Centraleyes’s Resource Center

Centraleyes Provides You With Various Resources
On the Different Industries And Services

Resources | News & Updates

Uber: MFA Bombing Attack

Uber: MFA Bombing Attack

Love may conquer all, but apparently MFA won’t. That pesky human factor again. Unmanaged risk surrounding the…
Twitter: Don’t Shut Down- Get Better!

Twitter: Don’t Shut Down- Get Better!

“Twitter was and continues to be one of the world’s most influential communications platforms.What happens on Twitter…
Education Hit Hard by Ransomware

Education Hit Hard by Ransomware

IT systems of the second largest school district in the U.S. were hit over the weekend by…
Third-party Services Breached for 2.5 million Loan Application Records!

Third-party Services Breached for 2.5 million Loan Application Records!

Both EdFinancial and the Oklahoma Student Loan Authority (OSLA) use technology services from Nelnet Servicing, including giving…
Credential Stuffing via Residential Proxy is on the Rise!

Credential Stuffing via Residential Proxy is on the Rise!

Last week, the FBI released a PIN (Private Industry Notification) on their Internet Crime Complaint Center (IC3).…
Meraki Firewall False Positive Triggers Microsoft 365 Outage

Meraki Firewall False Positive Triggers Microsoft 365 Outage

Did you experience trouble connecting to Exchange Online, Microsoft Teams, Outlook desktop clients, and OneDrive for Business…
Vendor Breach at Idaho Hospital

Vendor Breach at Idaho Hospital

St. Luke’s Health System in Boise, Idaho had to notify patients of a data breach that took…
CosmicStrand: Getting Down to the Root of the Problem

CosmicStrand: Getting Down to the Root of the Problem

How do you rid your computer of a rootkit that tunnels its way into the lowest levels…
4 “High Impact” Security Risks for Okta

4 “High Impact” Security Risks for Okta

Researchers at Authomize discovered 4 ‘high impact’ attack paths in Okta’s trusted management solution. Authomize clearly points…
Phishing for Credentials

Phishing for Credentials

A huge web of phishing attacks were performed on over 10,000 organizations! Tricking victims with fake Office…
Healthcare Data Dominoes 

Healthcare Data Dominoes 

Pre-July 4th weekend, Professional Finance Company (PFC USA) notified the patients of 657 country-wide healthcare providers of…
ToddyCat APT Aims High

ToddyCat APT Aims High

A new Advanced Persistent Threat (APT) actor has been spotted by Kaspersky cybersecurity researchers attempting attacks on…
Interpol Takes Down 2000 Social Engineers

Interpol Takes Down 2000 Social Engineers

Justice prevailed for the victims of worldwide social engineering scams as police from 76 countries worked together…
Centraleyes Announces the Addition of NIST 800-53 to its Expanding Framework Library

Centraleyes Announces the Addition of NIST 800-53 to its Expanding Framework Library

Centraleyes announces the addition of NIST 800-53 to its extensive framework library. NIST 800-53 was created to…
Centraleyes Adds the HECVAT Risk Assessment to its Expanding Framework Library

Centraleyes Adds the HECVAT Risk Assessment to its Expanding Framework Library

Centraleyes announces the addition of the Higher Education Community Vendor Assessment Toolkit (HECVAT) its extensive framework library.…
Centraleyes Maps the FFIEC to its Expanding Control Inventory

Centraleyes Maps the FFIEC to its Expanding Control Inventory

Centraleyes announces the addition of the Federal Financial Institutions Inspection Council (FFIEC) to its expanding framework library.…
Centraleyes Announces the Addition of NYDFS to its Expanding Framework Library

Centraleyes Announces the Addition of NYDFS to its Expanding Framework Library

Centraleyes announces the addition of the New York Department of Financial Services (NYDFS) Cybersecurity Regulation to its…
Centraleyes Maps PCI DSS to its Expanding Control Inventory

Centraleyes Maps PCI DSS to its Expanding Control Inventory

Centraleyes announces the addition of PCI DSS to its extensive framework library. The PCI DSS refers to…
Centraleyes Adds ISO 22301 to its Extensive Framework Library

Centraleyes Adds ISO 22301 to its Extensive Framework Library

Centraleyes announces the addition of the ISO 22301 Business Continuity Management Framework to its expanding framework library.…
Centraleyes Integrates the South African Protection of Personal Information Act with its  GRC Platform

Centraleyes Integrates the South African Protection of Personal Information Act with its GRC Platform

Centraleyes announces the addition of the new South African data privacy framework, the Protection of Personal Information…
Keep China Out: Patch Network Devices ASAP

Keep China Out: Patch Network Devices ASAP

The US government, specifically the NSA, FBI and CISA, have issued explicit warnings that hackers working for…
Centraleyes Adds the Secure Controls Framework to its Expanding Framework Library

Centraleyes Adds the Secure Controls Framework to its Expanding Framework Library

Centraleyes announces the addition of the Secure Controls Framework (SCF) to its expanding framework library. The Secure…
Hijacked Whatsapp Accounts- Protect Yourself!

