Centraleyes Resource Center

Resources | News & Updates

CVE Program Gets a Lifeline—But the Real Story Is Just Starting

CVE Program Gets a Lifeline—But the Real Story Is Just Starting

Last month, the cybersecurity world got a wake-up call: the backbone of global vulnerability tracking—the CVE program—almost…
Securing AI Agents: A New Frontier in Cybersecurity

Securing AI Agents: A New Frontier in Cybersecurity

As RSA Conference 2025 just wrapped up, one thing’s clear: AI agents are everywhere—and apparently, they need…
Spain's Massive Power Outage: A Wake-Up Call for Cybersecurity and Grid Resilience

Spain's Massive Power Outage: A Wake-Up Call for Cybersecurity and Grid Resilience

On April 28, 2025, Spain, Portugal, and parts of France experienced an unprecedented power outage, leaving millions…
Mandiant’s M-Trends 2025: Edge Devices Are Now Prime Targets

Mandiant’s M-Trends 2025: Edge Devices Are Now Prime Targets

Key Takeaways from Mandiant’s M-Trends 2025 There’s a certain irony that’s hard to ignore in Mandiant’s latest…
Who’s Snooping on Go1 Robot Dogs?

Who’s Snooping on Go1 Robot Dogs?

Unitree Robotics, a China-based manufacturer, has been caught up in a major security scare. Two researchers uncovered…
Deleting DNA Data From 23andMe

Deleting DNA Data From 23andMe

​23andMe, the prominent consumer genetic testing company, filed for Chapter 11 bankruptcy on March 23, 2025, due…
12 Hours or Else: Hong Kong’s Cybersecurity Explained

12 Hours or Else: Hong Kong’s Cybersecurity Explained

Hong Kong has officially enacted a new cybersecurity law aimed at securing critical infrastructure, a move that…
Chainguard “FIPS” Apache Cassandra 

Chainguard “FIPS” Apache Cassandra 

Chainguard modified Cassandra so organizations needing FIPS-approved encryption can finally use it—without risky workarounds or costly custom…
The Cost of Compliance Theater: DoD Contractor Pays $11.2M for False Cybersecurity Certifications

The Cost of Compliance Theater: DoD Contractor Pays $11.2M for False Cybersecurity Certifications

Cybersecurity compliance isn’t just a box to check—it’s a commitment to protecting sensitive data. But for Health…
Federal Agencies Face Hurdles in Zero-Trust Implementation

Federal Agencies Face Hurdles in Zero-Trust Implementation

The push for zero trust architecture is intensifying, but federal agencies are encountering significant challenges in making…
Identity Security Just Got a Major Upgrade

Identity Security Just Got a Major Upgrade

CyberArk, a leader in privileged access management, has announced the acquisition of Zilla Security, a cloud-native identity…
Security Flaw Found in Patient Monitors: No Fix Yet

Security Flaw Found in Patient Monitors: No Fix Yet

In a concerning development for healthcare cybersecurity, the FDA and CISA have issued urgent advisories about two…
PlugX Malware Network Dismantled

PlugX Malware Network Dismantled

A coordinated effort by U.S. and international law enforcement agencies has dismantled the PlugX malware network, removing…
Patch Now or Pay Later: Android 2025 Update

Patch Now or Pay Later: Android 2025 Update

Android’s first security update of the year just dropped, tackling five critical vulnerabilities that could let attackers…
Netflix Fined €4.75 Million Over GDPR Transparency Issues

Netflix Fined €4.75 Million Over GDPR Transparency Issues

Netflix has been hit with a €4.75 million fine by the Dutch Data Protection Authority (DPA). The…
Did Google Just Change the Rules on Privacy in Healthcare?

Did Google Just Change the Rules on Privacy in Healthcare?

This week, the UK Court of Appeal delivered its verdict: Google’s 2015 data-sharing deal with the Royal…
Salt Typhoon Campaign: A Wake-Up Call for U.S. Telecoms and National Security

Salt Typhoon Campaign: A Wake-Up Call for U.S. Telecoms and National Security

A disturbing new cybersecurity incident has raised alarms across U.S. telecoms, with revelations this week about a…
When Your Coffee Break Faces a Cyber Threat

When Your Coffee Break Faces a Cyber Threat

What happens when the backbone of global operations—supply chain software—comes under attack? Starbucks and leading UK supermarkets…
CISOs, It’s Time to Insure Your Role—Literally

CISOs, It’s Time to Insure Your Role—Literally

Traditionally, insurance policies like Directors and Officers (D&O) liability insurance didn’t cover the personal liabilities of CISOs.…
Telecom, Airline, and Utilities Move into Highest Cyber-Risk Category, Says Moody’s

Telecom, Airline, and Utilities Move into Highest Cyber-Risk Category, Says Moody’s

Telecommunications, airlines, and utilities are now in the “highest cyber-risk” category, according to Moody’s latest cyber risk…
Under the Mask of Copyright: How Phishing Attacks Are Evolving

Under the Mask of Copyright: How Phishing Attacks Are Evolving

Fake copyright infringement notices are sweeping across inboxes globally, hitting hundreds of companies with a new and…
New Indicators of Compromise Revealed for Critical FortiManager Vulnerability

New Indicators of Compromise Revealed for Critical FortiManager Vulnerability

Fortinet has alerted customers to four new indicators of compromise (IoCs) related to a widely exploited zero-day…
How Attackers are Using EDRSilencer to Fly Under the Radar

How Attackers are Using EDRSilencer to Fly Under the Radar

Threat actors are now leveraging the open-source EDRSilencer tool to undermine endpoint detection and response (EDR) solutions,…
Operation Token Mirrors

Operation Token Mirrors

In a groundbreaking operation known as Operation Token Mirrors, the FBI launched a fake cryptocurrency company, NexFundAI,…
OpenAI Disrupts 20+ Malicious Campaigns Using AI for Cybercrime and Disinformation

OpenAI Disrupts 20+ Malicious Campaigns Using AI for Cybercrime and Disinformation

In a bold move to combat the growing threat of AI-driven cybercrime, OpenAI recently announced the disruption…
Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security 

Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security 

In the wake of the TikTok controversy, another Chinese tech giant is under scrutiny—Temu. This online marketplace…
Hackers Target Cybersecurity Job Seekers

Hackers Target Cybersecurity Job Seekers

For over a year, North Korean state-sponsored hackers, specifically the Lazarus Group, have been targeting Python developers…
UK Data Centres Crowned Critical National Infrastructure

UK Data Centres Crowned Critical National Infrastructure

The UK government has elevated data centres to the status of “Critical National Infrastructure” (CNI), putting them…
White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance

White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance

In April, the tech world faced a concerning incident involving XZ Utils, a widely used open-source compression…
Massive Data Breach Exposes Personal Information of Billions

Massive Data Breach Exposes Personal Information of Billions

A data breach at National Public Data, a relatively obscure but widely connected company, has exposed 272…
Skip to content