Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

Firewall Bug Under Active Attack Triggers CISA Warning

On August 23, 2022Source: Web Security – ThreatpostBy Threatpost
Categories: Vulnerabilities, Web Security

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read more

Fake Reservation Links Prey on Weary Travelers

On August 22, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Malware, Web Security

Fake travel reservations are exacting more pain from the travel weary, already dealing with the miseRead more

Google Patches Chrome’s Fifth Zero-Day of the Year

On August 18, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbRead more

Phishers Swim Around 2FA in Coinbase Account Heists

On August 8, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Web Security

Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so theRead more

Open Redirect Flaw Snags Amex, Snapchat User Data

On August 5, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Vulnerabilities, Web Security

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among otRead more

Universities Put Email Users at Cyber Risk

On August 2, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security

DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest protRead more

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

On July 28, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwaRead more

IoT Botnets Fuel DDoS Attacks – Are You Prepared?

On July 26, 2022Source: Web Security – ThreatpostBy Sponsored Content
Categories: Sponsored, Vulnerabilities, Web Security, indusface

The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifiesRead more

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

On July 20, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuRead more

Authentication Risks Discovered in Okta Platform

On July 19, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Privacy, Web Security

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizationalRead more

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753

Motherboard

WP HTTP Error: A valid URL was not provided.

Data Breeches

Terrible tales of opsec oversights: How cybercrooks get themselves caught

On July 1, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses

Connor Jones reports: They say that success breeds complacency, and complacency leads to failure. FoRead more

International Criminal Court hit with cyber attack during NATO summit

On July 1, 2025Source: DataBreaches.NetBy Dissent
Categories: Miscellaneous, Non-U.S.

Euronews with AP reports: The International Criminal Court has been targeted by a “sophisticated” cyRead more

Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”

On July 1, 2025Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Health Data, Non-U.S.

On June 28, Pembroke Regional Hospital issued a press release. The Pembroke Observer reports: The PeRead more

Iran-linked hackers threaten to release emails allegedly stolen from Trump associates

On July 1, 2025Source: DataBreaches.NetBy Dissent
Categories: Government Sector

Rebecca Falconer reports: An Iran-linked cyberattack group that hacked President Trump’s 2024Read more

National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

On June 30, 2025Source: DataBreaches.NetBy Dissent
Categories: Health Data, ID Theft, Miscellaneous, fraud

The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown,Read more

Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data

On June 30, 2025Source: DataBreaches.NetBy Dissent
Categories: Health Data, Non-U.S.

Investing reports: Switzerland confirmed Monday that a cyberattack on the non-profit health foundatiRead more

Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized

On June 30, 2025Source: DataBreaches.NetBy Dissent
Categories: Malware, Non-U.S., crylock

The Brussels Criminal Court has sentenced a Russian hacker to 7 years in prison. His former partnerRead more

Bolton Walk-In Clinic patient data leak locked down (finally!)

On June 30, 2025Source: DataBreaches.NetBy Dissent
Categories: Health Data, Non-U.S., Of Note

Finally, finally, FINALLY:  exposed patient files from the Bolton Walk-In Clinic in Ontario have beeRead more

50 Customers of French Bank Hit by Insider SIM Swap Scam

On June 30, 2025Source: DataBreaches.NetBy Dissent
Categories: Financial Sector, Insider, Non-U.S., SIM Swap; insider threat

Eric Priezkalns reports: A business student who was interning at Société Générale, a leading multinaRead more

Ontario health agency atHome ordered to inform 200,000 patients of March data breach

On June 30, 2025Source: DataBreaches.NetBy Dissent
Categories: Government Sector, Health Data, Non-U.S., Subcontractor

Isaac Callan and Colin D’Mello report that Ontario’s health minister is ordering atHome,Read more

Cyberscoop

Scammers have a new tactic: impersonating DOGE

On June 30, 2025Source: CyberScoopBy mbracken
Categories: Threats

An email reviewed by Scoop News Group and analyzed by Proofpoint reveals the latest attempt by fraudRead more

Arrest, seizures in latest U.S. operation against North Korean IT workers

On June 30, 2025Source: CyberScoopBy Tim Starks
Categories: Cybercrime, Financial, Government, Technology, Threats, China, crypto, crypto crime, Department of Justice (DOJ), Federal Bureau of Investigation (FBI), North Korea, North Korean IT workers, taiwan

The coordinated steps included searches spanning 16 states involving workers who obtained employmentRead more

Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

On June 28, 2025Source: CyberScoopBy Tim Starks
Categories: Cybercrime, Government, Privacy, Technology, Federal Bureau of Investigation (FBI), surveillance, mobile, United Kingdom (U.K.), Mexico, Department of Justice (DOJ), cameras, El Chapo, National Health Service

