Latest News

Centripetal Comments on Compromised Chipotle Accounts in Solutions Review article "What Enterprises Can Learn About Credential Stuffing From Chipotle"

April 19, 2019 | Centripetal
Recently, fellow technology publication TechCrunch reported on a potential security event at Chipotle, the Mexican fast-food provider. According to the article, Chipotle application consumers complained of fraudulent charges to their accounts via social media and online forums. Experts Com...
Read More

Centripetal Featured in Fox News Report on "Facebook Now Used for Dark Web Activity"

April 18, 2019 | Centripetal
Over two billion people use Facebook to buy and sell goods, chat with each other, and post vacation pictures. Now, according to a new report by Talos Intelligence, it’s also become part of the Dark Web, a place to sell credit card information, illegal contraband, and much more. What’s even...
Read More

In DesignNews, Centripetal Discusses the Cyberthreat Landscape and Why Blocking of Known Malicious Sources is Important to Mitigate Network Infiltration

April 12, 2019 | Centripetal
Cybersecurity company, Tenable Inc., has released the study, Cybersecurity in Operational Technology: 7 Insights You Need to Know. The report was conducted by the Ponemon Institute. The results identify the extent of cyberattacks experienced by critical infrastructure operators — professio...
Read More

Centripetal Comments on the Toyota Data Breach that Exposed Personal Information of 3.1 Million Customers in CPO Magazine

April 12, 2019 | Centripetal
According to a Toyota data breach notification, the cyber attack within Japan occurred at eight different Toyota sales subsidiaries or their affiliates, including independent Toyota and Lexus car dealerships located in Tokyo. Experts Commented below: Byron Rashed, VP of Marketing at Centri...
Read More

Centripetal Comments in Dark Reading Article "ShadowHammer Dangers Include Update Avoidance"

April 2, 2019 | Centripetal
More fallout from the compromise of Asus's automated software update. Experts Commented below: Colin Little, Senior Threat Analyst at Centripetal Networks: The ShadowHammer attackers used a trusted supplier — which itself was using trusted certificates for authentication — to target a rela...
Read More