Centraleyes Resource Center

Resources | News & Updates

Chainguard “FIPS” Apache Cassandra 

Chainguard “FIPS” Apache Cassandra 

Chainguard modified Cassandra so organizations needing FIPS-approved encryption can finally use it—without risky workarounds or costly custom…
The Cost of Compliance Theater: DoD Contractor Pays $11.2M for False Cybersecurity Certifications

The Cost of Compliance Theater: DoD Contractor Pays $11.2M for False Cybersecurity Certifications

Cybersecurity compliance isn’t just a box to check—it’s a commitment to protecting sensitive data. But for Health…
Federal Agencies Face Hurdles in Zero-Trust Implementation

Federal Agencies Face Hurdles in Zero-Trust Implementation

The push for zero trust architecture is intensifying, but federal agencies are encountering significant challenges in making…
Identity Security Just Got a Major Upgrade

Identity Security Just Got a Major Upgrade

CyberArk, a leader in privileged access management, has announced the acquisition of Zilla Security, a cloud-native identity…
Security Flaw Found in Patient Monitors: No Fix Yet

Security Flaw Found in Patient Monitors: No Fix Yet

In a concerning development for healthcare cybersecurity, the FDA and CISA have issued urgent advisories about two…
PlugX Malware Network Dismantled

PlugX Malware Network Dismantled

A coordinated effort by U.S. and international law enforcement agencies has dismantled the PlugX malware network, removing…
Patch Now or Pay Later: Android 2025 Update

Patch Now or Pay Later: Android 2025 Update

Android’s first security update of the year just dropped, tackling five critical vulnerabilities that could let attackers…
Netflix Fined €4.75 Million Over GDPR Transparency Issues

Netflix Fined €4.75 Million Over GDPR Transparency Issues

Netflix has been hit with a €4.75 million fine by the Dutch Data Protection Authority (DPA). The…
Did Google Just Change the Rules on Privacy in Healthcare?

Did Google Just Change the Rules on Privacy in Healthcare?

This week, the UK Court of Appeal delivered its verdict: Google’s 2015 data-sharing deal with the Royal…
Salt Typhoon Campaign: A Wake-Up Call for U.S. Telecoms and National Security

Salt Typhoon Campaign: A Wake-Up Call for U.S. Telecoms and National Security

A disturbing new cybersecurity incident has raised alarms across U.S. telecoms, with revelations this week about a…
When Your Coffee Break Faces a Cyber Threat

When Your Coffee Break Faces a Cyber Threat

What happens when the backbone of global operations—supply chain software—comes under attack? Starbucks and leading UK supermarkets…
CISOs, It’s Time to Insure Your Role—Literally

CISOs, It’s Time to Insure Your Role—Literally

Traditionally, insurance policies like Directors and Officers (D&O) liability insurance didn’t cover the personal liabilities of CISOs.…
Telecom, Airline, and Utilities Move into Highest Cyber-Risk Category, Says Moody’s

Telecom, Airline, and Utilities Move into Highest Cyber-Risk Category, Says Moody’s

Telecommunications, airlines, and utilities are now in the “highest cyber-risk” category, according to Moody’s latest cyber risk…
Under the Mask of Copyright: How Phishing Attacks Are Evolving

Under the Mask of Copyright: How Phishing Attacks Are Evolving

Fake copyright infringement notices are sweeping across inboxes globally, hitting hundreds of companies with a new and…
New Indicators of Compromise Revealed for Critical FortiManager Vulnerability

New Indicators of Compromise Revealed for Critical FortiManager Vulnerability

Fortinet has alerted customers to four new indicators of compromise (IoCs) related to a widely exploited zero-day…
How Attackers are Using EDRSilencer to Fly Under the Radar

How Attackers are Using EDRSilencer to Fly Under the Radar

Threat actors are now leveraging the open-source EDRSilencer tool to undermine endpoint detection and response (EDR) solutions,…
Operation Token Mirrors

Operation Token Mirrors

In a groundbreaking operation known as Operation Token Mirrors, the FBI launched a fake cryptocurrency company, NexFundAI,…
OpenAI Disrupts 20+ Malicious Campaigns Using AI for Cybercrime and Disinformation

OpenAI Disrupts 20+ Malicious Campaigns Using AI for Cybercrime and Disinformation

In a bold move to combat the growing threat of AI-driven cybercrime, OpenAI recently announced the disruption…
Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security 

Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security 

In the wake of the TikTok controversy, another Chinese tech giant is under scrutiny—Temu. This online marketplace…
Hackers Target Cybersecurity Job Seekers

Hackers Target Cybersecurity Job Seekers

For over a year, North Korean state-sponsored hackers, specifically the Lazarus Group, have been targeting Python developers…
UK Data Centres Crowned Critical National Infrastructure

UK Data Centres Crowned Critical National Infrastructure

The UK government has elevated data centres to the status of “Critical National Infrastructure” (CNI), putting them…
White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance

White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance

In April, the tech world faced a concerning incident involving XZ Utils, a widely used open-source compression…
Massive Data Breach Exposes Personal Information of Billions

Massive Data Breach Exposes Personal Information of Billions

A data breach at National Public Data, a relatively obscure but widely connected company, has exposed 272…
Whistle While You Work

Whistle While You Work

The DOJ rolled out its Corporate Whistleblower Awards Pilot Program this month. The initiative incentivizes whistleblowers who…
Delta’s Mirror Moment: A Play of Third-Party Reflection

Delta’s Mirror Moment: A Play of Third-Party Reflection

Setting: Two friends, Delta Air and Crowd Strike, sit at a corner table, sipping their drinks and…
The Great Cyber Debate: Regulation vs. Innovation

The Great Cyber Debate: Regulation vs. Innovation

As the 2024 presidential election draws near, the candidates’ positions on cybersecurity and tech regulation will likely…
CrowdStrike Outage

CrowdStrike Outage

On July 19, 2024, CrowdStrike released an update intended to beef up security on Microsoft Windows systems.…
How is "Materiality" Defined According to the SEC Disclosure Rules?

How is "Materiality" Defined According to the SEC Disclosure Rules?

Several auto dealers affected by the CDK breach have felt compelled to notify the SEC, indicating that…
Balancing Act: Streamlining Federal Cybersecurity Regulations 

Balancing Act: Streamlining Federal Cybersecurity Regulations 

A new bipartisan bill, the Streamlining Federal Cybersecurity Regulations Act, introduced by Senators Gary Peters (D-Mich.) and…
Auto Sales Hit a Cyber Speedbump 

Auto Sales Hit a Cyber Speedbump 

A recent cyberattack has put a speed bump in the path of automakers like Ford and General…
Skip to content