Security Blog
Addressing the Critical libwebp Vulnerability: Our Steps at Level
Jacob Haug in Security
October 2, 2023 • 2 min read
Last week, a concerning zero-day vulnerability was disclosed in libwebp - tagged as CVE-2023-5129 . This flaw in the library used for web…
Read moreDomain Controller Health Check with Powershell
Brian Scheewe in Security
September 8, 2023 • 3 min read
If you're managing Active Directory (AD), then the health of your Domain Controllers (DCs) is crucial. The DC is at the heart of user…
Read moreUsing PowerShell to Monitor Admin Groups for Rogue Accounts
Brian Scheewe in Security
August 28, 2023 • 2 min read
Admit it, it's happened to you! The moment of confusion when an admin group is modified and some old/strange/unknown/misplaced account is…
Read moreMonitoring Windows Shadow Copies
Brian Scheewe in Security
August 11, 2023 • 3 min read
Microsoft Windows has a great feature called Shadow Copies (or Restore Points in desktop OS versions) that performs local point-in-time…
Read moreRemediation of CVE-2023-23397 - Outlook SMB Vulnerability
Brian Scheewe in Security
March 22, 2023 • 2 min read
On 14 March 2023 Microsoft released a security fix for CVE-2023-23397 . This vulnerability is a particularly bad one because the exploit…
Read moreBest practices for securing small businesses with next-gen firewalls
Brian Scheewe in Security
October 13, 2022 • 2 min read
There are three pillars that support all cyber security efforts: Confidentiality Integrity Availability Before covering the practical tips…
Read moreHow Level helps admins deal with zero-day vulnerabilities
Brian Scheewe in Security
August 29, 2022 • 1 min read
This year we’ve seen several high-profile zero-day vulnerabilities, the most recent being Follina. The challenge with zero-day vulns with…
Read moreAn Alternative to SSH for Server Access Management
Jacob Haug in Security
August 10, 2021 • 5 min read
For IT and software teams, granting and managing server access is a major sticking point. Of course, team members need access to servers in…
Read moreRecommended
Best practices for securing small businesses with next-gen firewalls
Brian Scheewe in Security
October 13, 2022
We Interviewed 50 Businesses about Cybersecurity & Remote Monitoring: Here's What We Found
Jacob Haug in Product
February 26, 2021
Get started with Level today.
Don't be left behind, join us on a higher level. Contact us for more information and a demo.