Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
Firewall Bug Under Active Attack Triggers CISA WarningOn August 23, 2022Source: Web Security – ThreatpostBy ThreatpostCategories: Vulnerabilities, Web Security CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.… Read more |
Fake Reservation Links Prey on Weary TravelersOn August 22, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Malware, Web Security Fake travel reservations are exacting more pain from the travel weary, already dealing with the mise… Read more |
Google Patches Chrome’s Fifth Zero-Day of the YearOn August 18, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arb… Read more |
Phishers Swim Around 2FA in Coinbase Account HeistsOn August 8, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Web Security Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so the… Read more |
Open Redirect Flaw Snags Amex, Snapchat User DataOn August 5, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Vulnerabilities, Web Security Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among ot… Read more |
Universities Put Email Users at Cyber RiskOn August 2, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest prot… Read more |
Threat Actors Pivot Around Microsoft’s Macro-Blocking in OfficeOn July 28, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwa… Read more |
IoT Botnets Fuel DDoS Attacks – Are You Prepared?On July 26, 2022Source: Web Security – ThreatpostBy Sponsored ContentCategories: Sponsored, Vulnerabilities, Web Security, indusface The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies… Read more |
Magecart Serves Up Card Skimmers on Restaurant-Ordering SystemsOn July 20, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security 300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against Menu… Read more |
Authentication Risks Discovered in Okta PlatformOn July 19, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Privacy, Web Security Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational… Read more |
Beeping Computer
https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753 |
Motherboard
https://motherboard.vice.com/en_us/rss is invalid XML, likely due to invalid characters. XML error: Undeclared entity error at line 23, column 112 |
Data Breeches
A 25-Year-Old With Elon Musk Ties Has Direct Access to the Federal Payment SystemOn February 4, 2025Source: DataBreaches.NetBy DissentCategories: Government Sector, Of Note Vittoria Elliott, Dhruv Mehrotra, Leah Feiger, and Tim Marchman report: A 25-year-old engineer named… Read more |
Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay HiddenOn February 4, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Education Sector, Of Note Kept in the Dark Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden By Mark Keierlebe… Read more |
Cyberattack on NHS causes hospitals to miss cancer care targetsOn February 4, 2025Source: DataBreaches.NetBy DissentCategories: Health Data, Malware, Non-U.S., Of Note Connor Jones reports: NHS execs admit that last year’s cyberattack on hospitals in Wirral, nor… Read more |
Canadian Man Charged in $65M Cryptocurrency Hacking SchemesOn February 3, 2025Source: DataBreaches.NetBy DissentCategories: Hack A five-count criminal indictment was unsealed today in federal court in New York charging a Canadian… Read more |
Romanian Men Indicted For Access Device FraudOn February 3, 2025Source: DataBreaches.NetBy DissentCategories: Skimmers, skimmers NEW ORLEANS, LOUISIANA – United States Attorney Duane A. Evans announced that ANDREI FAGARAS (“FAGAR… Read more |
DISA Incident: Update on Review of ‘Potentially Affected Files’ and Notification PlanOn February 3, 2025Source: DataBreaches.NetBy DissentCategories: Business Sector, Health Data, U.S. BakerHostetler writes: On Thursday, Jan. 23, DISA Global Solutions, Inc. (DISA) provided an update t… Read more |
Delta County Memorial Hospital District reveals more about 2024 cyberattack that affected 148,363 peopleOn February 3, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Hack, Health Data Delta County Memorial Hospital District (Delta Health) in Colorado was the victim of a cyberattack a… Read more |
Cover-up Follow-up: Westend Dental starts notifying patients of October 2020 ransomware attackOn February 2, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Health Data, HIPAA, Malware, Of Note In December, DataBreaches reported that the Indiana Attorney General’s Office had brought char… Read more |
Operation Heart Blocker: Disruption action deals blow to criminal cyber network HeartSenderOn February 1, 2025Source: DataBreaches.NetBy DissentCategories: Of Note, Other, Phishing During a disruption action on January 29, 2025, HeartSender servers and domains were seized by vario… Read more |
Almost one year later, NorthBay Health notifies 569,012 people of breach of sensitive informationOn January 31, 2025Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Health Data, Malware, U.S. While some states are decreasing the amount of time entities have to notify the state or individuals… Read more |
Cyberscoop
Cybersecurity, government experts are aghast at security failures in DOGE takeoverOn February 4, 2025Source: CyberScoopBy djohnsonCategories: Government, Policy, Threats, data breaches, Donald Trump, Elon Musk, FISMA, OPM breach, Treasury Department Elon Musk’s takeover of key systems across the federal government is ignoring decades of laws, regul… Read more |
Android security update includes patch for actively exploited vulnerabilityOn February 4, 2025Source: CyberScoopBy Greg OttoCategories: Cybersecurity, Android, mobile, Qualcomm, vulnerabilities The monthly update closes 47 security vulnerabilities in total. The post Android security update inc… Read more |
Here’s all the ways an abandoned cloud instance can cause security issuesOn February 4, 2025Source: CyberScoopBy Greg OttoCategories: Cybersecurity, Research, Amazon Web Services (AWS), cloud computing, Cybersecurity and Infrastructure Security Agency (CISA), open source, S3 bucket, SSL, VPN gateway, watchTowr Labs Research released Tuesday by watchTowr shows how easy an old storage bucket can be repurposed by mal… Read more |
From credit card fraud to zero-day exploits: Xe Group expanding cybercriminal effortsOn February 3, 2025Source: CyberScoopBy Greg OttoCategories: Cybercrime, Cybersecurity, Research, Threats, intezer, Solis Security, VeraCore, XE Group, zero-days The Vietnam-based group has grown more sophisticated since 2013, new research shows. The post From c… Read more |
Bill requiring federal contractors to have vulnerability disclosure policies gets House redoOn January 31, 2025Source: CyberScoopBy mbrackenCategories: Government, Policy, federal contracting, Nancy Mace, Shontel Brown, vdp, vulnerability disclosure Reps. Nancy Mace and Shontel Brown reintroduced VDP legislation after the 2024 bipartisan, bicameral… Read more |
