Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

Firewall Bug Under Active Attack Triggers CISA Warning

On August 23, 2022Source: Web Security – ThreatpostBy Threatpost
Categories: Vulnerabilities, Web Security

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read more

Fake Reservation Links Prey on Weary Travelers

On August 22, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Malware, Web Security

Fake travel reservations are exacting more pain from the travel weary, already dealing with the miseRead more

Google Patches Chrome’s Fifth Zero-Day of the Year

On August 18, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbRead more

Phishers Swim Around 2FA in Coinbase Account Heists

On August 8, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Web Security

Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so theRead more

Open Redirect Flaw Snags Amex, Snapchat User Data

On August 5, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Vulnerabilities, Web Security

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among otRead more

Universities Put Email Users at Cyber Risk

On August 2, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security

DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest protRead more

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

On July 28, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwaRead more

IoT Botnets Fuel DDoS Attacks – Are You Prepared?

On July 26, 2022Source: Web Security – ThreatpostBy Sponsored Content
Categories: Sponsored, Vulnerabilities, Web Security, indusface

The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifiesRead more

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

On July 20, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuRead more

Authentication Risks Discovered in Okta Platform

On July 19, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Privacy, Web Security

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizationalRead more

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753

Motherboard

https://motherboard.vice.com/en_us/rss is invalid XML, likely due to invalid characters. XML error: Undeclared entity error at line 22, column 112

Data Breeches

5 Alleged Members of Scattered Spider Charged Federally (1)

On November 20, 2024Source: DataBreaches.NetBy Dissent
Categories: Of Note, Phishing, U.S.

LOS ANGELES – Law enforcement today unsealed criminal charges against five defendants who allegedlyRead more

Thai loyalty membership card data of 5 million customers put up for sale on hacking forum

On November 20, 2024Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Hack

Central Group is a multinational conglomerate in Thailand that describes itself as one of the largesRead more

Attackers Targeting VPNs Account for 28.7 Percent of Ransomware Incidents in Q3 According to Corvus Insurance Cyber Threat Report

On November 20, 2024Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses

A press release from Corvus Insurance has some statistics worth mulling over:  Corvus Insurance, a wRead more

Apple says Mac users targeted in zero-day cyberattacks

On November 20, 2024Source: DataBreaches.NetBy Dissent
Categories: Miscellaneous

Zack Whittaker reports: Apple released security updates on Tuesday that it says are “recommended forRead more

Fintech Giant Finastra Investigating Data Breach

On November 20, 2024Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Financial Sector, Hack

Brian Krebs reports: The financial technology firm Finastra is investigating the alleged large-scaleRead more

Hibernation is Over? Akira Ransomware: Published Over 30 New Victims on their DLS (updated)

On November 20, 2024Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Malware

Adi Bleih reports: The Akira ransomware group has been active since March 2023, targeting diverse inRead more

Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime Charges

On November 18, 2024Source: DataBreaches.NetBy Dissent
Categories: Malware

Russian National Alleged to Have Coordinated Sale, Distribution, and Operation of Phobos RansomwareRead more

T-Mobile Hack Linked To Chinese State Sponsored Hackers

On November 18, 2024Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Of Note

Lars Daniel reports: T-Mobile is the latest telecommunications company to report being impacted by aRead more

Bipartisan effort to clean up cyber regulations gets a boost in House, but calendar is tight

On November 18, 2024Source: DataBreaches.NetBy Dissent
Categories: Legislation, Of Note, U.S.

Martin Matishak reports: A House Republican late last week introduced legislation to untangle the coRead more

Thames Water’s IT ‘falling apart’ and is hit by cyber-attacks, sources claim

On November 18, 2024Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Non-U.S.

Anna Isaac reports: “The software we use is older than me, and some of the hardware is older than myRead more

Cyberscoop

CISOs can now obtain professional liability insurance

On November 20, 2024Source: CyberScoopBy Greg Otto
Categories: Cybersecurity, Financial, Crum & Forster, insurance

A new business insurance offering can shield CISOs from personal losses in the event of a lawsuit. TRead more

 US charges five men linked to ‘Scattered Spider’ with wire fraud

On November 20, 2024Source: CyberScoopBy Greg Otto
Categories: Cybercrime, cybercrime, Department of Justice (DOJ)

The men have been charged with conspiracy to commit wire fraud. The post  US charges five men linkedRead more

Vulnerability disclosure policy bill for federal contractors clears Senate panel

On November 20, 2024Source: CyberScoopBy mbracken
Categories: Policy, cyber workforce, cybersecurity workforce, IT supply chain, vdp, vulnerability disclosure, vulnerability reporting

The Homeland Security and Governmental Affairs Committee on Wednesday also advanced legislation to sRead more

