• Contact
  • Search
  • Support
  • Login
EN
EN FR DE
Skip to content

Main Navigation

CybelAngel
  • Platform

    CybelAngel is the world’s leading platform for external threat intelligence.

    We help protect your business to secure your digital activities against cyberattacks and cyber breaches.

    Request Demo
    • Attack Surface Management
      Prevent harmful attacks by detecting and securing vulnerable shadow assets.
    • Data Breach Prevention
      Proactively detect data leaks to safeguard your confidential assets from potential exploitation.
    • Brand Protection
      Detect and take down malicious domains, fake accounts, and fraudulent mobile apps.
    • Cyber Threat Intelligence
      Enhance your security posture with top-tier threat intelligence.
    • Credential Intelligence
      Detect and manage critical credential leaks before they are compromised.
    • Dark Web Monitoring
      Gain visibility with the best deep dark web monitoring tool to side step targeted attacks.
  • Services

    CyberAngel's premium white-glove services empower you to tackle threats with confidence and precision.

    Request a service
    • Remediation
      Reduce time to take down by 85% with CybelAngel’s remediation services.
    • M&A Cyber Due Diligence
      Proactively assess and mitigate your external attack surface with comprehensive threat intelligence to protect your company's financial standing.
    • Special Threat Investigation
      Expand your cybersecurity expertise and resilience with the CybelAngel REACT Team.
    • Regulatory compliance
      Learn more about our regulatory compliance with international industry standards.
  • Partners
  • Resources

    Welcome to our Resource Hub.

    Explore in-depth threat intelligence notes, blogs on industry trends, customer success stories, and much more.

    • Industry Resources
      Access white papers, reports and Ebooks.
    • Blog
      Tap into our External Threat Intelligence cyber insights to get a fresh perspective.
    • Webinars
      Access our webinar catalog.

    Explore Fresh Content

    Escalating cyber hostilities in North Africa [A CNSS Breach Update]
    • Threat Note

    Escalating cyber hostilities in North Africa [A CNSS Breach Update]

    CybelAngel REACT

    4 min read • June 26, 2025

    A 101 Guide to Synthetic Identity Theft
    • Synthetic Identity Theft

    A 101 Guide to Synthetic Identity Theft

    Orlaith Traynor

    8 min read • June 25, 2025

  • Company

    Learn more about life and work at CybelAngel.

    Our Story
    • About CybelAngel
      Get up to speed on our journey so far in the threat intelligence fast lane
    • Careers
      Accelerate your career growth (and fun!) with a career at CybelAngel
  • Request Demo

The CybelAngel Blog

Tap into our threat intelligence insights to get a fresh perspective.

The Ultimate Compliance Checklist: NIS 2 and DORA Standards
  • compliance

The Ultimate Compliance Checklist: NIS 2 and DORA Standards

Orlaith Traynor

7 min read • April 15, 2025

  • Articles
  • Events
  • News
  • Product Updates
What is Cybersquatting? How Can it Damage Your Business?
  • cybersquatting
  • dns threat
  • domain name system

What is Cybersquatting? How Can it Damage Your Business?

Orlaith Traynor

3 min read • February 3, 2021

Are You Monitoring the Dark Web for Threats to Your Business?
  • dark web
  • dark web monitoring
  • deep web

Are You Monitoring the Dark Web for Threats to Your Business?

Orlaith Traynor

2 min read • February 1, 2021

CybelAngel Uncovers Risks from Invisible Devices and Hidden Data Exposures with New Asset Discovery and Monitoring Service
  • data leak detection
  • Digital Risk Protection

CybelAngel Uncovers Risks from Invisible Devices and Hidden Data Exposures with New Asset Discovery and Monitoring Service

Orlaith Traynor

2 min read • January 26, 2021

Stopping Account Takeover Attacks
  • account takeover attacks
  • ato
  • data breach

Stopping Account Takeover Attacks

Orlaith Traynor

4 min read • January 24, 2021

Identify and Prevent a Ransomware Attack: REvil Soddinokibi Use Case
  • Ransomware
  • REvil
  • Sodinokibi

