Skip to main content

2023 State of EASM Report: CybelAngel analysis of half-billion internet-facing apps & devices reveals top trends in critical exposures to cyberattacks across industries

2023 State of EASM Report reveals critical infrastructure sectors among top industries for shadow IT exposure, leaked & stolen credentials, and third-party cloud misconfiguration PARIS, FR, April 17th, 2023 – CybelAngel, a global leader in External Attack Surface Management cybersecurity technology, today released the 2023 State of the External Attack Surface: Annual Threat Trends Analysis […]

Millions of Facebook Users Compromised by Deceptive ChatGPT App: How to Protect Your Digital Memories

A mysterious infostealer infiltrates Facebook accounts, robbing victims of precious memories and access to professional and personal profiles. Learn more about the unbelievable story CybelAngel recently uncovered, and request our help to fight Infostealer malwares.  Imagine losing 20 years’ worth of memories and access to both personal and professional Facebook accounts with a single click. […]

Cybersecurity and M&A: Three Answers You Need Right Now

If you’re starting or even just considering a merger or acquisition, there are three cybersecurity questions you should be asking. Even more important are the answers to those questions, which we’re providing below. And if you’re already undergoing M&A activities, then keep reading and make sure you’re addressing your cybersecurity due diligence needs!   1. […]

What are infostealers?
What are Infostealers?

An infostealer (information stealer or just stealer) is a type of malware, usually a Trojan that (like its namesake) is able to sneak in and wreak havoc because it isn’t seen as a threat. Its purpose is to collect information from the infected computer. Such information can be but is not limited to: Passwords saved […]

Who's pretending to be you online? Cybercriminals, that's who.
Infostealer Credentials: The Hacker’s Disguise

If you celebrate Mardi Gras, you know how fun it is to put on a mask and pretend to be someone else for a little while. At the end of the night, the mask comes off and you’re back to your day-to-day life. But for hackers, every day is Mardi Gras — and with stolen […]

Intercept Stolen Credentials with Account Takeover Prevention

If you have employees, your corporate logins are up for grabs. Stolen credentials were the number one attack vector in 2022, leading to attacks on the world’s biggest companies.[1] Infostealer malware is easy for hackers to source and is becoming more popular by the day. It’s time to intercept leaked emails, stolen login cookies and […]