• Contact
  • Search
  • Support
  • Login
Skip to content

Main Navigation

CybelAngel
  • Platform

    CybelAngel is the world’s leading platform for external threat intelligence.

    We help protect your business to secure your digital activities against cyberattacks and cyber breaches.

    Request Demo
    • Attack Surface Management
      Prevent harmful attacks by detecting and securing vulnerable shadow assets.
    • Data Breach Prevention
      Proactively detect data leaks to safeguard your confidential assets from potential exploitation.
    • Brand Protection
      Detect and take down malicious domains, fake accounts, and fraudulent mobile apps.
    • Cyber Threat Intelligence
      Enhance your security posture with top-tier threat intelligence.
    • Credential Intelligence
      Detect and manage critical credential leaks before they are compromised.
    • Dark Web Monitoring
      Gain visibility with the best deep dark web monitoring tool to side step targeted attacks.
  • Services

    CyberAngel's premium white-glove services empower you to tackle threats with confidence and precision.

    Request a service
    • Remediation
      Reduce time to take down by 85% with CybelAngel’s remediation services.
    • M&A Cyber Due Diligence
      Proactively assess and mitigate your external attack surface with comprehensive threat intelligence to protect your company's financial standing.
    • Special Threat Investigation
      Expand your cybersecurity expertise and resilience with the CybelAngel REACT Team.
    • Regulatory compliance
      Learn more about our regulatory compliance with international industry standards.
  • Partners
  • Resources

    Welcome to our Resource Hub.

    Explore in-depth threat intelligence notes, blogs on industry trends, customer success stories, and much more.

    • Industry Resources
      Access white papers, reports and Ebooks.
    • Blog
      Tap into our External Threat Intelligence cyber insights to get a fresh perspective.
    • Webinars
      Access our webinar catalog.

    Explore Fresh Content

    The Cyber Resilience Act: What Security Leaders Need to Know Now
    • compliance

    The Cyber Resilience Act: What Security Leaders Need to Know Now

    Orlaith Traynor

    7 min read • June 19, 2025

    Who is the DragonForce Ransomware Gang?
    • Ransomware

    Who is the DragonForce Ransomware Gang?

    Orlaith Traynor

    7 min read • June 18, 2025

  • Company

    Learn more about life and work at CybelAngel.

    Our Story
    • About CybelAngel
      Get up to speed on our journey so far in the threat intelligence fast lane
    • Careers
      Accelerate your career growth (and fun!) with a career at CybelAngel
  • Request Demo

The CybelAngel Blog

Tap into our threat intelligence insights to get a fresh perspective.

The Ultimate Compliance Checklist: NIS 2 and DORA Standards
  • compliance

The Ultimate Compliance Checklist: NIS 2 and DORA Standards

Orlaith Traynor

7 min read • April 15, 2025

  • Articles
  • Events
  • News
  • Product Updates
How to Manage Your Cloud Data Leaks
  • cloud services
  • data leak
  • data leak detect

How to Manage Your Cloud Data Leaks

Orlaith Traynor

3 min read • October 3, 2020

North Korean Cybercrime: A Worrisome Success Story
  • cybercrime
  • North Korea

North Korean Cybercrime: A Worrisome Success Story

Orlaith Traynor

4 min read • September 23, 2020

Are you prepared for a critical data leak?
  • cyber attack
  • data breach
  • data leak

Are you prepared for a critical data leak?

Orlaith Traynor

3 min read • September 16, 2020

Can Money Buy Ransomware Happiness?
  • Ransomware

Can Money Buy Ransomware Happiness?

