Data Science is a critical cog in CybelAngel’s Data Leak detection. Our Machine Learning models protect customers against data breaches by augmenting the expertise of CybelAngel security analysts. A human-only solution would take an extremely long time to detect actual leaks from all the false positives generated by the exponential growth of data exchanged on […]
Category: Articles
Ragnar Locker Targets CWT in Ransomware Attack
Ragnar Locker strikes again. CWT, formerly Carlson Wagonlit Travel and fifth largest travel management firm, confirmed a cyber attack, which it said occurred the weekend of July 26-27, 2020. According to Threatpost, CWT stated, “We can confirm that after temporarily shutting down our systems as a precautionary measure, our systems are back online and […]
Read More… from Ragnar Locker Targets CWT in Ransomware Attack
Steps in the Cyber Kill Chain
The Cyber Kill Chain is a model developed by researchers at Lockheed Martin that categorizes seven stages of targeted cyber attacks. The Cyber Kill Chain is used to create an “Intelligence-Driven Computer Network Defense.” This defense model is based on the military concept of the “Kill Chain,” which uses phase-based models to describe different types […]
Protect Your Enterprise from GitHub® Data Leaks
GitHub has become one of the most popular development platforms for both enterprises and individuals over the past ten years, as the software is relatively easy to use and new features are constantly being added. Unfortunately, it has also become a rich source for sensitive data leaks. According to ZDNet in early 2019, “A scan […]
Read More… from Protect Your Enterprise from GitHub® Data Leaks
Timeline of Incident Response to Data Leak
Ms. Amanda Geraud had been an auditor for years. It has been her job to review business projects and summarize the actions taken, costs involved, as well as benefits or losses to her employer. Today felt no different than so many others before, when she had to explain the chain of events leading to preventable […]
SCADA System Vulnerability Threatens Global Infrastructure
SCADA under attack In April 2020, Israeli National Cyber Directorate alerted water utility companies after hackers took aim at their systems. The attackers targeted supervisory control and data acquisition (SCADA) systems linked to pumping stations, sewage facilities, as well as wastewater treatment plants. This prompt governmental notification urged energy and water organizations to update their […]
Read More… from SCADA System Vulnerability Threatens Global Infrastructure