Emotet Malware: Wild, Wild Trojan

Emotet Malware: Wild, Wild Trojan

Here at CybelAngel, we’ve spent a significant amount of R&D effort focused on protecting our customers from compromises relating to exposed data found on Pastebin and other paste sites. But beyond leaked documents and exposed PII, paste sites also host the hard work of researchers and security actors that compile lists of sites compromised by […]

Read More… from Emotet Malware: Wild, Wild Trojan

Digital Signatures are the Cybersecurity Vulnerability You Need to Stop Ignoring

Digital Signatures are the Cyber Security Vulnerability You Need to Stop Ignoring

Enterprises’ employees and third parties exchange an abundance of confidential documents, both internally and externally, and through a variety of means, including email and file-sharing platforms. These employees and third parties are often advised to secure these documents by attaching a digital signature. A digital signature is a trace attached by the author of a […]

Read More… from Digital Signatures are the Cybersecurity Vulnerability You Need to Stop Ignoring

AI is More Than a Buzzword [Threat Intelligence Edition]

For This Threat Intelligence Platform, AI is More Than a Buzzword

AI has become the buzzword of pretty much every domain, and we’re sure we’re not the only ones who have noticed. For its part, cybersecurity is hardly immune to the allure of AI, with every vendor in the industry currently waxing lyrical about the integration of AI into their solution. Is there a little bit of […]

Read More… from AI is More Than a Buzzword [Threat Intelligence Edition]

DNS Spoofing: Why You Should Never Trust a Domain Name

DNS Spoofing: Why You Should Never Trust a Domain Name

The domain name system (DNS) is a fundamental part of the web. This system translates the characters in a website’s name (for example, cybelangel.com) into an IP address, allowing browsers to connect to website servers. […]

Read More… from DNS Spoofing: Why You Should Never Trust a Domain Name