Centraleyes Resource Center

Resources | News & Updates

Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security 

Is Temu the Next TikTok? House Republicans Sound the Alarm on Data Security 

In the wake of the TikTok controversy, another Chinese tech giant is under scrutiny—Temu. This online marketplace…
Hackers Target Cybersecurity Job Seekers

Hackers Target Cybersecurity Job Seekers

For over a year, North Korean state-sponsored hackers, specifically the Lazarus Group, have been targeting Python developers…
UK Data Centres Crowned Critical National Infrastructure

UK Data Centres Crowned Critical National Infrastructure

The UK government has elevated data centres to the status of “Critical National Infrastructure” (CNI), putting them…
White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance

White House and CISA Double Down on Securing Open Source Software: A New Era of Vigilance

In April, the tech world faced a concerning incident involving XZ Utils, a widely used open-source compression…
Massive Data Breach Exposes Personal Information of Billions

Massive Data Breach Exposes Personal Information of Billions

A data breach at National Public Data, a relatively obscure but widely connected company, has exposed 272…
Whistle While You Work

Whistle While You Work

The DOJ rolled out its Corporate Whistleblower Awards Pilot Program this month. The initiative incentivizes whistleblowers who…
Delta’s Mirror Moment: A Play of Third-Party Reflection

Delta’s Mirror Moment: A Play of Third-Party Reflection

Setting: Two friends, Delta Air and Crowd Strike, sit at a corner table, sipping their drinks and…
The Great Cyber Debate: Regulation vs. Innovation

The Great Cyber Debate: Regulation vs. Innovation

As the 2024 presidential election draws near, the candidates’ positions on cybersecurity and tech regulation will likely…
CrowdStrike Outage

CrowdStrike Outage

On July 19, 2024, CrowdStrike released an update intended to beef up security on Microsoft Windows systems.…
How is "Materiality" Defined According to the SEC Disclosure Rules?

How is "Materiality" Defined According to the SEC Disclosure Rules?

Several auto dealers affected by the CDK breach have felt compelled to notify the SEC, indicating that…
Balancing Act: Streamlining Federal Cybersecurity Regulations 

Balancing Act: Streamlining Federal Cybersecurity Regulations 

A new bipartisan bill, the Streamlining Federal Cybersecurity Regulations Act, introduced by Senators Gary Peters (D-Mich.) and…
Auto Sales Hit a Cyber Speedbump 

Auto Sales Hit a Cyber Speedbump 

A recent cyberattack has put a speed bump in the path of automakers like Ford and General…
Explainer: The CDK Global Ransomware Attack

Explainer: The CDK Global Ransomware Attack

CDK Global, a leading software vendor, provides critical applications and services to nearly 15,000 automotive dealer locations…
​​Micro-Managed: AMD Investigates IntelBroker Hack 

​​Micro-Managed: AMD Investigates IntelBroker Hack 

AMD is investigating a potential data breach after a notorious hacker, known as IntelBroker, announced they were…
Microsoft Puts Recall on Hold

Microsoft Puts Recall on Hold

Microsoft has announced a delay in the rollout of its controversial AI-powered Recall feature for Copilot+ PCs.…
Snowflake Breach Snowballs

Snowflake Breach Snowballs

In a concerning turn of events, a breach in Snowflake’s cloud storage system has resulted in a…
Game Over? Law Enforcement Plays Hardball in Operation Endgame

Game Over? Law Enforcement Plays Hardball in Operation Endgame

In what Europol has labeled the most significant crackdown against botnets to date, Operation Endgame saw law…
Cybersecurity in Sports: A New Arena for Risk Management

Cybersecurity in Sports: A New Arena for Risk Management

In the high-stakes world of professional sports, the action isn’t just on the field. Behind the scenes,…
Boeing's Sky-High Ransomware Refusal

Boeing's Sky-High Ransomware Refusal

A grand jury indictment in New Jersey charged Russian national Dmitry Yuryevich Khoroshev with orchestrating a litany…
What was Behind the Change Healthcare Breach that Shook the Healthcare Industry?

What was Behind the Change Healthcare Breach that Shook the Healthcare Industry?

In a gripping Senate Finance Committee hearing, Change Healthcare CEO Andrew Witty disclosed that data stolen in…
Cisco Raises Concerns Over Surge in Brute-Force Attacks Targeting VPN and Web Services

Cisco Raises Concerns Over Surge in Brute-Force Attacks Targeting VPN and Web Services

Cisco has sounded the alarm on a widespread increase in brute-force attacks targeting various devices, including Virtual…
Bipartisan Proposal Sparks Hope for American Privacy Rights Act

Bipartisan Proposal Sparks Hope for American Privacy Rights Act

A federal privacy law all but stalled in congress since 2022. But this week saw a sudden…
Microsoft Responsible for Made-in-China Hack that Targeted US Officials

Microsoft Responsible for Made-in-China Hack that Targeted US Officials

A US government-backed investigation has determined that a China-sourced hack last year that infiltrated Microsoft’s networks and,…
AI Gets an Endorsement from Coalition

AI Gets an Endorsement from Coalition

Coalition, a leader in cyber insurance, has added a positive endorsement for artificial intelligence (AI) to its…
NIST NVD "Under Construction"

NIST NVD "Under Construction"

In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024,…
TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks

TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks

Tuta Mail introduced TutaCrypt, a protocol engineered to bring email encryption into the post-quantum era. Tuta Mail…
9.8/10 Severity Flaw in Team City- Patch Now!

9.8/10 Severity Flaw in Team City- Patch Now!

Hackers have recently seized upon a critical-severity authentication bypass vulnerability, CVE-2024-27198, within TeamCity On-Premises. JetBrains has swiftly…
Blackcat Claims Responsibility for the UnitedHealth Change Breach

Blackcat Claims Responsibility for the UnitedHealth Change Breach

UnitedHealth’s subsidiary, Change Healthcare, found itself at the epicenter of a cyber storm when it fell victim…
US Gov's Cyber Survival Guide for Water Utilities

US Gov's Cyber Survival Guide for Water Utilities

In a recent move to bolster the nation’s water utilities against cyber threats, the US government has…
Safeguarding Elections Amidst the Deepfake Deluge

Safeguarding Elections Amidst the Deepfake Deluge

As we gear up for the 2024 U.S. presidential election, deepfake technology looms large, presenting a formidable…
Skip to content