• Contact
  • Search
  • Support
  • Login
EN
EN FR DE
Skip to content

Main Navigation

CybelAngel
  • Platform

    CybelAngel is the world’s leading platform for external threat intelligence.

    We help protect your business to secure your digital activities against cyberattacks and cyber breaches.

    Request Demo
    • Attack Surface Management
      Prevent harmful attacks by detecting and securing vulnerable shadow assets.
    • Data Breach Prevention
      Proactively detect data leaks to safeguard your confidential assets from potential exploitation.
    • Brand Protection
      Detect and take down malicious domains, fake accounts, and fraudulent mobile apps.
    • Cyber Threat Intelligence
      Enhance your security posture with top-tier threat intelligence.
    • Credential Intelligence
      Detect and manage critical credential leaks before they are compromised.
    • Dark Web Monitoring
      Gain visibility with the best deep dark web monitoring tool to side step targeted attacks.
  • Services

    CyberAngel's premium white-glove services empower you to tackle threats with confidence and precision.

    Request a service
    • Cybersecurity Remediation
      Reduce time to take down by 85% with CybelAngel’s remediation services.
    • M&A Cyber Due Diligence
      Proactively assess and mitigate your external attack surface with comprehensive threat intelligence to protect your company's financial standing.
    • Custom Threat Investigation
      Expand your cybersecurity expertise and resilience with the CybelAngel REACT Team.
    • Regulatory Cyber Compliance
      Learn more about our regulatory compliance with international industry standards.
  • Partners
  • Resources

    Welcome to our Resource Hub.

    Explore in-depth threat intelligence notes, blogs on industry trends, customer success stories, and much more.

    • Industry Resources
      Access white papers, reports and Ebooks.
    • Blog
      Tap into our External Threat Intelligence cyber insights to get a fresh perspective.
    • Webinars
      Access our webinar catalog.

    Explore Fresh Content

    Decoding Scattered Spider’s Latest Messaging [Flash Report]
    • Flash Report

    Decoding Scattered Spider’s Latest Messaging [Flash Report]

    CybelAngel REACT

    3 min read • September 17, 2025

    Understanding Google Dorks [Plus risk use cases]

    Understanding Google Dorks [Plus risk use cases]

    Orlaith Traynor

    6 min read • September 15, 2025

  • Company

    Learn more about life and work at CybelAngel.

    Our Story
    • About CybelAngel
      Get up to speed on our journey so far in the threat intelligence fast lane
    • Careers
      Accelerate your career growth (and fun!) with a career at CybelAngel
  • Request Demo

The CybelAngel Blog

Tap into fresh threat intelligence insights.

Understanding the 7 Biggest Ransomware Players [New Ebook]
  • Ransomware

Understanding the 7 Biggest Ransomware Players [New Ebook]

Orlaith Traynor

3 min read • July 21, 2025

  • Articles
  • Events
  • News
  • Product Updates
NIST Cybersecurity Framework 2.0: An Overview
  • compliance

NIST Cybersecurity Framework 2.0: An Overview

Orlaith Traynor

8 min read • March 24, 2025

The Cl0p Ransomware Gang Unveiled
  • Ransomware

The Cl0p Ransomware Gang Unveiled

Orlaith Traynor

7 min read • March 19, 2025

Understanding DORA: What Financial Institutions Need to Know (2025)
  • compliance

Understanding DORA: What Financial Institutions Need to Know (2025)

Orlaith Traynor

8 min read • March 17, 2025

The Dark Side of Gen AI [Uncensored Large Language Models]
  • Genai

The Dark Side of Gen AI [Uncensored Large Language Models]

Noor Bhatnagar and Damya Kecili

7 min read • March 12, 2025

Understanding Cyber Threats Targeting Healthcare [2025 Guide]
  • healthcare

Understanding Cyber Threats Targeting Healthcare [2025 Guide]

Orlaith Traynor

9 min read • March 4, 2025

All About IOC Feeds [Introducing our New Feature]
  • Product Release

All About IOC Feeds [Introducing our New Feature]

Orlaith Traynor

7 min read • February 28, 2025

Unmasking NoName057(16): Botnets, DDoSia, and NATO
  • Ransomware

Unmasking NoName057(16): Botnets, DDoSia, and NATO

Orlaith Traynor

7 min read • February 25, 2025

AI-Powered Phishing is on the Rise [What to Do?]
  • AI

AI-Powered Phishing is on the Rise [What to Do?]