Sen. Blumenthal wants FCC to get busy on telecom wiretap security rules

On November 19, 2024Source: CyberScoopBy Tim Starks
Categories: Cybersecurity, Election Security, Government, Policy, Privacy, Technology, adam meyers, China, CrowdStrike, Donald Trump, FCC, Federal Communications Commission, regulation, regulators, Richard Blumenthal, Senate Judiciary Committee, surveillance, telecommunications, telecoms

The subcommittee chair said the FCC has the ability to act now in response to Salt Typhoon targetingRead more

Microsoft launches ‘Zero Day Quest’ competition to enhance cloud and AI security

On November 19, 2024Source: CyberScoopBy Greg Otto
Categories: AI, Cybersecurity, Uncategorized, bug bounty, cloud computing, Microsoft

The tech giant is upping the bounties attached to several popular systems. The post Microsoft launchRead more

Bipartisan Senate bill targets supply chain threats from foreign adversaries

On November 19, 2024Source: CyberScoopBy mbracken
Categories: Threats, China, FASC, Federal Acquisition Security Council, Office of the National Cyber Director

The bill would strengthen oversight powers for the body charged with investigating IT products fromRead more

Rail and pipeline representatives push to dial back TSA’s cyber mandates

On November 19, 2024Source: CyberScoopBy Christian Vasquez
Categories: Cybersecurity, Colonial Pipeline, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), House Homeland Security Committee, industrial control systems (ICS), pipeline rules, policy, railroads, Transportation Security Administration (TSA)

House Republicans during a Tuesday hearing were sympathetic to industry calls for shaving down cyberRead more

Botnet serving as ‘backbone’ of malicious proxy network taken offline 

On November 19, 2024Source: CyberScoopBy mbracken
Categories: Cybercrime, Black Lotus Labs, botnets, cybercrime, DDoS, ngioweb, NSOCKS, Shadowserver, Spur

Lumen Technology’s Black Lotus Labs took the ngioweb botnet and NSOCKS proxy offline Tuesday. The poRead more

Attackers are hijacking Jupyter notebooks to host illegal Champions League streams

On November 19, 2024Source: CyberScoopBy Christian Vasquez
Categories: Cybercrime, Cybersecurity, Research, Threats, Champions League, Cloud, cloud security, cybercrime, Jupyter, open source, piracy, UEFA

Normally reserved for data analysis, a cybersecurity firm caught online content pirates hosting soccRead more

How to remove the cybersecurity gridlock from the nation’s energy lifelines

On November 19, 2024Source: CyberScoopBy Greg Otto
Categories: Commentary, Cybersecurity, Government, Policy, critical infrastructure

A unified approach from both public and private sectors is essential to safeguard our critical infraRead more

Krebs On Security

The Hacker News

NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

On November 21, 2024Source: The Hacker NewsBy

Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipRead more

Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims' Facebook Ads Manager accounts and harvest credit card data stored in web browsers. "They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement," Netskope Threat Labs researcher

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

On November 20, 2024Source: The Hacker NewsBy

Threat actors are increasingly banking on a new technique that leverages near-field communication (NRead more

Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim's funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic. "Criminals can now misuse Google Pay and Apple

NHIs Are the Future of Cybersecurity: Meet NHIDR

On November 20, 2024Source: The Hacker NewsBy

The frequency and sophistication of modern cyberattacks are surging, making it increasingly challengRead more

The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

On November 20, 2024Source: The Hacker NewsBy

Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installeRead more

Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction. The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, said they are trivial to exploit, necessitating that

Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity

On November 20, 2024Source: The Hacker NewsBy

Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliabiRead more

Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliability, as well as ensure that system integrity is not compromised. The idea, the tech giant said, is to avoid incidents like that of CrowdStrike's earlier this July, enable more apps and users to be run without admin privileges, add controls surrounding the use of unsafe apps and drivers, and offer

China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks

On November 20, 2024Source: The Hacker NewsBy

A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber atRead more

A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection. Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications

Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities

On November 20, 2024Source: The Hacker NewsBy

Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser toRead more

Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild. The flaws are listed below - CVE-2024-44308 (CVSS score: 8.8) - A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content CVE-2024-44309 (CVSS score: 6.1

Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation

On November 20, 2024Source: The Hacker NewsBy

Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle ManagemenRead more

Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild. The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information. "This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network

Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

On November 19, 2024Source: The Hacker NewsBy

The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCRead more

The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. "At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers and IoT devices," the Black Lotus Labs team at

Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts

On November 19, 2024Source: The Hacker NewsBy

Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripRead more

Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a report shared with The

How Can We Help?

8 + 1 =

Share This