattered Spider? Inside the Rise of Identity-Based Attacks

If you’ve been following major cybersecurity incidents over the past couple of years, chances are you’ve come across the name Scattered Spider. From massive casino breaches to healthcare system outages, this threat actor has become a name that CISOs don’t take lightly. But what is Scattered Spider, really? And why is this group of cybercriminals getting so much attention? Scattered Spider is a financially motivated group that came into focus around 2022.

The Rise of Identity-Based Attacks and How Deception Can Help

Identity-based attacks have become the predominant vector for sophisticated threat actors targeting enterprise networks, particularly those using Microsoft Active Directory. Active Directory (AD), which serves as the authentication and authorization framework in over 90% of organizations, represents a critical attack surface that, when compromised, provides adversaries with extensive capabilities for lateral movement, privilege escalation, and data exfiltration.
Featured Post

Improving Cyber and Mental Resilience with Threat Information Sharing

In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company's security posture and overall resilience.

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development

Dependency management is one of the biggest challenges in modern software development. Large projects often rely on dozens or even hundreds of libraries. Each one can introduce new vulnerabilities or even malicious code. Attackers sometimes upload fake packages to popular open-source repositories, hoping that build systems will download these packages automatically. This problem is made worse by transitive dependencies, where a single library might include several other libraries under the hood.

How to Use the LevelBlue DDoS Defense Portal | Video Overview

Get up to speed with the essentials of the LevelBlue DDoS Defense Portal in this video tutorial. Learn how to analyze network traffic, monitor threats, and customize your security settings—all in one place. Whether you're managing alerts, viewing mitigations, or generating reports, this step-by-step guide ensures you're prepared. In this video, you’ll learn how to.

Understanding LevelBlue DDoS Alert Emails & Investigation Process | What to Expect

This video explains how LevelBlue DDoS Defense Service alert emails work and provides a clear overview of the investigation and escalation process triggered by high severity alerts. You’ll learn: When and why DDoS alert emails are sent The role of the LevelBlue Threat Management Team How investigations determine malicious vs. legitimate traffic Differences between pre-authorized and manual mitigation What each type of alert email means.

How to Manage DDoS Contacts in the LevelBlue Portal | Add, Edit & Notify Admins

Learn how to add and manage contacts in the LevelBlue DDoS Defense Portal, including how to ensure the right users receive DDoS mitigation alerts and notifications. This step-by-step guide walks company administrators through: Accessing the DDoS Defense Portal Adding contacts with Business Direct IDs Enabling email alerts for DDoS mitigation events Managing contact updates to keep your incident response team informed.

Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2

Our security monitoring systems recently flagged a suspicious npm package, os-info-checker-es6, which represents a sophisticated and evolving threat within the npm ecosystem. What initially appeared as a simple OS information utility quickly unraveled into a sophisticated multi-stage malware attack. This campaign employs clever Unicode-based steganography to hide its initial malicious code and utilizes a Google Calendar event short link as a dynamic dropper for its final payload.