Centripetal featured in Fox News
Centripetal Featured in Fox News Report on “Facebook Now Used for Dark Web Activity” Over two billion people use Facebook to buy and sell goods, chat with each other, and post vacation pictures. Now, according to a new report by Talos Intelligence, it’s also become part of the Dark Web, a place to sell credit card information, illegal contraband, […]
Centripetal Comments on the Toyota Data Breach
Centripetal Comments on the Toyota Data Breach that Exposed Personal Information of 3.1 Million Customers in CPO Magazine According to a Toyota data breach notification, the cyber attack within Japan occurred at eight different Toyota sales subsidiaries or their affiliates, including independent Toyota and Lexus car dealerships located in Tokyo. Experts Commented below: Byron Rashed, […]
Centripetal Discusses the Cyberthreat Landscape In DesignNews
In DesignNews, Centripetal Discusses the Cyberthreat Landscape and Why Blocking of Known Malicious Sources is Important to Mitigate Network Infiltration Cybersecurity company, Tenable Inc., has released the study, Cybersecurity in Operational Technology: 7 Insights You Need to Know. The report was conducted by the Ponemon Institute. The results identify the extent of cyberattacks experienced by critical infrastructure […]
Centripetal Comments in Dark Reading
Centripetal Comments in Dark Reading Article “ShadowHammer Dangers Include Update Avoidance“ More fallout from the compromise of Asus’s automated software update. Experts Commented below: Colin Little, Senior Threat Analyst at Centripetal: The ShadowHammer attackers used a trusted supplier — which itself was using trusted certificates for authentication — to target a relatively small number of end users. But the […]
Centripetal Comments on Email Breach in Solutions Review
Centripetal Comments on Massive Email Breach in Solutions Review In what some experts call one of the most largest and comprehensive email breaches of all time, nearly one billion emails have been exposed by a little-known marketing company called Verifications.io. Experts Commented below: Byron Rashed, VP of Marketing of Centripetal Networks: “Businesses and consumers should always verify […]
Centripetal’s CEO Featured in SC Magazine
Centripetal’s CEO Steven Rogers Featured in SC Magazine’s Article on the GAO’s Cybersecurity Findings Within the Bureau of Fiscal Service The General Accounting Office (GAO) criticized the Bureau of the Fiscal Service, which is part of the U.S. Department of the Treasury, over new and old cybersecurity problems in a new audit. Experts Commented below: […]
Centripetal Contributes to DarkReading
Centripetal Contributes to DarkReading on ASUS ‘ShadowHammer’ Attack In response to ‘ShadowHammer’ attack against ASUS notebook customers. Experts Commented below: Colin Little, Senior Threat Analyst at Centripetal Networks: To mitigate risk from software updates, verify that the file you are installing is the file that the vendor intended, says Colin Little, senior threat analyst at Centripetal Networks. “A lot […]
Centripetal Featured in SC Magazine
Centripetal Featured in SC Magazine! Why it’s Important to Block Malicious Sources to Prevent Network Infiltration and Data Exfiltration In response to hacker (Gnosticplayers) releasing 26Mil user records for sale on the Dark Web – most of which were obtained by hacking companies last month. Experts Commented below: Byron Rashed, VP of Marketing at Centripetal Networks: […]
Information Warfare a Top Cyber Threat in 2019
Predicting threats that are yet to come is always tricky, but a new report published by Booz Allen, 2019 Cyberthreat Outlook, identifies eight key cyber threats to watch as the year advances. In addition to combing through thousands of intelligence reports from commercial clients, researchers also sought feedback from analysts. Attempting to identify the top challenges organizations […]
New Google Chrome “Password Checkup” Feature
Byron Rashed, VP of Marketing at Centripetal Networks: “Compromised credentials are the basis for a threat actor to perform network infiltration, data exfiltration, spoofing, account takeover, stolen PII, and various other malicious activities that can create huge risks for businesses and individuals. Most Internet users (consumers) do not have even a basic knowledge of what a […]