Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

Articles

How the Internet is getting safer thanks to cloud-based services

4th September 20194th September 2019 peterglock

No reader will be surprised to learn that cloud service adoption has been skyrocketing in the last few years. According to the Cisco Global Cloud Index: Forecast and Methodology, 2016-2021 […]

 Articles  CybelAngel

UX designers can join the ranks of cybersecurity heroes

14th August 201914th August 2019 peterglock

At first glance, an enjoyable user experience (UX) and a strong cybersecurity posture don’t seem to go hand in hand. UX is all about designing a smooth workflow for users […]

 Articles  CybelAngel

You track projects with Trello, but are you keeping track of your sensitive data?

15th July 201915th July 2019 peterglock

The CybelAngel platform detects data leaks on a variety of sharing communities, including GitHub, paste sites, and importantly, Trello. Trello describes itself as an “easy, free, flexible, and visual way […]

 Articles  CybelAngel

Being the best at securing your network is not enough: the case of Estonia

9th July 20199th July 2019 peterglock

When it comes to digitalization and cybersecurity, there is one country in this world that is several steps ahead of all others: Estonia. At the collapse of the USSR, Estonia […]

 Articles  CybelAngel

Digital signatures are the cybersecurity vulnerability you need to stop ignoring

8th July 20198th July 2019 peterglock

Enterprises’ employees and third parties exchange an abundance of confidential documents, both internally and externally, and through a variety of means, including email and file-sharing platforms. These employees and third […]

 Articles  CybelAngel

Rsync: so many exposed servers, so little time

8th July 2019 peterglock

Let us start with a bit of background, shall we? Rsync is a widely used file copying tool, that can operate either locally or between remote systems, through a remote […]

 Articles  CybelAngel

Why higher education institutions are becoming threat actor gold mines

8th July 2019 peterglock

In April 2019, the Georgia Institute of Technology was affected by a major cyber attack. An unknown hacker accessed a central Georgia Tech database containing names, addresses, social security numbers […]

 Articles  CybelAngel

Emotet malware: wild, wild trojan

8th July 20198th July 2019 peterglock

Here at CybelAngel, we’ve spent a significant amount of R&D effort focused on protecting our customers from compromises relating to exposed data found on Pastebin and other paste sites. But […]

 Articles  CybelAngel

Recent Posts

  • This phishing scam left thousands of stolen passwords exposed through Google search
  • Malware reportedly found on laptops given to children in England
  • Malwarebytes Hit by SolarWinds Hackers
  • Should I be worried about MFA-bypassing pass-the-cookie attacks?
  • Cyber security labelling scheme expanded to include all smart home devices

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

All content (c) Glock Enterprises Ltd 2020

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

4 hours ago

Glock Enterprises Ltd
This phishing scam left thousands of stolen passwords exposed through Google searchI'm sure we've all received a notification email telling us that there's a scan waiting. This particular email sent via compromised Wordpress sites (as is often the case) contains an extra surprise and might have led to your users' details being available to anyone with the necessary Google-foo skills...: Operators of a phishing campaign targeting the construction and energy sectors exposed credentials stolen in attacks that were publicly viewable with a simple Google search.On Thursday, Check Point Research published a blog post describing the campaign, in which stolen information was dumped on compromised WordPress domains.The recent phishing attack began with one of several fraudulent email templates and would mimic Xerox/Xeros scan notifications including a target company employee's name or title in the subject line.[...]Original article buff.ly/3c2pk59 ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes