Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
| WP HTTP Error: cURL error 52: Empty reply from server |
Beeping Computer
| https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 767 |
Motherboard
| WP HTTP Error: A valid URL was not provided. |
Data Breeches
Florida Medicare members’ data exposed as Mirra Health improperly outsourced records overseasOn March 24, 2026Source: DataBreaches.NetBy DissentCategories: Health Data, HIPAA, Legislation, U.S. Skyler Shepard reports: State investigators say Mirra Health jeopardized the safety of thousands of… Read more |
50 Israeli companies ‘digitally erased’On March 24, 2026Source: DataBreaches.NetBy DissentCategories: cyberwar On March 9, The Jerusalem Post reported that the Israel National Cyber Directorate had received a gr… Read more |
Family of UMMC patient speaks out after cyberattack during lifesaving surgeryOn March 24, 2026Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Health Data, Malware, U.S. WBAL reports: A Mississippi family is sharing their story for the first time after a cyberattack dis… Read more |
243,000 French Public School Employees Victims of HackOn March 24, 2026Source: DataBreaches.NetBy DissentCategories: Education Sector, Health Data, Non-U.S. La Revue Technique reports: A cyberattack on a French Education Ministry HR system has exposed perso… Read more |
Foster City goes offline after cybersecurity breachOn March 24, 2026Source: DataBreaches.NetBy DissentCategories: Government Sector, Hack, Malware, U.S. The Daily Journal reports: Days after a cybersecurity breach that was “widely impacting city service… Read more |
Citing HIPAA, Groups Oppose Renewed Federal Plan to Amass Millions of Workers’ Health DataOn March 24, 2026Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Government Sector, Health Data, Legislation Theresa Defino of the Health Care Compliance Association reports: Calling the proposal “unprecedente… Read more |
Initial Access Broker sentenced to 81 months in prison for enabling Yanluowang ransomware gangOn March 23, 2026Source: DataBreaches.NetBy DissentCategories: Malware A press release from the U.S. Department of Justice about a Russian initial access broker who pleade… Read more |
Hackers increasingly target school districtsOn March 23, 2026Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Education Sector, U.S. Nolan Keegan reports: Hackers are increasingly treating school districts like easy ATMs for personal… Read more |
If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident.On March 23, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Commentaries and Analyses, Health Data, Of Note On January 2, while many were still greeting each other with “Happy New Year,” Wound Tec… Read more |
3.7 Million Telehealth Patients Allegedly Affected By Two Recent BreachesOn March 23, 2026Source: DataBreaches.NetBy DissentCategories: Breach Laws, Hack, Health Data, Subcontractor, U.S. He hasn’t attracted much attention or media coverage yet, and he doesn’t have any leak s… Read more |
Cyberscoop
DarkSword’s GitHub leak threatens to turn elite iPhone hacking into a tool for the massesOn March 24, 2026Source: CyberScoopBy Tim StarksCategories: Cybercrime, Technology, Threats, Access Now, Apple, Coruna, Cybersecurity and Infrastructure Security Agency (CISA), Darksword, Federal IT, Google, iOS, iPhone, iVerify, Jamf, Lookout, Malaysia, Saudi Arabia, spyware, Turkey, Ukraine, worm Cybersecurity researchers say the GitHub leak threatens to "democratize" iPhone exploits that were o… Read more |
Experts warn of a ‘loud and aggressive’ extortion wave following Trivy hackOn March 24, 2026Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Cybersecurity, Threats, Aqua Security, cybercrime, data breaches, Mandiant, open source, open source software, RSAC 2026 Conference, supply chain, supply chain attacks, Trivy Attackers compromised the open-source security tool and published malicious versions of the software… Read more |
Critics call FCC router rule a ‘big swing’ that could create more supply chain uncertaintyOn March 24, 2026Source: CyberScoopBy djohnsonCategories: Cybersecurity, Geopolitics, Government, Technology, FCC, regulation, routers, supply chain security, Trump administration The choice to ban all foreign-made routers instead of targeting known risks could create legal and s… Read more |
Treasury asks whether terrorism risk insurance program should bolster cyber coverageOn March 24, 2026Source: CyberScoopBy Tim StarksCategories: Financial, Government, Policy, Handala, Stryker, Government Accountability Office, cyber insurance, terrorism, Treasury Department, Congress A Federal Register notice seeks public comment on how cyber is covered within a 2002 law and program… Read more |
Russian access broker sentenced to over 6 years in prison for ransomware schemesOn March 24, 2026Source: CyberScoopBy Greg OttoCategories: Cybercrime, Cybersecurity, Department of Justice (DOJ), ransomware, Yanluowang A federal court in Indiana sentenced a Russian cybercriminal to 81 months in prison on charges relat… Read more |
Experts insist Trump administration’s cyber strategy is already paying offOn March 23, 2026Source: CyberScoopBy Matt KapkoCategories: Cybersecurity, Geopolitics, Government, Threats, cybersecurity strategy, RSAC 2026 Conference, Paladin Capital Group, cyber strategy, cyber offense, EY, consulting, deterrence, defense, Palo Alto Networks, venture capital Leaders from various cybersecurity institutions were quick to defend and evangelize the administrati… Read more |
