CybelAngel (@cybelangel) 's Twitter Profile
CybelAngel

@cybelangel

We are the leading #digitalrisk protection platform for enterprises, providing unrivaled #cybersecurity threat intelligence and #databreach detection.

ID: 1054451196

linkhttps://www.cybelangel.com calendar_today02-01-2013 07:34:43

5,5K Tweet

3,3K Followers

1,1K Following

CybelAngel (@cybelangel) 's Twitter Profile Photo

From stolen tokens to broken authorization, we’ve seen how quiet flaws in APIs can lead to major security incidents. Read our report: eu1.hubs.ly/H0mq_x30

CybelAngel (@cybelangel) 's Twitter Profile Photo

Workday has confirmed falling victim to a widespread attack that allowed hackers to access data through one of its third-party vendors. The stolen information included Workday customers' names, email addresses, and phone numbers: eu1.hubs.ly/H0ms22G0

CybelAngel (@cybelangel) 's Twitter Profile Photo

Shadow IT? Unsanctioned, forgotten, or vulnerable external assets are invisible to you—but not to attackers. Protect your attack surface before it’s too late: eu1.hubs.ly/H0mst5R0

Shadow IT? Unsanctioned, forgotten, or vulnerable external assets are invisible to you—but not to attackers. Protect your attack surface before it’s too late: eu1.hubs.ly/H0mst5R0
CybelAngel (@cybelangel) 's Twitter Profile Photo

Who is behind the ransomware gang responsible for as many as 170 cyber attacks in a single month? Find out all about PLAY in our latest blog: eu1.hubs.ly/H0mxzJK0

CybelAngel (@cybelangel) 's Twitter Profile Photo

CybelAngel is accelerating growth in the Frabelux market, and the sales team is expanding to meet new demand. The company is searching for ambitious Sales Development Representatives ready to engage leading enterprises and drive value: eu1.hubs.ly/H0my-qD0

CybelAngel (@cybelangel) 's Twitter Profile Photo

Fraudsters are leveraging AI to create highly convincing synthetic identities, bypassing traditional KYC and biometric checks. With no "real" victim to report, this fraud silently builds credit, making detection a challenge for financial institutions: eu1.hubs.ly/H0mBrpP0

CybelAngel (@cybelangel) 's Twitter Profile Photo

Researchers have discovered PromptLock, the first ransomware to use an AI model for its attacks. The malware uses hard-coded prompts to instruct an LLM to dynamically generate malicious Lua scripts, which are then used to steal and encrypt data: eu1.hubs.ly/H0mDmx10

CybelAngel (@cybelangel) 's Twitter Profile Photo

Every wondered why you need an OSINT framework? With back to school season in full swing, find out everything else you need to know, only in our OSINT done right guide: bit.ly/3HYhFHo

CybelAngel (@cybelangel) 's Twitter Profile Photo

We're proud to announce that CybelAngel has allocated part of its apprenticeship tax to @La Cravate Solidaire Marseille, a recognized public interest association working since 2012 for equal employment opportunities. Find out more: bit.ly/47iMXDb

CybelAngel (@cybelangel) 's Twitter Profile Photo

Did you know that a recent Chinese cyberattack, called "Salt Typhoon," may have stolen data from almost every American? This yearslong, coordinated assault infiltrated major telecommunications companies, and the stolen data could have big implications: nyti.ms/3I7DJzp

CybelAngel (@cybelangel) 's Twitter Profile Photo

Conducting cyber due diligence during M&A is crucial to protect your investment. But what happens after the deal? CybelAngel not only provides comprehensive assessments of a target's attack surface but also integrates seamlessly with your existing stack: bit.ly/3VDfMD7

Conducting cyber due diligence during M&A is crucial to protect your investment. But what happens after the deal? CybelAngel not only provides comprehensive assessments of a target's attack surface but also integrates seamlessly with your existing stack: bit.ly/3VDfMD7
CybelAngel (@cybelangel) 's Twitter Profile Photo

Malware isn’t just a nuisance. It’s a moving target. One day, it’s a fake invoice in your inbox. Next, it’s ransomware that’s locked down your entire network. So, what exactly are the top 20 types? bit.ly/4niEjcm

CybelAngel (@cybelangel) 's Twitter Profile Photo

This is your Monday reminder to immediately apply patches if you are using SonicWall firewalls. The Akira ransomware group is actively attacking SonicWall firewalls by exploiting a known, year-old vulnerability (CVE-2024-40766: eu1.hubs.ly/H0n0NNZ0

CybelAngel (@cybelangel) 's Twitter Profile Photo

Ransomware and targeted supply chain breaches are putting aerospace & defense security teams to the test! Are your current controls matching the pace of emerging threats and new compliance demands? Check out our latest threat report: eu1.hubs.ly/H0nhQjx0

CybelAngel (@cybelangel) 's Twitter Profile Photo

Shadow IT? Unsanctioned, forgotten, or vulnerable external assets are invisible to you, but not to attackers waiting in the wings Protect your attack surface for complete peace of mind: eu1.hubs.ly/H0nlCV_0

Shadow IT? Unsanctioned, forgotten, or vulnerable external assets are invisible to you, but not to attackers waiting in the wings

Protect your attack surface for complete peace of mind: eu1.hubs.ly/H0nlCV_0
CybelAngel (@cybelangel) 's Twitter Profile Photo

Infostealer malware isn't just a threat; it's a business killer. They steal your uptime, your revenue, and your customers' confidence. Find out more about one of the hardest to keep down, LummaC2 Stealer: bit.ly/4nvIsdD

CybelAngel (@cybelangel) 's Twitter Profile Photo

China-aligned APT group UTA0388 is now using OpenAI’s ChatGPT to generate malware and spear-phishing emails. The AI helps create obfuscated code and more convincing phishing content, making attacks faster and harder to detect. Read more: bit.ly/4q6r5lt

CybelAngel (@cybelangel) 's Twitter Profile Photo

Our partnership program is built with one goal: empowering your growth. Discover how we create exceptional value for both you and your customers. Learn why: bit.ly/3VZHEBR

Our partnership program is built with one goal: empowering your growth. Discover how we create exceptional value for both you and your customers. 

Learn why: bit.ly/3VZHEBR
CybelAngel (@cybelangel) 's Twitter Profile Photo

What exactly is Pikabot? Our latest blog breaks down how new malware loaders (that employ advanced anti-analysis techniques to evade detection) are causing headaches for companies globally and how to fight back: bit.ly/4qqxE2s

CybelAngel (@cybelangel) 's Twitter Profile Photo

Why is the F5 breach so significant? CISA have ordered agencies to disconnect any end-of-life devices, with an exception for mission-critical needs. Learn more: eu1.hubs.ly/H0p0s-60