There‘s a new ransomware player on the scene. PLAY ransomware has wreaked havoc on organizations across the globe, resulting in major financial loss. Since the group‘s inception in 2022, PLAY has performed as many as 170 cyber attacks in a single month. Let‘s see how PLAY ransomware is exploiting vulnerabilities to perform attacks and how […] The post PLAY Ransomware: The Double-Extortion Gang appeared first on CybelAngel.| CybelAngel
Discover how to create a structured OSINT framework, from data collection to analysis,for scalable, ethical, and actionable intelligence.| CybelAngel
A breakdown of the top API threats in 2025 so far, and what they reveal about access control, visibility, and protecting sensitive data.| CybelAngel
Learn how brand impersonation campaigns unfold and what security teams can do to detect threats early. (Spoiler: Brand monitoring)| CybelAngel
Learn how industrial-scale phishing kits use domain impersonation to scam people, plus defense strategies and takedown success stories.| CybelAngel
Intel, strategy, victims...The Akira ransomware gang leaks claim 6-30+ victims per month. Here is a playbook to side-step their notable force.| CybelAngel
Harvest, a French fintech company, was the target of a ransomware attack carried out by the emerging group Run Some Wares. Find out more.| CybelAngel
Profiling top ransomware actors: Black Basta, Cl0p, Akira. Know your enemy's unique TTPs, only via our brand new playbook.| CybelAngel
For years, data encryption was seen as a digital fortress. That assumption is now being shattered by the emergence of quantum computing. “Harvest now, decrypt later” or HNDL attacks are becoming a major cybersecurity concern. So, what exactly do they entail? This tactic, also known as “store now, decrypt later” or “retrospective decryption,” involves cyber […] The post Are you ready for Harvest Now, Decrypt Later (HNDL) attacks? appeared first on CybelAngel.| CybelAngel
A new threat has appeared on the horizon in 2025. Qilin ransomware, a rising ransomware-as-a-service provider, with a total of 72 victims in April 2025 alone. Qilin enables affiliates to launch highly customizable attacks across various sectors, including healthcare, manufacturing, and government services. How can you protect yourself against Qilin attacks? Let‘s dive deep into […] The post Inside Qilin: The Double Extortion Ransomware Threat appeared first on CybelAngel.| CybelAngel
You wouldn’t leave your branch vault propped open overnight. But every week, banks and financial firms do exactly that (just digitally). A single MongoDB misconfiguration or stray public database exposure can unlock more than customer data. It can open a backdoor for hackers to compromise routers, security cameras, or smart ATMs. It’s the first domino […] The post How One Leaky Database Becomes an IoT Botnet: Inside the Mirai Attack Chain appeared first on CybelAngel.| CybelAngel
The construction industry is embracing artificial intelligence and automation to improve efficiency, but what about the risks? Recently, the Architecture, Engineering, and Construction (AEC) industry has been targeted with cyberattacks aimed at extorting funds and disrupting business operations. Unfortunately, construction companies are not prepared for cyberattacks, according to a new survey. Between 2019-2020, data breaches […] The post What do Rising Construction Industry Attacks Mean? a...| CybelAngel
Discover how DragonForce has evolved from hacktivist roots to a global ransomware threat, and see what cybersecurity teams can do.| CybelAngel
Learn how external threat intelligence can equip your team with the security measures to stay one step ahead of malicious actors.| CybelAngel
With threat actors hyper-focused on enterprises, you must protect your critical data both inside & outside your company’s walls. Read more.| CybelAngel