Machine Learning Powers Data Leak Detection

Machine Learning Models Power Data Leak Detection

Data Science is a critical cog in CybelAngel’s Data Leak detection. Our Machine Learning models protect customers against data breaches by augmenting the expertise of CybelAngel security analysts. A human-only solution would take an extremely long time to detect actual leaks from all the false positives generated by the exponential growth of data exchanged on […]

Read More… from Machine Learning Powers Data Leak Detection

Ragnar Locker Targets CWT in Ransomware Attack

Ragnar Locker Targets CWT in Ransomware Attack

  Ragnar Locker strikes again. CWT, formerly Carlson Wagonlit Travel and fifth largest travel management firm, confirmed a cyber attack, which it said occurred the weekend of July 26-27, 2020. According to Threatpost, CWT stated, “We can confirm that after temporarily shutting down our systems as a precautionary measure, our systems are back online and […]

Read More… from Ragnar Locker Targets CWT in Ransomware Attack

Steps in the Cyber Kill Chain

Cyber Kill Chain

The Cyber Kill Chain is a model developed by researchers at Lockheed Martin that categorizes seven stages of targeted cyber attacks.  The Cyber Kill Chain is used to create an “Intelligence-Driven Computer Network Defense.” This defense model is based on the military concept of the “Kill Chain,” which uses phase-based models to describe different types […]

Read More… from Steps in the Cyber Kill Chain

Protect Your Enterprise from GitHub® Data Leaks

GitHub has become one of the most popular development platforms for both enterprises and individuals over the past ten years, as the software is relatively easy to use and new features are constantly being added. Unfortunately, it has also become a rich source for sensitive data leaks. According to ZDNet in early 2019, “A scan […]

Read More… from Protect Your Enterprise from GitHub® Data Leaks

Timeline of Incident Response to Data Leak

Weekly Marketing/Analyst blog follow-up

Ms. Amanda Geraud had been an auditor for years.  It has been her job to review business projects and summarize the actions taken, costs involved, as well as  benefits or losses to her employer.   Today felt no different than so many others before, when she had to explain the chain of events leading to preventable […]

Read More… from Timeline of Incident Response to Data Leak

SCADA System Vulnerability Threatens Global Infrastructure

SCADA Data Leaks

SCADA under attack In April 2020, Israeli National Cyber Directorate alerted water utility companies after hackers took aim at their systems. The attackers targeted supervisory control and data acquisition (SCADA) systems linked to pumping stations, sewage facilities, as well as wastewater treatment plants. This prompt governmental notification urged energy and water organizations to update their […]

Read More… from SCADA System Vulnerability Threatens Global Infrastructure