Centripetal

Reston, VA, USA
2009
  |  By John Owens
In the ever-evolving cybersecurity landscape, staying ahead of threats is not just a priority but a necessity. Today, we’re announcing a strategic partnership with 4Data Solutions, a renowned technology solutions provider. This alliance is poised to redefine cybersecurity solutions across the UK while elevating the standards of protection for businesses worldwide.
  |  By Lauren Farrell
On April 15th, Fabian Bäumer and Marcus Brinkmann of Ruhr University Bochum disclosed that PuTTY had a vulnerability that can allow an attacker to compromise private keys, then forge signatures, and log into any remote servers on which those keys are used. PuTTY is a free and open-source terminal emulator, serial console and network file transfer application that supports several network protocols, including SCP, SSH, Telnet, rlogin, serial port and raw socket connections.
  |  By Lauren Farrell
On April 12th, Palo Alto Networks released a CVE advisory for CVE-2024-3400, a critical vulnerability identified in the GlobalProtect Gateway feature of PAN-OS, the operating system for Palo Alto Networks firewalls. This command injection vulnerability allows unauthenticated attackers to execute arbitrary commands with root privileges on the affected devices.
  |  By Lauren Farrell
On March 28th, Red Hat released an advisory for CVE-2024-3094 which is a critical vulnerability identified in XZ Utils – a widely used data compression software included in many Linux distributions. This vulnerability stems from a backdoor inserted in versions 5.6.0 and 5.6.1 of XZ Utils and has been given a CVSS score of 10 out of 10, indicating its severity as critical.
  |  By Lauren Farrell
Widespread exploitation of these vulnerabilities in the wild has been confirmed including comprise of UnitedHealth’s Change Healthcare on February 22nd, by Lockbit. Sophos has confirmed various strains of malware using these vulnerabilities as part of delivery including LockBit ransomware, AsyncRAT, infostealers, etc.
  |  By John Owens
The cyberthreat landscape is ever-evolving and the level of sophistication from cybercriminals is always increasing. Networks are not impenetrable. Alarmingly, 79 minutes is now the average time from when an attacker compromises a network to when they start to move laterally, infiltrating the rest of the network.
  |  By John Owens
The sheer volume of data breaches continues to escalate at a phenomenal rate. Cyberattacks on all businesses, but particularly small to medium-sized businesses, are becoming more frequent, targeted, and complex. According to Accenture’s Cost of Cybercrime Study, 43% of cyberattacks are aimed at small businesses, but only 14% of those businesses are prepared to defend themselves.
  |  By Lauren Farrell
On Thursday, February 8th, the Fortinet Product Security Incident Response Team released an advisory (FG-IR-24-015) notifying of an out-of-bound write vulnerability in their SSL VPN tracked as CVE-2024-21762. The vulnerability “may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests”.
  |  By Lauren Farrell
On February 2nd, 2024, AnyDesk disclosed that their production systems had been compromised and that private code signing keys and source code were stolen, while an unknown number of user accounts had their passwords reset. This is a significant concern, as it would allow a malicious attacker to generate malicious versions of AnyDesk software with compromised code that appears to be legitimate. It is assessed that approximately 18,000 credentials are available for sale on the Dark Web as a result.
  |  By Centripetal
Centripetal announces that its award winning, patented cybersecurity threat solution is available for the first time ever across the UK as a result of its strategic partnership with Tiger. With this partnership, Tiger and its customers will have a stronger approach to cybersecurity, putting operationalised threat intelligence at the forefront, moving from a reactive to proactive defence, and helping security teams be more efficient and effective.
  |  By Centripetal
Our mission is to build a secure digital world - but when we think about the future, we realize it can't happen without intelligence. Today, cyber threats haven't been tamed, and to get to a point that they are, involves a collective effort globally to solve for them. How? By thinking differently. Join us in building a future in which neutralizing cyber threats is the norm as our security solutions protect us.
  |  By Centripetal
Patents are imperative to innovation as they recognize the success of inventions. But the weakening of their rights leaves companies spending more on legal, instead of research, marketing, sales and market expansion. And ultimately, impeding progress. How can patent law evolve to better help invent the future? #InnovationFriday.
  |  By Centripetal
Across all industries, the incentive for legacy companies to challenge patents, has increased. Why? Because it's proven to be a valuable tactic in slowing or stopping competitors - ultimately impeding innovation as these disruptive companies are forced to spend significant money defending themselves. The impact? According to @Harvard Business Review so-called patent trolls cost defendants an average of $29B per year.
  |  By Centripetal
How can the MITRE ATT&CK Framework help security teams with individuals of differing technical levels and roles easily understand an attack?
  |  By Centripetal
In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?
  |  By Centripetal
In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?
  |  By Centripetal
On this inaugural episode of The Cycle, Bob Gourley, Co-Founder and CTO of OODA Loop, speaks on the current global threat landscape - demonstrating both the risks and opportunities for businesses. In addition to the strategic actions business can take to mitigate risks through automation, decision making and more - he dives deep into the geopolitical realities currently being faced and provides actionable recommendations for decision makers.
  |  By Centripetal
Most small businesses handle cybersecurity by crossing their fingers. They don't think they need it until they get hacked. But it doesn't matter if you're a one man shop or a big enterprise company. And while Walt & Company is a small organization, their clients are multibillion dollar global companies operating around the world. Their businesses are critically important and thus the security of their digital assets are critically important to them. So how can a company stay ahead of the curve when it comes to cybersecurity?
  |  By Centripetal
Chuck Veth, CEO of CVM, and his team, advise leaders in manufacturing, finance, education, pharmaceuticals, food service, and more on solutions to protect their networks. Their customers trust that they have their best interest at heart and that when they advise them, it's advising them as mentors and not just as salespeople. In today's world, your network is vulnerable to people all around the globe. And they're patient, slowly finding more and more information, so when they actually perform the attack, it's debilitating. It's not just a bunch of encrypted files.
  |  By Centripetal
On any given day Jay Peak, a Four Seasons Ski Resort in Vermont, has more than 6,000 devices on their network. IT touches just about every facet of the guest and business experience, from network security and point of sale, to building infrastructure and management. It's the responsibility of IT to ensure the entire operation is functioning, 24/7. As a small staff how do they proactively protect their business and guests against potential threats?
  |  By Centripetal
Even large, global firms with enormous IT budgets are falling victim to the latest attacks. Why? Because cybercriminals know that popular network inspection and threat intelligence solutions can't keep up with the deluge of attacks hammering at our networks daily. But there is hope! By evolving from traditional threat intelligence to ThreatOps, we can put an end to ransomware and proactively shield your business from 99% of global threats mapped by the threat intelligence community automatically.

A global leader in intelligence powered cybersecurity, we are operationalizing the world’s largest collection of threat intelligence, in real-time, to protect organizations from every known cyberthreat through its innovative patented technologies.

The CleanINTERNET® service works at machine speed and massive scale to shield your business from globally identified cyber threats, preventing costly breaches.

CleanINTERNET® enables businesses of any size and budget to take advantage of every threat feed monitored by the global threat intelligence community to systematically shield against all known threats and provide a reliable zero trust cybersecurity solution.

Delivered as a service that includes experienced threat analysts, CleanINTERNET will act as a seamless and invaluable extension to your existing operations teams.