CybelAngel Profile Banner
CybelAngel Profile
CybelAngel

@CybelAngel

Followers
3K
Following
3K
Media
3K
Statuses
5K

We are the leading #digitalrisk protection platform for enterprises, providing unrivaled #cybersecurity threat intelligence and #databreach detection.

New York, Paris, London
Joined January 2013
Don't wanna be here? Send us removal request.
@CybelAngel
CybelAngel
11 hours
Dive deeper into how our partnership program can provide unmatched advantages for you and your customers. Unlock why: https://t.co/NmMAqSMf34
0
0
0
@CybelAngel
CybelAngel
2 days
We all know that stolen credentials remain a primary vector for data breaches, but are you aware that the single most effective countermeasure is multi-factor authentication (MFA)?
0
0
0
@CybelAngel
CybelAngel
3 days
Three ransomware brands, LockBit, Qilin, and DragonForce, have joined forces. Instead of fighting for market share, these ransomware groups are pooling their resources, from malware and infrastructure to negotiation playbooks. So, how might it affect you:
0
0
0
@CybelAngel
CybelAngel
13 days
Executive doxxing is a growing, complex threat vector. As personal and corporate data boundaries blur, leaders face new risks. We’ve compiled a set of practical recommendations. Read the guide:
0
0
1
@CybelAngel
CybelAngel
15 days
Today, we released our latest eBook, the Essential CISO Primer. Use it to: ✔️ Translate "meaningless metrics" into "business risk". ✔️ Consolidate your stack and manage "integration debt" ✔️ Navigate complex compliance regulations Now available: https://t.co/piPlolqY08
0
0
1
@CybelAngel
CybelAngel
22 days
Why is the F5 breach so significant? CISA have ordered agencies to disconnect any end-of-life devices, with an exception for mission-critical needs. Learn more:
cybersecuritydive.com
The federal government is scrambling to determine if any agencies have been hacked.
0
0
0
@CybelAngel
CybelAngel
23 days
What exactly is Pikabot? Our latest blog breaks down how new malware loaders (that employ advanced anti-analysis techniques to evade detection) are causing headaches for companies globally and how to fight back:
0
0
0
@CybelAngel
CybelAngel
28 days
Our partnership program is built with one goal: empowering your growth. Discover how we create exceptional value for both you and your customers. Learn why: https://t.co/G6j7Mnnm9z
0
0
0
@CybelAngel
CybelAngel
29 days
China-aligned APT group UTA0388 is now using OpenAI’s ChatGPT to generate malware and spear-phishing emails. The AI helps create obfuscated code and more convincing phishing content, making attacks faster and harder to detect. Read more:
Tweet card summary image
cybersecuritynews.com
A China-aligned advanced persistent threat (APT) group is actively leveraging OpenAI's ChatGPT platform to develop malware and craft sophisticated spear-phishing emails for its global campaigns.
0
0
0
@CybelAngel
CybelAngel
1 month
Infostealer malware isn't just a threat; it's a business killer. They steal your uptime, your revenue, and your customers' confidence. Find out more about one of the hardest to keep down, LummaC2 Stealer:
0
0
1
@CybelAngel
CybelAngel
2 months
Shadow IT? Unsanctioned, forgotten, or vulnerable external assets are invisible to you, but not to attackers waiting in the wings Protect your attack surface for complete peace of mind: https://t.co/mWVNTzIUQ6
0
0
0
@CybelAngel
CybelAngel
2 months
Ransomware and targeted supply chain breaches are putting aerospace & defense security teams to the test! Are your current controls matching the pace of emerging threats and new compliance demands? Check out our latest threat report:
0
0
0
@CybelAngel
CybelAngel
2 months
This is your Monday reminder to immediately apply patches if you are using SonicWall firewalls. The Akira ransomware group is actively attacking SonicWall firewalls by exploiting a known, year-old vulnerability (CVE-2024-40766:
0
0
0
@CybelAngel
CybelAngel
2 months
Malware isn’t just a nuisance. It’s a moving target. One day, it’s a fake invoice in your inbox. Next, it’s ransomware that’s locked down your entire network. So, what exactly are the top 20 types?
0
0
0
@CybelAngel
CybelAngel
2 months
Conducting cyber due diligence during M&A is crucial to protect your investment. But what happens after the deal? CybelAngel not only provides comprehensive assessments of a target's attack surface but also integrates seamlessly with your existing stack: https://t.co/KAistWfjbx
0
0
0
@CybelAngel
CybelAngel
2 months
Did you know that a recent Chinese cyberattack, called "Salt Typhoon," may have stolen data from almost every American? This yearslong, coordinated assault infiltrated major telecommunications companies, and the stolen data could have big implications:
Tweet card summary image
nytimes.com
Information collected during the yearslong Salt Typhoon attack could allow Beijing’s intelligence services to track targets from the United States and dozens of other countries.
0
1
0
@CybelAngel
CybelAngel
2 months
We're proud to announce that CybelAngel has allocated part of its apprenticeship tax to @@cravate_la, a recognized public interest association working since 2012 for equal employment opportunities. Find out more:
Tweet card summary image
lacravatesolidaire.org
La Cravate Solidaire est un réseau d’associations qui lutte quotidiennement contre les discriminations, notamment celles liées à l’embauche.
0
0
0
@CybelAngel
CybelAngel
2 months
Every wondered why you need an OSINT framework? With back to school season in full swing, find out everything else you need to know, only in our OSINT done right guide:
0
0
0
@CybelAngel
CybelAngel
3 months
Researchers have discovered PromptLock, the first ransomware to use an AI model for its attacks. The malware uses hard-coded prompts to instruct an LLM to dynamically generate malicious Lua scripts, which are then used to steal and encrypt data:
Tweet card summary image
bleepingcomputer.com
Threat researchers discovered the first AI-powered ransomware, called PromptLock, that uses Lua scripts to steal and encrypt data on Windows, macOS, and Linux systems.
0
0
0
@CybelAngel
CybelAngel
3 months
Fraudsters are leveraging AI to create highly convincing synthetic identities, bypassing traditional KYC and biometric checks. With no "real" victim to report, this fraud silently builds credit, making detection a challenge for financial institutions:
0
0
0