Hijacked Whatsapp Accounts- Protect Yourself!

Sometimes the simplest scams are the most effective. Hackers managed to hijack victims’ Whatsapp accounts using mobile…
Pwn2Own- Successful Hacks

Pwn2Own- Successful Hacks

The annual Pwn2Own hacking contest, held in Vancouver, brought together security researchers from all over the world…
Centraleyes Integrates the Cyber Resilience Review Assessment to its next-gen GRC Platform

Centraleyes Integrates the Cyber Resilience Review Assessment to its next-gen GRC Platform

Centraleyes announces the addition of the Cyber Resilience Review (CRR) security assessment to its expanding framework library.…
The Critical F5 BIG-IP Vulnerability

The Critical F5 BIG-IP Vulnerability

A huge and critical vulnerability broke this week making headlines across cyber news sites. Why is this…
Centraleyes Announces the addition of the UAE IA Compliance Regulation to its Framework Library

Centraleyes Announces the addition of the UAE IA Compliance Regulation to its Framework Library

Centraleyes has recently announced the addition of the UAE IA compliance regulation to its expanding framework library.…
Centraleyes Adds ISO 27701 to its Framework Library

Centraleyes Adds ISO 27701 to its Framework Library

Centraleyes is excited to announce the addition of ISO 27701 security standard to its expanding framework library.…
Tricked at the Top: US Dept. of Defense

Tricked at the Top: US Dept. of Defense

Quite amazingly, a resident of California conducted a phishing operation and managed to successfully reroute government money…
Coca-Cola Breach: The Real Thing? 

Coca-Cola Breach: The Real Thing? 

The infamous Stormous ransomware gang claims to have breached Coca Cola’s servers, stealing 161 GB of data.…
Dwell-Time Down, Vigilance Up!

Dwell-Time Down, Vigilance Up!

Mandiant, the cybersecurity company to be acquired by Google later this year, have released their Mandiant M-Trends…
Centraleyes Integrates OWASP MASVS to its Framework Library

Centraleyes Integrates OWASP MASVS to its Framework Library

Centraleyes is happy to announce the addition of OWASP MASVS security standard to its expanding framework library.…
Centraleyes Identified as an Outperformer and a Challenger in the GigaOm GRC Radar Report

Centraleyes Identified as an Outperformer and a Challenger in the GigaOm GRC Radar Report

Centraleyes reaches yet another milestone, being identified as an Outperformer in the Challenger group of the 2022…
Centraleyes Partners with UAE-based distributor, Evanssion, to bring local presence in a key market as part of its global expansion plans  

Centraleyes Partners with UAE-based distributor, Evanssion, to bring local presence in a key market as part of its global expansion plans  

Centraleyes announces its latest strategic partnership with UAE-based, value-added distributor, Evanssion.Evanssion is now promoting the Centraleyes next…
Centraleyes Adds Insider Risk Mitigation Security Standard to its Framework Library

Centraleyes Adds Insider Risk Mitigation Security Standard to its Framework Library

Centraleyes is happy to announce the addition of the Insider Risk Mitigation security standard to its expanding…
Illegal Legal Hacks

Illegal Legal Hacks

Looks like Apple and meta will be undergoing some social engineering awareness training! Hackers posing as various…
Centraleyes Partners with Netsurit, Leading Global IT and Digital Transformation Managed Service Provider

Centraleyes Partners with Netsurit, Leading Global IT and Digital Transformation Managed Service Provider

Centraleyes announces its latest strategic partnership with New York-based, global IT and digital transformation managed service provider,…
You’ve Been Hacked: Roskomnadzor

You’ve Been Hacked: Roskomnadzor

Ukrainian anonymous hacking group, appropriately called Anonymous, announced over Twitter this week that they had breached and…
Using the Shed Light: Twitter vs. Russia

