Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

Firewall Bug Under Active Attack Triggers CISA Warning

On August 23, 2022Source: Web Security – ThreatpostBy Threatpost
Categories: Vulnerabilities, Web Security

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read more

Fake Reservation Links Prey on Weary Travelers

On August 22, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Malware, Web Security

Fake travel reservations are exacting more pain from the travel weary, already dealing with the miseRead more

Google Patches Chrome’s Fifth Zero-Day of the Year

On August 18, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbRead more

Phishers Swim Around 2FA in Coinbase Account Heists

On August 8, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Web Security

Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so theRead more

Open Redirect Flaw Snags Amex, Snapchat User Data

On August 5, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Vulnerabilities, Web Security

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among otRead more

Universities Put Email Users at Cyber Risk

On August 2, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security

DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest protRead more

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

On July 28, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwaRead more

IoT Botnets Fuel DDoS Attacks – Are You Prepared?

On July 26, 2022Source: Web Security – ThreatpostBy Sponsored Content
Categories: Sponsored, Vulnerabilities, Web Security, indusface

The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifiesRead more

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

On July 20, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuRead more

Authentication Risks Discovered in Okta Platform

On July 19, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Privacy, Web Security

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizationalRead more

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753

Motherboard

https://motherboard.vice.com/en_us/rss is invalid XML, likely due to invalid characters. XML error: Undeclared entity error at line 23, column 112

Data Breeches

A 25-Year-Old With Elon Musk Ties Has Direct Access to the Federal Payment System

On February 4, 2025Source: DataBreaches.NetBy Dissent
Categories: Government Sector, Of Note

Vittoria Elliott, Dhruv Mehrotra, Leah Feiger, and Tim Marchman report: A 25-year-old engineer namedRead more

Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden

On February 4, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Education Sector, Of Note

Kept in the Dark Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden By Mark KeierlebeRead more

Cyberattack on NHS causes hospitals to miss cancer care targets

On February 4, 2025Source: DataBreaches.NetBy Dissent
Categories: Health Data, Malware, Non-U.S., Of Note

Connor Jones reports: NHS execs admit that last year’s cyberattack on hospitals in Wirral, norRead more

Canadian Man Charged in $65M Cryptocurrency Hacking Schemes

On February 3, 2025Source: DataBreaches.NetBy Dissent
Categories: Hack

A five-count criminal indictment was unsealed today in federal court in New York charging a CanadianRead more

Romanian Men Indicted For Access Device Fraud

On February 3, 2025Source: DataBreaches.NetBy Dissent
Categories: Skimmers, skimmers

NEW ORLEANS, LOUISIANA – United States Attorney Duane A. Evans announced that ANDREI FAGARAS (“FAGARRead more

DISA Incident: Update on Review of ‘Potentially Affected Files’ and Notification Plan

On February 3, 2025Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Health Data, U.S.

BakerHostetler writes: On Thursday, Jan. 23, DISA Global Solutions, Inc. (DISA) provided an update tRead more

Delta County Memorial Hospital District reveals more about 2024 cyberattack that affected 148,363 people

On February 3, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Hack, Health Data

Delta County Memorial Hospital District (Delta Health) in Colorado was the victim of a cyberattack aRead more

Cover-up Follow-up: Westend Dental starts notifying patients of October 2020 ransomware attack

On February 2, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Health Data, HIPAA, Malware, Of Note

In December, DataBreaches reported that the Indiana Attorney General’s Office had brought charRead more

Operation Heart Blocker: Disruption action deals blow to criminal cyber network HeartSender

On February 1, 2025Source: DataBreaches.NetBy Dissent
Categories: Of Note, Other, Phishing

During a disruption action on January 29, 2025, HeartSender servers and domains were seized by varioRead more

Almost one year later, NorthBay Health notifies 569,012 people of breach of sensitive information

On January 31, 2025Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Health Data, Malware, U.S.

While some states are decreasing the amount of time entities have to notify the state or individualsRead more

Cyberscoop

Cybersecurity, government experts are aghast at security failures in DOGE takeover

On February 4, 2025Source: CyberScoopBy djohnson
Categories: Government, Policy, Threats, data breaches, Donald Trump, Elon Musk, FISMA, OPM breach, Treasury Department

Elon Musk’s takeover of key systems across the federal government is ignoring decades of laws, regulRead more

Android security update includes patch for actively exploited vulnerability 

On February 4, 2025Source: CyberScoopBy Greg Otto
Categories: Cybersecurity, Android, mobile, Qualcomm, vulnerabilities

The monthly update closes 47 security vulnerabilities in total. The post Android security update incRead more

Here’s all the ways an abandoned cloud instance can cause security issues

On February 4, 2025Source: CyberScoopBy Greg Otto
Categories: Cybersecurity, Research, Amazon Web Services (AWS), cloud computing, Cybersecurity and Infrastructure Security Agency (CISA), open source, S3 bucket, SSL, VPN gateway, watchTowr Labs

Research released Tuesday by watchTowr shows how easy an old storage bucket can be repurposed by malRead more

From credit card fraud to zero-day exploits: Xe Group expanding cybercriminal efforts

On February 3, 2025Source: CyberScoopBy Greg Otto
Categories: Cybercrime, Cybersecurity, Research, Threats, intezer, Solis Security, VeraCore, XE Group, zero-days

The Vietnam-based group has grown more sophisticated since 2013, new research shows. The post From cRead more

Bill requiring federal contractors to have vulnerability disclosure policies gets House redo

On January 31, 2025Source: CyberScoopBy mbracken
Categories: Government, Policy, federal contracting, Nancy Mace, Shontel Brown, vdp, vulnerability disclosure

