In May 2023, a zero-day exploit in Progress Software’s MOVEit Transfer exploded into one of the largest supply chain breaches on record. CISA later estimated that more than 3000 US organizations and 8000 worldwide were affected, from banks and insurers to airlines and federal agencies. But for many, the first sign of trouble was seeing […] The post CVE-2023-34362 Explained: Inside the Zero-Day that Fueled Global Data Theft appeared first on CybelAngel.| CybelAngel
This blog is a summary of our latest threat landscape report, “Latest Cyber Threat Dynamics in the Pharmaceutical Sector.” Interested in reading the full report? Get in touch with us to access this content. What’s happening in pharmaceutical cybersecurity? The pharmaceutical sector has become a high-priority target for a range of cyber adversaries in 2025. […] The post Reviewing Pharmaceutical Threats in 2025 [Threat Note] appeared first on CybelAngel.| CybelAngel
Cyberattacks are happening almost daily across the globe. Analysts report the cost of cybercrime to reach $16 trillion by 2029—from stolen funds to lost productivity. Cybercrime doesn‘t just affect a business’s reputation, but also poses a risk to critical civil infrastructure and employee data. More than ever, organizations need to take a proactive approach to […] The post Knowing the Enemy: Why You Need to Map Adversary Infrastructure appeared first on CybelAngel.| CybelAngel
Discover how LummaC2 steals credentials, evades detection, and fuels breaches… and how CybelAngel helps stop exposures in real time.| CybelAngel
This blog is a summary of our latest threat landscape report, “Latest Cyber Threat Dynamics in Aerospace & Defense.” Interested in reading the full report? What threats are trending within the aerospace and defense cybersecurity? The Aerospace and Defense (A&D) sector has become a primary battleground for geopolitical cyber warfare. Between September 2024 and September […] The post Aerospace & Defense: 2024-2025 Cyber Threat Landscape [Threat Note] appeared first on CybelAngel.| CybelAngel
Threat groups deployed web shells in 35% of incidents during Q4 2024. That’s more than triple the rate of the previous quarter. Once it’s on a compromised web server, a web shell gives attackers long-term persistence, the ability to move laterally, and direct access to sensitive data. Let’s dissect a classic PHP web shell to […] The post What is a Web Shell? Here’s Everything You Need to Know appeared first on CybelAngel.| CybelAngel
This blog is a summary of our analysis of recent messages from the threat group Scattered Spider. Interested in our full threat intelligence reporting? Get in touch with us to access this content. What is Scattered Spider? Scattered Spider is a highly adaptive cybercriminal group known for targeting large companies and their IT help desks. […] The post Decoding Scattered Spider’s Latest Messaging [Flash Report] appeared first on CybelAngel.| CybelAngel
What do you understand when it comes to the phrase, “Google Dorks”? Think of Google’s index as the most detailed map of the digital world ever created. It charts everything from bustling public squares to forgotten back alleys. Most of us use it to find directions, but some know how to read it differently. They […] The post Understanding Google Dorks [Plus risk use cases] appeared first on CybelAngel.| CybelAngel
Think of every major cyberattack as a heist. Criminals move fast, covering their tracks, while investigators race to follow the trail of digital evidence. It’s a game of cat and mouse that now plays out across networks, devices, and even cryptocurrency wallets. Cyber crime investigations are how law enforcement and cybersecurity professionals fight back, exposing […] The post Cyber Crime Investigation: Major Cases of 2024–2025 appeared first on CybelAngel.| CybelAngel
This blog is a summary of our latest threat note report “Cybersecurity in Times of Conflict: Insights from the 2025 India-Pakistan Standoff.” Interested in reading the full report? Get in touch with us to access this content. What happened during the standoff? The military and political escalation between India and Pakistan from April 22nd to […] The post An Update on the India-Pakistan Cyber Conflict: [Threat Note] appeared first on CybelAngel.| CybelAngel
Discover how to create a structured OSINT framework, from data collection to analysis,for scalable, ethical, and actionable intelligence.| CybelAngel
Cyberattacks against airlines and airports are on the rise. Cancelled flights and delayed online bookings are just the tip of the iceberg.| CybelAngel
Discover how to create a structured OSINT framework, from data collection to analysis,for scalable, ethical, and actionable intelligence.| CybelAngel
A breakdown of the top API threats in 2025 so far, and what they reveal about access control, visibility, and protecting sensitive data.| CybelAngel
Learn how brand impersonation campaigns unfold and what security teams can do to detect threats early. (Spoiler: Brand monitoring)| CybelAngel