Using the Shed Light: Twitter vs. Russia

Defending and respecting the user’s voice is one of Twitter’s core values, according to their website. This…
Centraleyes Announces the Addition of PIPL its Framework Library

Centraleyes Announces the Addition of PIPL its Framework Library

Centraleyes is happy to announce the addition of the Personal Information Privacy Law (PIPL) of China to…
Next-gen Botnets

Next-gen Botnets

It’s the plague of frogs- but not as you know it. First spotted in August 2020, “FritzFrog”…
Centraleyes Updates Newly Released CMMC 2.0 in its Framework Library

Centraleyes Updates Newly Released CMMC 2.0 in its Framework Library

Centraleyes is excited to announce the upgrade of the new CMMC version 2.0 in its extensive framework…
Centraleyes Maps the Nevada Revised Statutes to its Control Inventory

Centraleyes Maps the Nevada Revised Statutes to its Control Inventory

Centraleyes is proud to announce the addition of the Nevada Revised Statutes (NRS), Chapter 603A to its…
Russian Hackers Infiltrate Ukrainian Organizations via Spear-Phishing

Russian Hackers Infiltrate Ukrainian Organizations via Spear-Phishing

The world is watching with bated breath as Russia lines up its army along the borders of…
Centraleyes Adds the Ransomware Readiness Assessment Model to its Framework Library

Centraleyes Adds the Ransomware Readiness Assessment Model to its Framework Library

Centraleyes is excited to announce the addition of the Ransomware Readiness Assessment (RRA) Model to its expanding…
The British are Coming- with SOX!

The British are Coming- with SOX!

The UK’s corporate landscape begins the 2-year countdown to prepare for new governance, audit and reporting requirement:…
RCE Alert: Managing Vulnerabilities

RCE Alert: Managing Vulnerabilities

Two critical bugs discovered in Control Web Panel means that an unauthenticated attacker can gain remote code…
When Imitation Isn’t the Best Form of Flattery

When Imitation Isn’t the Best Form of Flattery

There is an exclusive top ten list that NO company wants to find themselves on: the Top…
Ransomware Shuts Down US Prison

Ransomware Shuts Down US Prison

Ransomware is always consequential to the company experiencing the attack, but in this case, the staff and…
Y2K22 Surprise!

Y2K22 Surprise!

Microsoft Exchange users were surprised when emails could not be delivered on January 1st, 2022.  MEServers from…
DuckDuckGo For It!

DuckDuckGo For It!

Everyone is talking about DuckDuckGo, the search engine that has experienced enormous growth in 2021 and performs…
Securing from the Inside Out

Securing from the Inside Out

Take your mind off of Log4j momentarily and consider a vastly different vulnerability. Garret Metal detectors, a…
Demystifying The Internet Meltdown: Log4j

Demystifying The Internet Meltdown: Log4j

The Log4Shell bug has taken the world by storm putting some of the biggest companies at risk…
Patching Backward to Move Forward: Top 6 Tips for Patch Management

Patching Backward to Move Forward: Top 6 Tips for Patch Management

These patches were released months ago, so how can threat actors continue to exploit the same vulnerabilities…
Phishing From Within

Phishing From Within

IKEA has been in the limelight this week as the target of a creative phishing campaign. Internal…
Critical Infrastructure targets take extra precautions this Thanksgiving

Critical Infrastructure targets take extra precautions this Thanksgiving

Another holiday weekend, another reason to be cyber vigilant! CISA and the FBI released a warning ahead…
300+ WordPress Sites Held Ransom By Fake Ransomware

300+ WordPress Sites Held Ransom By Fake Ransomware

Over 300 WordPress sites were attacked with fake encryption notices, informing them they must pay 0.1 bitcoin…
At Least Nine Global Entities Across Critical Sectors Have Been Exploited Via a Known CVE

At Least Nine Global Entities Across Critical Sectors Have Been Exploited Via a Known CVE

Back in September, the Zoho MachineEngine ADSelfService Plus reported a critical vulnerability that would allow remote attackers…
Your Company is Under Intense Pressure. And That’s Exactly When They’ll Strike.

Your Company is Under Intense Pressure. And That’s Exactly When They’ll Strike.

Ransomware actors are choosing their targets based on time-sensitive financial events, like mergers or acquisitions and ends…
You Haven’t Heard Of Groove Ransomware? Let’s Hope It Stays That Way

You Haven’t Heard Of Groove Ransomware? Let’s Hope It Stays That Way

Not everyone was happy with the law enforcement’s take down of the REvil ransomware group last week.…
Claiming Unemployment? Watch Out!