State officials, election experts question California sheriff’s seizure of ballotsOn March 23, 2026Source: CyberScoopBy djohnsonCategories: Cybersecurity, Election Security, Government, election security, misinformation, voter fraud The attorney general has suggested the basis of the investigation and warrant stem from a rambling c… Read more |
![]() An AI-powered phishing campaign has compromised hundreds of organizationsOn March 23, 2026Source: CyberScoopBy djohnsonCategories: AI, Cybercrime, Cybersecurity, Research, Artificial Intelligence (AI), cybercrime, phishing, threat intell Huntress researchers said it’s likely the victims they've identified represent just a fraction of co… Read more |
The phone call is the new phishing emailOn March 23, 2026Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Cybersecurity, Research, Threats, cybercrime, exploit, Google Threat Intelligence Group, Mandiant, phishing, Social engineering, voice phishing, vulnerabilities, zero-day, zero-day exploit, zero-days Voice-based phishing was at the root of multiple attack sprees Mandiant responded to last year, refl… Read more |
Krebs On Security
The Hacker News
![]() FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk ConcernsOn March 25, 2026Source: The Hacker NewsByThe U.S. Federal Communications Commission (FCC) said on Monday that it was banning the import of ne… Read more The U.S. Federal Communications Commission (FCC) said on Monday that it was banning the import of new, foreign-made consumer routers, citing "unacceptable" risks to cyber and national security.
The action was designed to safeguard Americans and the underlying communications networks the country relies on, FCC Chairman Brendan Carr said in a post on X. The development means that new models of |
![]() TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD CompromiseOn March 24, 2026Source: The Hacker NewsByTeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a pop… Read more TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor.
Multiple security vendors, including Endor Labs and JFrog, revealed that litellm versions 1.82.7 and 1.82.8 were published on March |
![]() Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDROn March 24, 2026Source: The Hacker NewsByA large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based… Read more A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related documents to serve rogue installers for ConnectWise ScreenConnect that drop a tool named HwAudKiller to blind security programs using the bring your own vulnerable driver (BYOVD) technique.
"The campaign abuses Google Ads to serve rogue ScreenConnect ( |
![]() 5 Learnings from the First-Ever Gartner Market Guide for Guardian AgentsOn March 24, 2026Source: The Hacker NewsByOn February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an i… Read more On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging category. For those unfamiliar with the various Gartner report types, “a Market Guide defines a market and explains what clients can expect it to do in the short term. With the focus on early, more chaotic markets, a Market Guide does not rate or position |
![]() Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto MinerOn March 24, 2026Source: The Hacker NewsByAn ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes t… Read more An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes that lead to the deployment of cryptocurrency miners and information stealers.
"The campaign uses highly obfuscated VBScript files disguised as resume/CV documents, delivered through phishing emails," Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said in a report shared |
![]() The Hidden Cost of Cybersecurity Specialization: Losing Foundational SkillsOn March 24, 2026Source: The Hacker NewsByCybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On pa… Read more Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic problems they faced years ago: unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands.
These challenges do not |
![]() Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and CredentialsOn March 24, 2026Source: The Hacker NewsByCybersecurity researchers have uncovered a new set of malicious npm packages that are designed to st… Read more Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data.
The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below -
react-performance-suite
react-state-optimizer-core
react-fast-utilsa
ai-fast-auto-trader |
![]() TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI CredentialsOn March 24, 2026Source: The Hacker NewsByTwo more GitHub Actions workflows have become the latest to be compromised by credential-stealing ma… Read more Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack.
The workflows, both maintained by the supply chain security company Checkmarx, are listed below -
checkmarx/ast-github-action
checkmarx/kics-github-action
Cloud security |
![]() U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware DamageOn March 24, 2026Source: The Hacker NewsByA 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for… Read more A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations.
According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware attacks across the |
![]() Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data LeaksOn March 24, 2026Source: The Hacker NewsByCitrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler G… Read more Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application.
The vulnerabilities are listed below -
CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread
CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user |
How Can We Help?




















