Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

WP HTTP Error: cURL error 52: Empty reply from server

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 767

Motherboard

WP HTTP Error: A valid URL was not provided.

Data Breeches

Florida Medicare members’ data exposed as Mirra Health improperly outsourced records overseas

On March 24, 2026Source: DataBreaches.NetBy Dissent
Categories: Health Data, HIPAA, Legislation, U.S.

Skyler Shepard reports: State investigators say Mirra Health jeopardized the safety of thousands ofRead more

50 Israeli companies ‘digitally erased’

On March 24, 2026Source: DataBreaches.NetBy Dissent
Categories: cyberwar

On March 9, The Jerusalem Post reported that the Israel National Cyber Directorate had received a grRead more

Family of UMMC patient speaks out after cyberattack during lifesaving surgery

On March 24, 2026Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Health Data, Malware, U.S.

WBAL reports: A Mississippi family is sharing their story for the first time after a cyberattack disRead more

243,000 French Public School Employees Victims of Hack

On March 24, 2026Source: DataBreaches.NetBy Dissent
Categories: Education Sector, Health Data, Non-U.S.

La Revue Technique reports: A cyberattack on a French Education Ministry HR system has exposed persoRead more

Foster City goes offline after cybersecurity breach

On March 24, 2026Source: DataBreaches.NetBy Dissent
Categories: Government Sector, Hack, Malware, U.S.

The Daily Journal reports: Days after a cybersecurity breach that was “widely impacting city serviceRead more

Citing HIPAA, Groups Oppose Renewed Federal Plan to Amass Millions of Workers’ Health Data

On March 24, 2026Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Government Sector, Health Data, Legislation

Theresa Defino of the Health Care Compliance Association reports: Calling the proposal “unprecedenteRead more

Initial Access Broker sentenced to 81 months in prison for enabling Yanluowang ransomware gang

On March 23, 2026Source: DataBreaches.NetBy Dissent
Categories: Malware

A press release from the U.S. Department of Justice about a Russian initial access broker who pleadeRead more

Hackers increasingly target school districts

On March 23, 2026Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Education Sector, U.S.

Nolan Keegan reports: Hackers are increasingly treating school districts like easy ATMs for personalRead more

If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident.

On March 23, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Commentaries and Analyses, Health Data, Of Note

On January 2, while many were still greeting each other with “Happy New Year,” Wound TecRead more

3.7 Million Telehealth Patients Allegedly Affected By Two Recent Breaches

On March 23, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Laws, Hack, Health Data, Subcontractor, U.S.

He hasn’t attracted much attention or media coverage yet, and he doesn’t have any leak sRead more

Cyberscoop

DarkSword’s GitHub leak threatens to turn elite iPhone hacking into a tool for the masses

On March 24, 2026Source: CyberScoopBy Tim Starks
Categories: Cybercrime, Technology, Threats, Access Now, Apple, Coruna, Cybersecurity and Infrastructure Security Agency (CISA), Darksword, Federal IT, Google, iOS, iPhone, iVerify, Jamf, Lookout, Malaysia, Saudi Arabia, spyware, Turkey, Ukraine, worm

Cybersecurity researchers say the GitHub leak threatens to "democratize" iPhone exploits that were oRead more

Experts warn of a ‘loud and aggressive’ extortion wave following Trivy hack

On March 24, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybercrime, Cybersecurity, Threats, Aqua Security, cybercrime, data breaches, Mandiant, open source, open source software, RSAC 2026 Conference, supply chain, supply chain attacks, Trivy

Attackers compromised the open-source security tool and published malicious versions of the softwareRead more

Critics call FCC router rule a ‘big swing’ that could create more supply chain uncertainty

On March 24, 2026Source: CyberScoopBy djohnson
Categories: Cybersecurity, Geopolitics, Government, Technology, FCC, regulation, routers, supply chain security, Trump administration

The choice to ban all foreign-made routers instead of targeting known risks could create legal and sRead more

Treasury asks whether terrorism risk insurance program should bolster cyber coverage

On March 24, 2026Source: CyberScoopBy Tim Starks
Categories: Financial, Government, Policy, Handala, Stryker, Government Accountability Office, cyber insurance, terrorism, Treasury Department, Congress

A Federal Register notice seeks public comment on how cyber is covered within a 2002 law and programRead more

Russian access broker sentenced to over 6 years in prison for ransomware schemes

On March 24, 2026Source: CyberScoopBy Greg Otto
Categories: Cybercrime, Cybersecurity, Department of Justice (DOJ), ransomware, Yanluowang

A federal court in Indiana sentenced a Russian cybercriminal to 81 months in prison on charges relatRead more