Claiming Unemployment? Watch Out!

The FBI put out a warning this week of spoofed websites offering unemployment benefits that harvest sensitive…
Lightning Never Strikes Twice? Ransomware Does

Lightning Never Strikes Twice? Ransomware Does

Back in September, leading medical technology company Olympus was hit with a ransomware attack on its EMEA’s…
“Do Your Part… Be Cyber Smart!” CISA

“Do Your Part… Be Cyber Smart!” CISA

Cybersecurity Awareness is at an all-time high and has never been more meaningful! As the NCSA kicks…
REvil Ransomware Returns And Continues To Attack And Leak Data

REvil Ransomware Returns And Continues To Attack And Leak Data

Guess who’s back in town? After wildly exploiting the zero-day Kaseya vulnerability back in July, and demanding…
CISA and The FBI Reveal An Interesting Warning Regarding Ransomware

CISA and The FBI Reveal An Interesting Warning Regarding Ransomware

Based on data from recent actor tactics, techniques, and procedures (TTPs), they report that ransomware attacks are…
When CISA Releases An Announcement Tagged As Urgent, You Know It's Urgent

When CISA Releases An Announcement Tagged As Urgent, You Know It's Urgent

Microsoft released a security update in May 2021 revealing three actively exploited ProxyShell vulnerabilities on Microsoft Exchange…
Centraleyes Announces the Addition of the NIST 800-82 Framework to its Framework Library

Centraleyes Announces the Addition of the NIST 800-82 Framework to its Framework Library

Centraleyes is proud to announce the addition of the NIST 800-82 Industrial Control Systems Cybersecurity Framework to…
Centraleyes is Featured in the Exclusive STAR Registry as an Official CSA Vendor

Centraleyes is Featured in the Exclusive STAR Registry as an Official CSA Vendor

Centraleyes is proud to announce that the company is an official CSA STAR vendor, featured in the…
Centraleyes Maps the PSD2 Regulation to its Growing Framework Library

Centraleyes Maps the PSD2 Regulation to its Growing Framework Library

Centraleyes is proud to announce the addition of the PSD2 regulation to the growing framework library. The…
Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to its Board of Directors

Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to its Board of Directors

Dan Burns, co-founder and former CEO of Optiv, one the largest SSI’s in the world, brings over…
Centraleyes Adds the FREPA Data Privacy Standard to its Framework Library

Centraleyes Adds the FREPA Data Privacy Standard to its Framework Library

Centraleyes is excited to announce the latest addition to the Centraleyes framework library, the FERPA Data Privacy…
Centraleyes Announces the Addition of FedRAMP to its Framework Library

Centraleyes Announces the Addition of FedRAMP to its Framework Library

Centraleyes is proud to announce the addition of FedRAMP to the growing framework library. FedRAMP is one…
Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure

Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure

Online PR News – 04-May-2021 – New York – Centraleyes is excited to announce its latest strategic…
Centraleyes Adds the Recent Privacy Framework by NIST to its Framework Library

Centraleyes Adds the Recent Privacy Framework by NIST to its Framework Library

Centraleyes is strengthening its framework library with a new privacy framework recently published by NIST. The National…
Centraleyes Disrupts Risk Management With the First Ever Automated Risk Register

Centraleyes Disrupts Risk Management With the First Ever Automated Risk Register

Centraleyes has released its latest platform update, which included a one of its kind capability – an…
Centraleyes Maps the CIS Top 20 Critical Controls to its Framework Library

Centraleyes Maps the CIS Top 20 Critical Controls to its Framework Library

Centraleyes continues to expand its framework library, with the latest addition of the CIS Top 20 Critical…
Centraleyes Partners with Chile-based, Tech Services Provider, Policomp

Centraleyes Partners with Chile-based, Tech Services Provider, Policomp

Online PR News – 05-March-2021 – Tel Aviv – Centraleyes is proud to announce its strategic expansion into…
Centraleyes Enhances its Framework Library with INCD Guidelines for Stronger Cyber Resilience

Centraleyes Enhances its Framework Library with INCD Guidelines for Stronger Cyber Resilience

Centraleyes is strengthening its framework library with yet another risk guideline by the INCD. The Israel National…
Energy Industry Dedicated NERC CIP Standard - Now in the Centraleyes Framework Library

Energy Industry Dedicated NERC CIP Standard - Now in the Centraleyes Framework Library

Centraleyes continues to expand its framework library coverage by adding NERC CIP, giving the energy industry a…
Zero Trust Framework - New Addition to the Centraleyes Framework Library

