Centraleyes Resource Center

Resources | News & Updates

Microsoft Responsible for Made-in-China Hack that Targeted US Officials

Microsoft Responsible for Made-in-China Hack that Targeted US Officials

A US government-backed investigation has determined that a China-sourced hack last year that infiltrated Microsoft’s networks and,…
AI Gets an Endorsement from Coalition

AI Gets an Endorsement from Coalition

Coalition, a leader in cyber insurance, has added a positive endorsement for artificial intelligence (AI) to its…
NIST NVD "Under Construction"

NIST NVD "Under Construction"

In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024,…
TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks

TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks

Tuta Mail introduced TutaCrypt, a protocol engineered to bring email encryption into the post-quantum era. Tuta Mail…
9.8/10 Severity Flaw in Team City- Patch Now!

9.8/10 Severity Flaw in Team City- Patch Now!

Hackers have recently seized upon a critical-severity authentication bypass vulnerability, CVE-2024-27198, within TeamCity On-Premises. JetBrains has swiftly…
Blackcat Claims Responsibility for the UnitedHealth Change Breach

Blackcat Claims Responsibility for the UnitedHealth Change Breach

UnitedHealth’s subsidiary, Change Healthcare, found itself at the epicenter of a cyber storm when it fell victim…
US Gov's Cyber Survival Guide for Water Utilities

US Gov's Cyber Survival Guide for Water Utilities

In a recent move to bolster the nation’s water utilities against cyber threats, the US government has…
Safeguarding Elections Amidst the Deepfake Deluge

Safeguarding Elections Amidst the Deepfake Deluge

As we gear up for the 2024 U.S. presidential election, deepfake technology looms large, presenting a formidable…
Faking the Figures (and the Faces): Deepfake Financial Frauds

Faking the Figures (and the Faces): Deepfake Financial Frauds

The proliferation of deepfake creation software on the Dark Web is fueling a surge in AI-assisted financial…
Trello Got a Scrape

Trello Got a Scrape

This week, a threat actor exploited an exposed Trello API, linking private email addresses with Trello accounts.…
Advisory Issued for Androxgh0st Malware

Advisory Issued for Androxgh0st Malware

CISA and the FBI have issued a cybersecurity advisory regarding the escalating threat of AndroxGh0st malware. This…
X Marks the Spot: Mandiant and SEC's Security Sway on Twitter

X Marks the Spot: Mandiant and SEC's Security Sway on Twitter

In a week marked by digital discord, two influential Twitter accounts found themselves in the crosshairs of…
Quantum Quandary: Navigating the Path to Unbreakable Encryption

Quantum Quandary: Navigating the Path to Unbreakable Encryption

The rise of quantum computing presents a profound challenge to data security. Termed ‘Q-Day,’ the point at…
Chameleon Android Banking Trojan Morphs with Advanced Tactics, Expands Targets

Chameleon Android Banking Trojan Morphs with Advanced Tactics, Expands Targets

The Chameleon Android banking trojan has undergone a formidable transformation, revealing advanced tactics and a wide target…
Ubiquiti Resolves User Access Bug

Ubiquiti Resolves User Access Bug

Ubiquiti, a leading networking and video surveillance camera manufacturer, has successfully resolved a bug that inadvertently allowed…
The U.S. Needs a Better AI Plan

The U.S. Needs a Better AI Plan

To supercharge its technological capabilities, the US government is setting sail on a transformative AI journey. However,…
Navigating the Cyber Currents: Ensuring a Watertight Critical Infrastructure

Navigating the Cyber Currents: Ensuring a Watertight Critical Infrastructure

Addressing recent cyber threats, a top White House national security official emphasized the imperative for increased cybersecurity…
Dollar Tree Breach: Supplier Roots Sprout Risks

Dollar Tree Breach: Supplier Roots Sprout Risks

In a recent incident, Dollar Tree, a leading discount retail chain, faced the aftermath of a third-party…
Applying Digital Pressure to Stop the “Citrix Bleed”

Applying Digital Pressure to Stop the “Citrix Bleed”

The “Citrix Bleed” security vulnerability exploitation by LockBit 3.0 ransomware gang affiliates has been escalating recently. This…
30-Year-Old Medical Protocol Making Headlines

30-Year-Old Medical Protocol Making Headlines

Researchers from Aplite have identified potential exposure of around 60 million personal and medical records due to…
88 Million Americans Affected in 2023 By Healthcare Data Breaches

88 Million Americans Affected in 2023 By Healthcare Data Breaches

The Department of Health and Human Services (HHS) has recently released staggering figures revealing a significant increase…
Critical Atlassian Flaw Has a Simple Fix

Critical Atlassian Flaw Has a Simple Fix

Atlassian has issued a warning about CVE-2023-22518. The severe flaw is described as an “improper authorization vulnerability…
D.C. Voter Data Leak: What We Know So Far

D.C. Voter Data Leak: What We Know So Far

The District of Columbia Board of Elections (DCBOE) has reported a security incident involving the breach of…
Centraleyes Leads the Way with Full PCI DSS 4.0 Compliance Support on its Innovative Platform 

Centraleyes Leads the Way with Full PCI DSS 4.0 Compliance Support on its Innovative Platform 

Centraleyes proudly announces its full support for the Payment Card Industry Data Security Standard (PCI DSS) version…
Will the Real Admin Please Step Up?

Will the Real Admin Please Step Up?

New research from Outpost24 concludes that IT administrators may be as careless as the other employees regarding…
Straightening Out the curl Vulnerability

Straightening Out the curl Vulnerability

In recent days, the cybersecurity community held its collective breath in anticipation of the disclosure of two…
Vague in the Hague: Who Is Behind the ICC Data Breach?

Vague in the Hague: Who Is Behind the ICC Data Breach?

The International Criminal Court (ICC) in The Hague, one of the world’s most prominent institutions dealing with…
Forever 21 Discloses Data Breach Impacting Over Half a Million

Forever 21 Discloses Data Breach Impacting Over Half a Million

Fashion retailer Forever 21 has revealed a data breach that has affected more than 500,000 individuals. The…
FBI on a Wild Duck Hunt after Qakbot

FBI on a Wild Duck Hunt after Qakbot

The FBI and law enforcement agencies have orchestrated an unprecedented strike against the Qakbot botnet, effectively quelling…
The Enemy Within:  Tesla’s Data Breach Was an “Inside Job”

The Enemy Within:  Tesla’s Data Breach Was an “Inside Job”

Tesla has acknowledged in an official filing with the Maine attorney general that the recent data breach,…
Skip to content