Reps. Nancy Mace and Shontel Brown reintroduced VDP legislation after the 2024 bipartisan, bicameralRead more

WhatsApp says it disrupted spyware campaign aimed at reporters, civil society

On January 31, 2025Source: CyberScoopBy Tim Starks
Categories: Cybersecurity, Privacy, Technology, Threats, Citizen Lab, ICE, NSO Group, Paragon, privacy, spyware, U.S. courts, WhatsApp

The company linked to the campaign recently signed a deal with U.S. Immigration and Customs EnforcemRead more

Even the US government can fall victim to cryptojacking

On January 31, 2025Source: CyberScoopBy mbracken
Categories: Cybersecurity

Documents reveal that USAID was victimized by a password spray attack that resulted in roughly $500,Read more

FBI nominee Kash Patel gets questions on cybercrime investigations, Silk Road founder, surveillance powers

On January 30, 2025Source: CyberScoopBy Tim Starks
Categories: Cybercrime, Government, Policy, Amy Klobuchar, FBI, Federal Bureau of Investigation, Federal Bureau of Investigation (FBI), FISA, John Cornyn, Kash Patel, Peter Welch, Ross Ulbricht, Section 702, Senate Judiciary Committee, Silk Road

Cyber otherwise wasn’t a big focus during the Senate Judiciary Committee hearing on Patel’s nominatiRead more

Department of Justice partners with Dutch police to break up HeartSender network

On January 30, 2025Source: CyberScoopBy Greg Otto
Categories: Cybercrime, Threats, Department of Justice (DOJ), HeartSender, phishing kit, Saim Raza

Also known as “Saim Raza,” the group was allegedly responsible for over $3 million in losses. The poRead more

Tulsi Gabbard tussles with senators over Snowden, surveillance 

On January 30, 2025Source: CyberScoopBy djohnson
Categories: Government, Policy, Privacy, Congress, Edward Snowden, Office of the Director of National Intelligence (ODNI), Section 702, tulsi gabbard

President Trump’s nominee to lead ODNI substantially revised her previous positions on the former NSRead more

Krebs On Security

The Hacker News

Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access

On February 4, 2025Source: The Hacker NewsBy

Cybersecurity researchers have called attention to a software supply chain attack targeting the Go eRead more

Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems. The package, named github.com/boltdb-go/bolt, is a typosquat of the legitimate BoltDB database module (github.com/boltdb/bolt), per Socket. The malicious version (1.3.1) was published to

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections

On February 4, 2025Source: The Hacker NewsBy

A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deRead more

A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware. The flaw, CVE-2025-0411 (CVSS score: 7.0), allows remote attackers to circumvent mark-of-the-web (MotW) protections and execute arbitrary code in the context of the current user. It was addressed by 7-Zip in November 2024 with version 24.09. "The vulnerability was

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

On February 4, 2025Source: The Hacker NewsBy

The North Korean threat actors behind the Contagious Interview campaign have been observed deliverinRead more

The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS malware strains dubbed FERRET as part of a supposed job interview process. "Targets are typically asked to communicate with an interviewer through a link that throws an error message and a request to install or update some required piece of software such as VCam or

Watch Out For These 8 Cloud Security Shifts in 2025

On February 4, 2025Source: The Hacker NewsBy

As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realRead more

As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud. But there are other developments that could impact your organizations and drive the need for an even more robust security strategy. Let’s take a

Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks

On February 4, 2025Source: The Hacker NewsBy

Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek'Read more

Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek's Artificial Intelligence (AI) platform, citing security risks. "Government agencies and critical infrastructure should not use DeepSeek, because it endangers national information security," according to a statement released by Taiwan's Ministry of Digital Affairs, per Radio Free Asia. "DeepSeek

AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access

On February 4, 2025Source: The Hacker NewsBy

A security vulnerability has been disclosed in AMD's Secure Encrypted Virtualization (SEV) that coulRead more

A security vulnerability has been disclosed in AMD's Secure Encrypted Virtualization (SEV) that could permit an attacker to load a malicious CPU microcode under specific conditions. The flaw, tracked as CVE-2024-56161, carries a CVSS score of 7.2 out of 10.0, indicating high severity. "Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local

Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score

On February 4, 2025Source: The Hacker NewsBy

Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI FaceRead more

Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account that could allow a malicious actor to escalate their privileges under certain conditions. The flaws are listed below - CVE-2025-21396 (CVSS score: 7.5) - Microsoft Account Elevation of Privilege Vulnerability CVE-2025-21415 (CVSS score: 9.9) - Azure AI Face Service

Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104

On February 4, 2025Source: The Hacker NewsBy

Google has shipped patches to address 47 security flaws in its Android operating system, including oRead more

Google has shipped patches to address 47 security flaws in its Android operating system, including one it said has come under active exploitation in the wild. The vulnerability in question is CVE-2024-53104 (CVSS score: 7.8), which has been described as a case of privilege escalation in a kernel component known as the USB Video Class (UVC) driver. Successful exploitation of the flaw could lead

Microsoft SharePoint Connector Flaw Could've Enabled Credential Theft Across Power Platform

On February 4, 2025Source: The Hacker NewsBy

Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the MicrosRead more

Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that, if successfully exploited, could allow threat actors to harvest a user's credentials and stage follow-on attacks. This could manifest in the form of post-exploitation actions that allow the attacker to send requests to the SharePoint API on behalf

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023

On February 3, 2025Source: The Hacker NewsBy

As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wilRead more

As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year. Describing 2024 as "another banner year for threat actors targeting the exploitation of vulnerabilities," VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be weaponized either on or before

How Can We Help?

3 + 9 =

Share This