WhatsApp says it disrupted spyware campaign aimed at reporters, civil societyOn January 31, 2025Source: CyberScoopBy Tim StarksCategories: Cybersecurity, Privacy, Technology, Threats, Citizen Lab, ICE, NSO Group, Paragon, privacy, spyware, U.S. courts, WhatsApp The company linked to the campaign recently signed a deal with U.S. Immigration and Customs Enforcem… Read more |
Even the US government can fall victim to cryptojackingOn January 31, 2025Source: CyberScoopBy mbrackenCategories: Cybersecurity Documents reveal that USAID was victimized by a password spray attack that resulted in roughly $500,… Read more |
FBI nominee Kash Patel gets questions on cybercrime investigations, Silk Road founder, surveillance powersOn January 30, 2025Source: CyberScoopBy Tim StarksCategories: Cybercrime, Government, Policy, Amy Klobuchar, FBI, Federal Bureau of Investigation, Federal Bureau of Investigation (FBI), FISA, John Cornyn, Kash Patel, Peter Welch, Ross Ulbricht, Section 702, Senate Judiciary Committee, Silk Road Cyber otherwise wasn’t a big focus during the Senate Judiciary Committee hearing on Patel’s nominati… Read more |
Department of Justice partners with Dutch police to break up HeartSender networkOn January 30, 2025Source: CyberScoopBy Greg OttoCategories: Cybercrime, Threats, Department of Justice (DOJ), HeartSender, phishing kit, Saim Raza Also known as “Saim Raza,” the group was allegedly responsible for over $3 million in losses. The po… Read more |
Krebs On Security
The Hacker News
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote AccessOn February 4, 2025Source: The Hacker NewsByCybersecurity researchers have called attention to a software supply chain attack targeting the Go e… Read more Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems.
The package, named github.com/boltdb-go/bolt, is a typosquat of the legitimate BoltDB database module (github.com/boltdb/bolt), per Socket. The malicious version (1.3.1) was published to |
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW ProtectionsOn February 4, 2025Source: The Hacker NewsByA recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to de… Read more A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware.
The flaw, CVE-2025-0411 (CVSS score: 7.0), allows remote attackers to circumvent mark-of-the-web (MotW) protections and execute arbitrary code in the context of the current user. It was addressed by 7-Zip in November 2024 with version 24.09.
"The vulnerability was |
North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOSOn February 4, 2025Source: The Hacker NewsByThe North Korean threat actors behind the Contagious Interview campaign have been observed deliverin… Read more The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS malware strains dubbed FERRET as part of a supposed job interview process.
"Targets are typically asked to communicate with an interviewer through a link that throws an error message and a request to install or update some required piece of software such as VCam or |
Watch Out For These 8 Cloud Security Shifts in 2025On February 4, 2025Source: The Hacker NewsByAs cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving real… Read more As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud.
But there are other developments that could impact your organizations and drive the need for an even more robust security strategy. Let’s take a |
Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage RisksOn February 4, 2025Source: The Hacker NewsByTaiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek'… Read more Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek's Artificial Intelligence (AI) platform, citing security risks.
"Government agencies and critical infrastructure should not use DeepSeek, because it endangers national information security," according to a statement released by Taiwan's Ministry of Digital Affairs, per Radio Free Asia.
"DeepSeek |
AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin AccessOn February 4, 2025Source: The Hacker NewsByA security vulnerability has been disclosed in AMD's Secure Encrypted Virtualization (SEV) that coul… Read more A security vulnerability has been disclosed in AMD's Secure Encrypted Virtualization (SEV) that could permit an attacker to load a malicious CPU microcode under specific conditions.
The flaw, tracked as CVE-2024-56161, carries a CVSS score of 7.2 out of 10.0, indicating high severity.
"Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local |
Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 ScoreOn February 4, 2025Source: The Hacker NewsByMicrosoft has released patches to address two Critical-rated security flaws impacting Azure AI Face… Read more Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account that could allow a malicious actor to escalate their privileges under certain conditions.
The flaws are listed below -
CVE-2025-21396 (CVSS score: 7.5) - Microsoft Account Elevation of Privilege Vulnerability
CVE-2025-21415 (CVSS score: 9.9) - Azure AI Face Service |
Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104On February 4, 2025Source: The Hacker NewsByGoogle has shipped patches to address 47 security flaws in its Android operating system, including o… Read more Google has shipped patches to address 47 security flaws in its Android operating system, including one it said has come under active exploitation in the wild.
The vulnerability in question is CVE-2024-53104 (CVSS score: 7.8), which has been described as a case of privilege escalation in a kernel component known as the USB Video Class (UVC) driver.
Successful exploitation of the flaw could lead |
Microsoft SharePoint Connector Flaw Could've Enabled Credential Theft Across Power PlatformOn February 4, 2025Source: The Hacker NewsByCybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Micros… Read more Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that, if successfully exploited, could allow threat actors to harvest a user's credentials and stage follow-on attacks.
This could manifest in the form of post-exploitation actions that allow the attacker to send requests to the SharePoint API on behalf |
768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023On February 3, 2025Source: The Hacker NewsByAs many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wil… Read more As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year.
Describing 2024 as "another banner year for threat actors targeting the exploitation of vulnerabilities," VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be weaponized either on or before |