Centraleyes Resource Center

Resources | News & Updates

Forever 21 Discloses Data Breach Impacting Over Half a Million

Forever 21 Discloses Data Breach Impacting Over Half a Million

Fashion retailer Forever 21 has revealed a data breach that has affected more than 500,000 individuals. The…
FBI on a Wild Duck Hunt after Qakbot

FBI on a Wild Duck Hunt after Qakbot

The FBI and law enforcement agencies have orchestrated an unprecedented strike against the Qakbot botnet, effectively quelling…
The Enemy Within:  Tesla’s Data Breach Was an “Inside Job”

The Enemy Within:  Tesla’s Data Breach Was an “Inside Job”

Tesla has acknowledged in an official filing with the Maine attorney general that the recent data breach,…
NIST CSF is Getting a Makeover

NIST CSF is Getting a Makeover

The National Institute of Standards and Technology (NIST) has unveiled a draft version of Cybersecurity Framework (CSF)…
Russia Prime Suspect for UK Electoral Commission Cyber Attack

Russia Prime Suspect for UK Electoral Commission Cyber Attack

A cyber attack targeting the UK’s Electoral Commission, which resulted in the exposure of data belonging to…
Storm-0558 Isn’t Over Yet

Storm-0558 Isn’t Over Yet

A report published this week by the independent security firm Wiz has raised serious concerns about the…
Google-Owned VirusTotal Data Leak: Result of Human Error

Google-Owned VirusTotal Data Leak: Result of Human Error

The recent data leak at Google-owned VirusTotal exposed information on approximately 5,600 of its registered customers. The…
Made-In-China Hack Infiltrates the US Government

Made-In-China Hack Infiltrates the US Government

A hacking campaign, which began in mid-May, saw Chinese hackers infiltrating US government email accounts, including those…
EU-U.S. Data Privacy Framework: Is Adequate Good Enough?

EU-U.S. Data Privacy Framework: Is Adequate Good Enough?

The European Union has approved a new agreement regarding the privacy of individuals’ personal information transmitted across…
Anonymous Sudan Or Anonymous Russia?

Anonymous Sudan Or Anonymous Russia?

Anonymous Sudan gained notoriety with its distributed denial of service (DDoS) attacks, targeting Microsoft in June.  Earlier…
Over 100,000 ChatGPT User Account Credentials For Sale on the Dark Web

Over 100,000 ChatGPT User Account Credentials For Sale on the Dark Web

This week, researchers at Group-IB discovered that upwards of 100,000 ChatGPT user accounts were up for sale…
Ransomware Causes St. Margaret Health’s Permanent Closure

Ransomware Causes St. Margaret Health’s Permanent Closure

The recent closure of St. Margaret’s Health, a hospital in Illinois, serves as a powerful reminder of…
MOVEit Transfer Vulnerability Going Wild

MOVEit Transfer Vulnerability Going Wild

The Clop ransomware organization purportedly exploited a critical zero-day flaw in the MOVEit file transfer program. Security…
8Base on a Ransomware Rampage

8Base on a Ransomware Rampage

In just one month, the ransomware group known as 8Base emerged as the second most active ransomware…
FTC Penalizes Amazon with Millions in Fines

FTC Penalizes Amazon with Millions in Fines

Yesterday, the FTC took a significant enforcement step against Amazon claiming that The Children’s Online Privacy and…
Record 1.3 Billion GDPR Penalty Slapped on Meta

Record 1.3 Billion GDPR Penalty Slapped on Meta

Meta, better known for Facebook and Instagram, has been fined a record $1.3 billion (€1.2 billion) for…
Health Sector Warned of Veeam Vulnerability

Health Sector Warned of Veeam Vulnerability

Threat actors are increasingly targeting Veeam Backup & Replication in cyber attacks. Veeam Software’s Veeam Backup &…
Malware Strain Disguised as a Chrome Updater

Malware Strain Disguised as a Chrome Updater

A recently spotted campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information-stealing…
Critical Flaw Found in DNA Sequencers

Critical Flaw Found in DNA Sequencers

A significant vulnerability in Illumina gene sequencing software puts a spotlight on the need to bolster cybersecurity…
The NIST CSF Makeover Scheduled for the Summer

The NIST CSF Makeover Scheduled for the Summer

NIST plans for a significant update to the NIST CSF Framework this summer. They recently published a…
Privacy in the Age of ChatGPT

Privacy in the Age of ChatGPT

One of the main concerns with language models like ChatCPT is privacy risks. The model uses any…
Emergency Update for Apple Devices

Emergency Update for Apple Devices

Apple has released emergency security updates to address two zero-day vulnerabilities that have already been exploited in…
Operation Cookie Monster

Operation Cookie Monster

On Tuesday, more than a dozen law enforcement organizations from around the world shut down the Genesis…
Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU

Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU

The key objective is to bring hands-on training and experience on best practices and the key role…
Call for Restraint in the Race to AI

Call for Restraint in the Race to AI

Is the World Adopting AI Models Too Fast? That’s what an elite group of tech leaders and…
Saks Fifth Avenue Added to GoAnywhere Victim List 

Saks Fifth Avenue Added to GoAnywhere Victim List 

Dozens of organizations have been added to Clop ransomware’s victim list over the last couple of months,…
Beware: SVB’s Collapse Being Exploited By Scammers

Beware: SVB’s Collapse Being Exploited By Scammers

Cybersecurity experts caution that scammers are profiting from the turmoil caused by the collapse of Silicon Valley…
New TSA Regulations for Airlines Facing “Persistent Cybersecurity Threats”

New TSA Regulations for Airlines Facing “Persistent Cybersecurity Threats”

The Transportation Security Administration on Tuesday announced regulations to force airports, along with aircraft owners and operators,…
CISA Calls on Tech Developers to Put Security into Digital Products 

CISA Calls on Tech Developers to Put Security into Digital Products 

CISA called on technology development companies to “fundamentally shift” product design to one that puts cybersecurity at…
Social Engineering “Smishing” Attack on Coinbase

Social Engineering “Smishing” Attack on Coinbase

Coinbase and other crypto platforms are frequently targeted by fraudsters. That’s because currency in any form is…
Skip to content