Identify and Prevent a Ransomware Attack: REvil Soddinokibi Use Case

Orlaith Traynor

3 min read • January 20, 2021

Misconfigured IOT Devices
  • internet of things
  • IoT
  • iot devices

Misconfigured IOT Devices

Orlaith Traynor

3 min read • January 18, 2021

How to Best Manage Third-Party Risk
  • data breach
  • third-party risk

How to Best Manage Third-Party Risk

Orlaith Traynor

4 min read • January 15, 2021

Stop Medical Device Leaks
  • data leaks
  • medical device leaks
  • medical imaging files

Stop Medical Device Leaks

Benedicte Matran

3 min read • January 13, 2021

Dangers of Credential Stuffing to Businesses
  • credential stuffing
  • password security

Dangers of Credential Stuffing to Businesses

Orlaith Traynor

3 min read • January 11, 2021

Top 10 Cybersecurity Blog Posts for 2020
  • cloud migration
  • cybersecurity
  • digital transformation

Top 10 Cybersecurity Blog Posts for 2020

Benedicte Matran

4 min read • January 4, 2021

COVID-19 Pandemic: Hacker’s Gold Mine
  • covid 19
  • fake websites
  • malicious websites

COVID-19 Pandemic: Hacker’s Gold Mine

Benedicte Matran

4 min read • December 22, 2020

45M Medical Images Accessible Online
  • Digital Risk Protection
  • ip addresses
  • medical imaging files
  • pii

45M Medical Images Accessible Online

Benedicte Matran

3 min read • December 14, 2020

How to Prevent Data Breaches
  • Data Breaches
  • data leaks
  • data loss

How to Prevent Data Breaches

Orlaith Traynor

3 min read • December 12, 2020

How Secure Is Your Data in AWS S3 Buckets?
  • aws s3 bucket
  • aws security

How Secure Is Your Data in AWS S3 Buckets?

Orlaith Traynor

3 min read • December 1, 2020

Hackers Defend Their Reputation Across the Criminal Community
  • cybercrime
  • hackers

Hackers Defend Their Reputation Across the Criminal Community

Benedicte Matran

3 min read • November 18, 2020

What is Driving Ransomware’s Alarming Trend?
  • Banking
  • Ransomware
  • trojan

What is Driving Ransomware’s Alarming Trend?

Orlaith Traynor

4 min read • November 6, 2020

How to Spot & Resolve Causes of Data Breaches
  • data breach
  • Data Breaches

How to Spot & Resolve Causes of Data Breaches

Orlaith Traynor

2 min read • November 6, 2020

Data Breaches Result in Painful Forecast
  • data breach
  • Data Breaches

Data Breaches Result in Painful Forecast

Orlaith Traynor

3 min read • October 28, 2020

Negligence Drives 90% of Data Breaches
  • capital one
  • Data Breaches
  • data loss
  • target

Negligence Drives 90% of Data Breaches

Orlaith Traynor

3 min read • October 28, 2020

Frightening Top 10 Halloween Passwords
  • password security
  • passwords
  • stolen credentials

Frightening Top 10 Halloween Passwords

Orlaith Traynor

4 min read • October 27, 2020

Are You a Good Ransomware Target?
  • personally identifiable information
  • pii
  • Ransomware

Are You a Good Ransomware Target?

Benedicte Matran

3 min read • October 21, 2020

Posts navigation

  • Previous
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • Next
Built on Trust

Start today on a path to a more secure tomorrow.

Platform

  • Attack Surface Management
  • Data Breach Prevention
  • Credential Intelligence
  • Dark Web Monitoring
  • Brand Protection

Services

  • Special Threat Investigation
  • M&A Cyber Due Diligence
  • Remediation
  • Compliance

Resources

  • Resource Library
  • Webinars
  • Blog

Quick Links

  • Privacy Notice for California Residents
  • Contact Us
  • Login
  • Support
  • Request a Demo
  • Partner With Us
© 2025 CybelAngel. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • Data Processing Policy
EN
EN
FR
DE

299054M46O4EGYO57Q46