Orlaith Traynor

7 min read • February 20, 2025

Reviewing the Docusign API Trust Exploit [Plus 5 Security Takeaways]
  • API Threat Detection

Reviewing the Docusign API Trust Exploit [Plus 5 Security Takeaways]

Tania Abou Ltaif

5 min read • February 18, 2025

Build Stronger Security with MITRE ATT&CK
  • Core Cybersecurity

Build Stronger Security with MITRE ATT&CK

Orlaith Traynor

8 min read • February 12, 2025

CybelAngel’s 2025 External Threat Intelligence Report is Here
  • Annual Report

CybelAngel’s 2025 External Threat Intelligence Report is Here

Orlaith Traynor

4 min read • February 10, 2025

The 2025 Akira Ransomware Playbook
  • Ransomware

The 2025 Akira Ransomware Playbook

Orlaith Traynor

8 min read • February 3, 2025

All About EASM [Securing Your Attack Surface]
  • EASM

All About EASM [Securing Your Attack Surface]

Orlaith Traynor

8 min read • January 29, 2025

CybelAngel and Renaissance Join Forces to Bolster Cybersecurity in Ireland
  • CybelAngel Partners

CybelAngel and Renaissance Join Forces to Bolster Cybersecurity in Ireland

Orlaith Traynor

2 min read • January 21, 2025

Cyber Espionage, Data Breaches, and Malware: Inside the World of Chinese APT Threats
  • APTs

Cyber Espionage, Data Breaches, and Malware: Inside the World of Chinese APT Threats

Orlaith Traynor

6 min read • January 20, 2025

What is Doxxing? And How Can You Avoid it?
  • cybersecurity

What is Doxxing? And How Can You Avoid it?

Orlaith Traynor

7 min read • January 16, 2025

Quantum Safe Cybersecurity: What CISOs Need to Know [2025 Edition]
  • Quantum Safe Cybersecurity

Quantum Safe Cybersecurity: What CISOs Need to Know [2025 Edition]

Leah Koonthamattam

7 min read • January 14, 2025

How do TikTok Leaks Affect Your Cybersecurity Posture?
  • TikTok

How do TikTok Leaks Affect Your Cybersecurity Posture?

Orlaith Traynor

6 min read • January 10, 2025

The Rise of Cybersecurity Companies as Targets [Lessons from 2024]
  • CISO Insights

The Rise of Cybersecurity Companies as Targets [Lessons from 2024]

Orlaith Traynor

4 min read • January 9, 2025

An Overview of Cyber Attacks in the Middle East 2024 [Threat Note]
  • Threat Note Blog

An Overview of Cyber Attacks in the Middle East 2024 [Threat Note]

Orlaith Traynor

4 min read • January 6, 2025

What’s On the Dark Web? Your Guide to the Biggest Players in 2025
  • dark web monitoring

What’s On the Dark Web? Your Guide to the Biggest Players in 2025

Orlaith Traynor

6 min read • January 3, 2025

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 17
  • Next
Built on Trust

Start today on a path to a more secure tomorrow.

Platform

  • Attack Surface Management
  • Data Breach Prevention
  • Credential Intelligence
  • Dark Web Monitoring
  • Brand Protection

Services

  • Special Threat Investigation
  • M&A Cyber Due Diligence
  • Remediation
  • Compliance

Resources

  • Resource Library
  • Webinars
  • Blog

Quick Links

  • Privacy Notice for California Residents
  • Contact Us
  • Login
  • Support
  • Request a Demo
  • Partner With Us
© 2025 CybelAngel. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • Data Processing Policy

299054M46O4EGYO57Q46