Orlaith Traynor

5 min read • September 13, 2020

How to Deal with the Inherent Shadow IT Risk
  • it security
  • shadow it

How to Deal with the Inherent Shadow IT Risk

Benedicte Matran

3 min read • September 7, 2020

Phishing & Spear Phishing Attacks on the Rise
  • phishing
  • spear phishing

Phishing & Spear Phishing Attacks on the Rise

Orlaith Traynor

5 min read • August 31, 2020

From Reveton to Maze: Tracing the Evolution of Ransomware
  • raas
  • Ransomware
  • wannacry

From Reveton to Maze: Tracing the Evolution of Ransomware

Orlaith Traynor

3 min read • August 27, 2020

Cyber Attack Wipes Out Over 30% of Unsecured Databases
  • cyber attack
  • cyber threats
  • elastisearch

Cyber Attack Wipes Out Over 30% of Unsecured Databases

Orlaith Traynor

4 min read • August 19, 2020

Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches
  • cybersecurity
  • data breach
  • data leak detection
  • data leaks

Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches

Orlaith Traynor

3 min read • August 19, 2020

Prevent Data Breaches from Hitting Your Bottom Line
  • data leaks

Prevent Data Breaches from Hitting Your Bottom Line

Orlaith Traynor

2 min read • August 17, 2020

Banking System: A Rich Target for Cybercriminals
  • cyber criminals
  • identity theft
  • pii
  • skimming

Banking System: A Rich Target for Cybercriminals

Orlaith Traynor

5 min read • August 10, 2020

Remote Workers Vulnerable to Social Engineered Data Breaches
  • cyber attacks
  • data breach
  • social engineered data breach

Remote Workers Vulnerable to Social Engineered Data Breaches

Orlaith Traynor

3 min read • August 9, 2020

Cybersecurity vs. Risk Management
  • cybersecurity
  • risk management

Cybersecurity vs. Risk Management

Benedicte Matran

5 min read • August 6, 2020

Machine Learning Powers Data Leak Detection
  • Data Breaches
  • data leak detection
  • machine learning

Machine Learning Powers Data Leak Detection

Benedicte Matran

4 min read • August 4, 2020

Ragnar Locker Targets CWT in Ransomware Attack
  • cyber attack
  • ragnar locker
  • Ransomware

Ragnar Locker Targets CWT in Ransomware Attack

Orlaith Traynor

2 min read • July 31, 2020

Protect Your Enterprise from GitHub® Data Leaks
  • Data Breaches
  • data leaks
  • github

Protect Your Enterprise from GitHub® Data Leaks

Benedicte Matran

5 min read • July 23, 2020

Timeline of Incident Response to Data Leak
  • data breach
  • data leak timeline
  • data leaks

Timeline of Incident Response to Data Leak

Orlaith Traynor

4 min read • July 22, 2020

SCADA System Vulnerability Threatens Global Infrastructure
  • cyber attacks
  • cybersecurity
  • scada

SCADA System Vulnerability Threatens Global Infrastructure

Benedicte Matran

4 min read • July 16, 2020

Cybersecurity Without Machine Learning? Think Again.
  • data breach
  • data leak
  • machine learning

Cybersecurity Without Machine Learning? Think Again.

Orlaith Traynor

4 min read • July 14, 2020

Find Data Leaks Before They Become Gushers
  • CISOS
  • data breach
  • data leak

Find Data Leaks Before They Become Gushers

Orlaith Traynor

2 min read • July 13, 2020

From Risk to Threat: The Escalation of Data Leaks
  • augmented intelligence
  • Data Breaches
  • data leaks

From Risk to Threat: The Escalation of Data Leaks

Orlaith Traynor

2 min read • July 5, 2020

Posts navigation

  • Previous
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • Next
Built on Trust

Start today on a path to a more secure tomorrow.

Platform

  • Attack Surface Management
  • Data Breach Prevention
  • Credential Intelligence
  • Dark Web Monitoring
  • Brand Protection

Services

  • Special Threat Investigation
  • M&A Cyber Due Diligence
  • Remediation
  • Compliance

Resources

  • Resource Library
  • Webinars
  • Blog

Quick Links

  • Privacy Notice for California Residents
  • Contact Us
  • Login
  • Support
  • Request a Demo
  • Partner With Us
© 2025 CybelAngel. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • Data Processing Policy

299054M46O4EGYO57Q46