Zero Trust Framework - New Addition to the Centraleyes Framework Library

Centraleyes has added another key risk framework to its extensive framework library – the NIST SP 800-207…
Centraleyes Expands its Framework Library With NIST 800-171

Centraleyes Expands its Framework Library With NIST 800-171

Centraleyes is proud to announce the addition of NIST 800-171 to its library of frameworks and standards…
Centraleyes Selected as Top 10 Cyber Security Startups

Centraleyes Selected as Top 10 Cyber Security Startups

Centraleyes is extremely proud to announce that it has been selected as one of the top 10…
Centraleyes Official Brand Video Released

Centraleyes Official Brand Video Released

Centraleyes is proud to present our official brand video! The video captures our brand’s optimistic spirit in…
Centraleyes Partners with the Cyber Alliance to Protect Healthcare Systems

Centraleyes Partners with the Cyber Alliance to Protect Healthcare Systems

Online PR News – 21-December-2020 – Tel Aviv – SaaS-based cyber risk platform provider Centraleyes has partnered…
CyGov Appointed Michelle Offir Geveye as Marketing Lead

CyGov Appointed Michelle Offir Geveye as Marketing Lead

CyGov has announced the appointment of Michelle Offir Geveye as the new Marketing Lead for the company…
Trevor Failor Named Head Of Sales At CyGov

Trevor Failor Named Head Of Sales At CyGov

Bringing two decades of experience in Cyber Security and SaaS sales, Trevor Failor has been appointed as…
CyGov Launches The Centraleyes™ Brand— Superior Platform Automating Inputs, Data & Visualizing Risks

CyGov Launches The Centraleyes™ Brand— Superior Platform Automating Inputs, Data & Visualizing Risks

CyGov has re-branded its cutting-edge cyber risk management platform that gives an unparalleled understanding of digital and…
Cygov Continues Upward Growth - Oleg Movchan Joins Board of Directors

Cygov Continues Upward Growth - Oleg Movchan Joins Board of Directors

Oleg Movchan, a capital markets and risk management veteran, has joined the company’s Board of Directors. 04-June-2020…
Jimmy Sanders, Head of Info Security at Netflix DVD, Joins Cygov Advisory Board

Jimmy Sanders, Head of Info Security at Netflix DVD, Joins Cygov Advisory Board

Sanders, one of the foremost authorities on contemporary cyber security challenges, is the latest high-profile addition to…
Cygov Agrees Partnership With R3, Targeting Federal Suppliers

Cygov Agrees Partnership With R3, Targeting Federal Suppliers

The agreement boosts companies seeking Cybersecurity Maturity Model Certification (CMMC) certification, soon required by all Department of…
Cygov Announces Strategic Partnership with Top 200 MSSP Cybriant

Cygov Announces Strategic Partnership with Top 200 MSSP Cybriant

Online PR News – 04-May-2020 – Tel Aviv – SaaS-based cyber risk platform provider CyGov announced today…
CyGov Releases Higher Education White Paper – Streamlining Risk & Reducing Workload

CyGov Releases Higher Education White Paper – Streamlining Risk & Reducing Workload

Digital technology has revolutionized the operations, administration and student-facing aspects of higher education. As universities, schools and…
CyGov and HIC Network Security Announce a Strategic Resell Partnership

CyGov and HIC Network Security Announce a Strategic Resell Partnership

CyGov is proud to announce that HIC Network Security Solutions, The Network Security Reseller, has become a…
CyGov Releases Free Cyber Resilience Resource for Businesses re-Deploying Remotely

CyGov Releases Free Cyber Resilience Resource for Businesses re-Deploying Remotely

1 April (Tel Aviv) – SaaS-based cyber risk platform provider CyGov announced today that in light of…
New From CyGov - Creation of a Proprietary Cyber Resilience Resource Center

New From CyGov - Creation of a Proprietary Cyber Resilience Resource Center

In response to the epic Coronavirus threat, CyGov has created a unique cyber risk resilience management resource…
CyGov Solution Curbs Growing Risk of Supply Chain Breaches

CyGov Solution Curbs Growing Risk of Supply Chain Breaches

More than ever before, companies of all sizes are at risk of a cyber breach via their…
Eric Moseman Named VP Sales at CyGov

Eric Moseman Named VP Sales at CyGov

CyGov is excited to announce that Eric Moseman has been appointed Vice President of Sales. He will…
Skip to content