Experts insist Trump administration’s cyber strategy is already paying off

On March 23, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybersecurity, Geopolitics, Government, Threats, cybersecurity strategy, RSAC 2026 Conference, Paladin Capital Group, cyber strategy, cyber offense, EY, consulting, deterrence, defense, Palo Alto Networks, venture capital

Leaders from various cybersecurity institutions were quick to defend and evangelize the administratiRead more

State officials, election experts question California sheriff’s seizure of ballots

On March 23, 2026Source: CyberScoopBy djohnson
Categories: Cybersecurity, Election Security, Government, election security, misinformation, voter fraud

The attorney general has suggested the basis of the investigation and warrant stem from a rambling cRead more

FBI: Iranian hackers targeting opponents with Telegram malware

On March 23, 2026Source: CyberScoopBy Tim Starks
Categories: Geopolitics, Technology, Threats, Federal Bureau of Investigation (FBI), Handala, Iran, malware, social media, Stryker, telegram

The campaign goes back to 2023 but is the subject of an alert amid conflict in the Middle East. TheRead more

An AI-powered phishing campaign has compromised hundreds of organizations

On March 23, 2026Source: CyberScoopBy djohnson
Categories: AI, Cybercrime, Cybersecurity, Research, Artificial Intelligence (AI), cybercrime, phishing, threat intell

Huntress researchers said it’s likely the victims they've identified represent just a fraction of coRead more

The phone call is the new phishing email

On March 23, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybercrime, Cybersecurity, Research, Threats, cybercrime, exploit, Google Threat Intelligence Group, Mandiant, phishing, Social engineering, voice phishing, vulnerabilities, zero-day, zero-day exploit, zero-days

Voice-based phishing was at the root of multiple attack sprees Mandiant responded to last year, reflRead more

Krebs On Security

The Hacker News

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

On March 25, 2026Source: The Hacker NewsBy

The U.S. Federal Communications Commission (FCC) said on Monday that it was banning the import of neRead more

The U.S. Federal Communications Commission (FCC) said on Monday that it was banning the import of new, foreign-made consumer routers, citing "unacceptable" risks to cyber and national security. The action was designed to safeguard Americans and the underlying communications networks the country relies on, FCC Chairman Brendan Carr said in a post on X. The development means that new models of

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

On March 24, 2026Source: The Hacker NewsBy

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popRead more

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor. Multiple security vendors, including Endor Labs and JFrog, revealed that litellm versions 1.82.7 and 1.82.8 were published on March

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

On March 24, 2026Source: The Hacker NewsBy

A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-basedRead more

A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related documents to serve rogue installers for ConnectWise ScreenConnect that drop a tool named HwAudKiller to blind security programs using the bring your own vulnerable driver (BYOVD) technique. "The campaign abuses Google Ads to serve rogue ScreenConnect (

5 Learnings from the First-Ever Gartner Market Guide for Guardian Agents

On March 24, 2026Source: The Hacker NewsBy

On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an iRead more

On February 25, 2026, Gartner published its inaugural Market Guide for Guardian Agents, marking an important milestone for this emerging category. For those unfamiliar with the various Gartner report types, “a Market Guide defines a market and explains what clients can expect it to do in the short term. With the focus on early, more chaotic markets, a Market Guide does not rate or position

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

On March 24, 2026Source: The Hacker NewsBy

An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes tRead more

An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes that lead to the deployment of cryptocurrency miners and information stealers. "The campaign uses highly obfuscated VBScript files disguised as resume/CV documents, delivered through phishing emails," Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said in a report shared

The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills

On March 24, 2026Source: The Hacker NewsBy

Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paRead more

Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should make organizations more secure. But in practice, many teams struggle with the same basic problems they faced years ago: unclear risk priorities, misaligned tooling decisions, and difficulty explaining security issues in terms the business understands. These challenges do not

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

On March 24, 2026Source: The Hacker NewsBy

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to stRead more

Cybersecurity researchers have uncovered a new set of malicious npm packages that are designed to steal cryptocurrency wallets and sensitive data. The activity is being tracked by ReversingLabs as the Ghost campaign. The list of identified packages, all published by a user named mikilanjillo, is below - react-performance-suite react-state-optimizer-core react-fast-utilsa ai-fast-auto-trader

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

On March 24, 2026Source: The Hacker NewsBy

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing maRead more

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by the supply chain security company Checkmarx, are listed below - checkmarx/ast-github-action checkmarx/kics-github-action Cloud security

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage

On March 24, 2026Source: The Hacker NewsBy

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison forRead more

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations. According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware attacks across the

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

On March 24, 2026Source: The Hacker NewsBy

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler GRead more

Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application. The vulnerabilities are listed below - CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user

How Can We Help?

1 + 8 =

Share This