Skip to main content

Posts about Articles

How to spot an open door to your network.
How to Spot an Open Door to Your Network

Taking Cybersecurity Beyond the Obvious with EASM In 2005, a group of about 25 people posing as landscapers tunneled into the vault of the Banco Central bank in Fortaleza, Ceará, Brazil, making off with approximately US$71M. It was the largest bank robbery in Brazil’s history and, despite the lack of a cybersecurity breach, it’s also […]

The road to shadow IT is paved with good intentions
How to Manage the Risks and Costs of Shadow IT

Do your employees use personal drives to store or share corporate data? Do they forward corporate files to their personal email? Perhaps they’ve created repositories for document gathering and sharing for a joint project with a vendor…or installed a handy little app or extension they found online… If so, congratulations: You’ve probably got shadow IT. […]

Quantifying M&A Cybersecurity Risk

Sometimes they get it right, sometimes they don’t With operations in transition, companies going through Merger and Acquisition (M&A) activities are frequently targeted for cyberattack. The high-value data of publicly-held companies is especially vulnerable, as it offers potential for media coverage and both short- and long-term rewards for threat actors. Not surprisingly, acquirers with mature […]

Des dizaines de sociétés ont été touchées par ces vols de données. Photo Sipa/Utrecht ROBIN/action press
Qui sont les ShinyHunters, ces cybercriminels en quête de bases de données ?

Depuis quelques années, un groupe de hackers nommé ShinyHunter sévit sur internet. Leur objectif est simple : lancer des cyberattaques contre des entreprises, parfois même des géants du web, pour accéder à leurs bases de données puis revendre toutes les informations collectées. « Gang de cybercriminels » ou « bande de passionnés » ? La […]

Arnaques aux colis par SMS : comment se prémunir de ce phénomène en pleine expansion
Arnaques aux colis par SMS : comment se prémunir de ce phénomène en pleine expansion

Les tentatives d’escroqueries par SMS contre les utilisateurs de smartphones se multiplient depuis le début de l’été rendant la technique du «smishing» de plus en plus redoutable. Explications. SOMMAIRE Comment reconnaître un cas de smishing ? Quelles précautions prendre ? «Votre colis a été envoyé, veuillez le vérifier», «Vous devez payer 1,90€ TVA pour votre colis et éviter les […]

CybelAngel is honored to be once again recognized as a Sample Vendor in the Gartner® Hype Cycle™ for Cyber Risk Management, 2022

CybelAngel is honored to be once again recognized as a Sample Vendor for Digital Risk Protection Services (DRPS) in the Gartner® Hype Cycle™ for Cyber Risk Management, 2022 What You Need to Know In 2022, the global risk landscape continues to be impacted by the ongoing COVID-19 pandemic conditions, the Russian invasion of Ukraine, labor […]