A cartel affiliate notified an FBI agent about a hacker who infiltrated cameras and phones to trackRead more

Slavery, torture, human trafficking discovered at 53 Cambodian online scamming compounds

On June 27, 2025Source: CyberScoopBy Tim Starks
Categories: Cybercrime, Amnesty International, Cambodia, human rights, pig butchering, Southeast Asia

Pig butchering scams were the most common activity carried out at the facilities identified in the ARead more

Microsoft security updates address CrowdStrike crash, kill ‘Blue Screen of Death’

On June 27, 2025Source: CyberScoopBy djohnson
Categories: Technology, antivirus, CrowdStrike, kernel, Microsoft, Windows

Third-party antivirus software will no longer have access to the Windows kernel as Microsoft rolls oRead more

Scattered Spider strikes again? Aviation industry appears to be next target for criminal group

On June 27, 2025Source: CyberScoopBy Greg Otto
Categories: Cybercrime, Cybersecurity, Transportation, Mandiant, Scattered Spider, Unit 42

Hawaiian Airlines announced a cybersecurity incident Friday as security experts warned of a sector-wRead more

Notorious cybercriminal ‘IntelBroker’ arrested in France, awaits extradition to US

On June 26, 2025Source: CyberScoopBy Matt Kapko
Categories: Cybercrime, Cybersecurity, Arrest, data theft, Department of Justice (DOJ), Justice Department, Stolen data

Kai West, a 25-year-old British national, is accused of stealing data from more than 40 organizationRead more

Many data brokers aren’t registering across state lines, privacy groups say

On June 25, 2025Source: CyberScoopBy djohnson
Categories: Cybersecurity, Privacy, data brokers, EFF, Privacy Rights Clearinghouse

An analysis of four states with data broker registry laws found that hundreds of brokers are registeRead more

Short-term extension of expiring cyber information-sharing law could be on the table

On June 25, 2025Source: CyberScoopBy Tim Starks
Categories: Government, Policy, information sharing, Information Technology Industry Council, liability, Cybersecurity Information Sharing Act, Internet Security Alliance

Time is running short for Congress to renew the 2015 Cybersecurity Information Sharing Act. The postRead more

Citrix users hit by actively exploited zero-day vulnerability

On June 25, 2025Source: CyberScoopBy Matt Kapko
Categories: Cybercrime, Cybersecurity, Technology, Citrix, NetScaler, virtual private network (VPN), VPN gateway, vulnerability, zero days, zero-days

The vendor disclosed the critical zero-day in NetScaler ADC and NetScaler Gateway nine days after itRead more

Krebs On Security

The Hacker News

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

On July 1, 2025Source: The Hacker NewsBy

Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are stillRead more

Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks weren’t designed to handle. For security leaders who know

Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update

On July 1, 2025Source: The Hacker NewsBy

Google has released security updates to address a vulnerability in its Chrome browser for which an eRead more

Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine. "Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary

U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms

On July 1, 2025Source: The Hacker NewsBy

The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North KoreanRead more

The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers. The coordinated action saw searches of 21 known or suspected "laptop farms" between June 10 and 17, 2025, across 14 states

Microsoft Removes Password Management from Authenticator App Starting August 2025

On July 1, 2025Source: The Hacker NewsBy

Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1Read more

Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025. Microsoft’s move is part of a much larger shift away from traditional password-based logins. The company said the changes are also meant to streamline autofill within its two-factor authentication (2FA) app, making the experience simpler and more secure.Over the past few years, Microsoft

U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure

On June 30, 2025Source: The Hacker NewsBy

U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyberRead more

U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber attacks from Iranian state-sponsored or affiliated threat actors.  "Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events," the agencies said. "These cyber actors often

Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects

On June 30, 2025Source: The Hacker NewsBy

Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €4Read more

Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world. The international effort, codenamed Operation Borrelli was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said the

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

On June 30, 2025Source: The Hacker NewsBy

The threat actor known as Blind Eagle has been attributed with high confidence to the use of the RusRead more

The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that leverages Visual Basic Script (VBS) files as its

Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

On June 30, 2025Source: The Hacker NewsBy

Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of anRead more

Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the Verizon DBIR, attackers are more commonly using stolen

⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

On June 30, 2025Source: The Hacker NewsBy

Ever wonder what happens when attackers don’t break the rules—they just follow them better than we dRead more

Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior quietly opens the door to risk? This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a broken firewall or missed patch—it’s about the small choices, default settings

FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering

On June 28, 2025Source: The Hacker NewsBy

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cyberRead more

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector. To that end, the agency said it's actively working with aviation and industry partners to combat the activity and help victims. "These actors rely on social engineering techniques, often impersonating

How Can We Help?

4 + 13 =

Share This