Cyber Attack Wipes Out Over 30% of Unsecured Databases

ElasticSearch Data Leak

In a cyber threat landscape largely governed by profit incentives, a newcomer known as “Meow” has been targeting unsecured databases, erasing all the data without leaving any kind of ransom note or demand. Since the discovery of this automated attack in mid-July 2020, speculations about the nature of the attacker and its underlying motivations are […]

Read More… from Cyber Attack Wipes Out Over 30% of Unsecured Databases

Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches

Third Party Data Breaches: Find and Fix Data Leaks on Third-Party Servers

At CybelAngel, 94% of the data leaks that we find for our customers can be traced back to third parties. As companies embrace digital transformation, moving operations to the Cloud increases the effectiveness and efficiency of operations while expanding the attack surface and increasing the potential for a third-party data breach.   It makes sense that […]

Read More… from Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches

Prevent Data Breaches from Hitting Your Bottom Line

Causes of Negligent Data Breaches

Did you know that over 90% of data leaks we find and fix are in the cloud?  This means that outside our clients’ security perimeter, we detect data that is left unsecured, probably by mistake.  Enterprises rely on employees, which can be undermined by human error.  If all employees paid detailed attention and all networks […]

Read More… from Prevent Data Breaches from Hitting Your Bottom Line

Banking System: A Rich Target for Cybercriminals

Cyber attack - Banking System: A Rich Target for Cybercriminals

The infamous bank robber, Willie Sutton was once asked why he robbed banks. He responded, “Because that’s where the money is.” Nearly a hundred years later, the scenario has not changed, except bank theft has shifted from the physical world to the digital one. A few decades ago criminals robbed banks, now they’re hacking into […]

Read More… from Banking System: A Rich Target for Cybercriminals

Remote Workers Vulnerable to Social Engineered Data Breaches

Social Engineered Data Breach

One successful social engineering data breach can move your stock price fast — in the wrong direction. Is your company’s network prepared to handle a mega hack accomplished via social engineering, such as the recent one that Twitter suffered?  With the shift to remote work, the threat for social engineering hacks can increase.  When employees […]

Read More… from Remote Workers Vulnerable to Social Engineered Data Breaches

Cybersecurity vs. Risk Management

Change focus from Threat to Risk

Frank worked in Information Security as a System Administrator.  He had spent most of the day thwarting bad guys and was frustrated.  After five years, he was in the same job as when he started.  Frank felt locked in a cage, working from home day in and day out, fighting off threats to his company’s […]

Read More… from Cybersecurity vs. Risk Management