Skip to main content

What are infostealers?
What are Infostealers? | How Can They Impact your Cybersecurity?

This quick guide explains how “infostealers” are a rising threat actor that acquires your data through sophisticated malware. By exploring how cybercriminals are leveraging and utilizing this form of cyber threat, you’ll understand why infostealers are so dangerous. We’ll also share what types of channels are allowing these cybersecurity breaches to thrive. Why is there […]

Ignorance of Risk – SEC ruling holding boards accountable for transparency: How CybelAngel addresses your External Risk

No one ever said Cybersecurity was easy, and now let’s add this summer’s fun…. implementing new SEC rules to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance.  As part of the rule which took effect the end of August, Regulation S-K Item 6 will require registrants to:  Describe […]

2023 State of EASM Report: CybelAngel analysis of half-billion internet-facing apps & devices reveals top trends in critical exposures to cyberattacks across industries

2023 State of EASM Report reveals critical infrastructure sectors among top industries for shadow IT exposure, leaked & stolen credentials, and third-party cloud misconfiguration PARIS, FR, April 17th, 2023 – CybelAngel, a global leader in External Attack Surface Management cybersecurity technology, today released the 2023 State of the External Attack Surface: Annual Threat Trends Analysis […]

Millions of Facebook Users Compromised by Deceptive ChatGPT App: How to Protect Your Digital Memories

A mysterious infostealer infiltrates Facebook accounts, robbing victims of precious memories and access to professional and personal profiles. Learn more about the unbelievable story CybelAngel recently uncovered, and request our help to fight Infostealer malwares.  Imagine losing 20 years’ worth of memories and access to both personal and professional Facebook accounts with a single click. […]

Cybersecurity and M&A: Three Answers You Need Right Now

If you’re starting or even just considering a merger or acquisition, there are three cybersecurity questions you should be asking. Even more important are the answers to those questions, which we’re providing below. And if you’re already undergoing M&A activities, then keep reading and make sure you’re addressing your cybersecurity due diligence needs!   1. […]

Who's pretending to be you online? Cybercriminals, that's who.
Infostealer Credentials: The Hacker’s Disguise

If you celebrate Mardi Gras, you know how fun it is to put on a mask and pretend to be someone else for a little while. At the end of the night, the mask comes off and you’re back to your day-to-day life. But for hackers, every day is Mardi Gras — and with stolen […]