How to Deal with the Inherent Shadow IT Risk

Shadow IT overview : opportunities and risks Shadow IT is defined by the use of applications, devices or software without the consent, or even the knowledge, of your corporate IT heads. Most of the time employees use shadow IT in order to be more efficient and bypass the processes linked to the shift to a […]

Read More… from How to Deal with the Inherent Shadow IT Risk

Phishing & Spear Phishing Attacks on the Rise

Phishing Attack

It has happened to all of us. You receive an email from your bank asking you to click on a link to “update your account.” The displayed page informs you that due to unusual activity on your account, the bank is taking the following security measures — because IT security is their top priority. The […]

Read More… from Phishing & Spear Phishing Attacks on the Rise

From Reveton to Maze: Tracing the Evolution of Ransomware

Maze Ransomware

Ransomware is experiencing rapid growth as a cyber attack — impacting private individuals to cities, from enterprises to non-profit organizations to government agencies. To appreciate where ransomware is going, it is imperative to understand the ransomware story from Reveton to Maze. This ongoing ransomware trend began in the 2013-2014 timeframe and appears to be escalating […]

Read More… from From Reveton to Maze: Tracing the Evolution of Ransomware

Cyber Attack Wipes Out Over 30% of Unsecured Databases

ElasticSearch Data Leak

In a cyber threat landscape largely governed by profit incentives, a newcomer known as “Meow” has been targeting unsecured databases, erasing all the data without leaving any kind of ransom note or demand. Since the discovery of this automated attack in mid-July 2020, speculations about the nature of the attacker and its underlying motivations are […]

Read More… from Cyber Attack Wipes Out Over 30% of Unsecured Databases

Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches

Third Party Data Breaches: Find and Fix Data Leaks on Third-Party Servers

At CybelAngel, 94% of the data leaks that we find for our customers can be traced back to third parties. As companies embrace digital transformation, moving operations to the Cloud increases the effectiveness and efficiency of operations while expanding the attack surface and increasing the potential for a third-party data breach.   It makes sense that […]

Read More… from Find and Fix Data Leaks on Third-Party Servers – Stop Data Breaches

Prevent Data Breaches from Hitting Your Bottom Line

Did you know that over 90% of data leaks we find and fix are in the cloud?  This means that outside our clients’ security perimeter, we detect data that is left unsecured, probably by mistake.  Enterprises rely on employees, which can be undermined by human error.  If all employees paid detailed attention and all networks […]

Read More… from Prevent Data Breaches from Hitting Your Bottom Line