Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
![]() Firewall Bug Under Active Attack Triggers CISA WarningOn August 23, 2022Source: Web Security – ThreatpostBy ThreatpostCategories: Vulnerabilities, Web Security CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.… Read more |
![]() Fake Reservation Links Prey on Weary TravelersOn August 22, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Malware, Web Security Fake travel reservations are exacting more pain from the travel weary, already dealing with the mise… Read more |
![]() Google Patches Chrome’s Fifth Zero-Day of the YearOn August 18, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arb… Read more |
![]() Phishers Swim Around 2FA in Coinbase Account HeistsOn August 8, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Web Security Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so the… Read more |
![]() Open Redirect Flaw Snags Amex, Snapchat User DataOn August 5, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Vulnerabilities, Web Security Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among ot… Read more |
![]() Universities Put Email Users at Cyber RiskOn August 2, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest prot… Read more |
![]() Threat Actors Pivot Around Microsoft’s Macro-Blocking in OfficeOn July 28, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwa… Read more |
![]() IoT Botnets Fuel DDoS Attacks – Are You Prepared?On July 26, 2022Source: Web Security – ThreatpostBy Sponsored ContentCategories: Sponsored, Vulnerabilities, Web Security, indusface The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies… Read more |
![]() Magecart Serves Up Card Skimmers on Restaurant-Ordering SystemsOn July 20, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security 300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against Menu… Read more |
![]() Authentication Risks Discovered in Okta PlatformOn July 19, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Privacy, Web Security Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational… Read more |
Beeping Computer
| https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 767 |
Motherboard
| WP HTTP Error: A valid URL was not provided. |
Data Breeches
Hackers Offer to Sell Millions of Eurail User RecordsOn February 17, 2026Source: DataBreaches.NetBy DissentCategories: Business Sector, Non-U.S., Of Note Eduard Kovacs reports: The Netherlands-based company disclosed a data breach in mid-January, informi… Read more |
Security Lapse at MYH: Private Agency Fined After Viral VideoOn February 17, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Health Data, Non-U.S., Subcontractor Devdiscourse reports: A private security firm faced a fine of Rs 25,000 [USD $275.77] on Tuesday aft… Read more |
Poland arrests suspect linked to Phobos ransomware operationOn February 17, 2026Source: DataBreaches.NetBy DissentCategories: Malware Sergiu Gatlan reports: Polish police have detained a 47-year-old man suspected of ties to the Phobos… Read more |
Montana hospital restores phones as cyber-related network disruptions persistOn February 17, 2026Source: DataBreaches.NetBy DissentCategories: Hack, Health Data, U.S. Dysruption Hub reports: Livingston HealthCare in Livingston, Montana, says its phone system has been… Read more |
Marietta also affected by BridgePay ransomware attack.On February 16, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Government Sector, Malware, U.S. Marietta, Georgia is one of numerous entities affected by the BridgePay ransomware attack. On Februa… Read more |
He tried to extort the Dutch police. It didn’t work out well for him.On February 16, 2026Source: DataBreaches.NetBy DissentCategories: Exposure, Government Sector, Non-U.S. He wanted something in return for returning files to the Dutch police. What he got in return was an… Read more |
Nevada unveils new statewide data classification policy months after cyberattackOn February 14, 2026Source: DataBreaches.NetBy DissentCategories: Legislation, State/Local, U.S. Eric Neugeboren reports: Nevada’s IT agency has rolled out a new policy aimed at standardizing the p… Read more |
Guernsey medical practice sanctioned after cyber criminals access patient data through email accountOn February 14, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Commentaries and Analyses, Health Data, Non-U.S., Phishing itv reports: Guernsey’s Data Protection Authority (ODPA) has sanctioned First Contact Health a… Read more |
Cyber Attacks on Schools Plateaued in 2025, but More Records ExposedOn February 14, 2026Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Education Sector, U.S. Abby Sourwine reports: Ransomware attacks against schools and universities held relatively steady in… Read more |
New “Kurd Hackers Forum” Focuses on Middle Eastern Data Breaches and LeaksOn February 14, 2026Source: DataBreaches.NetBy DissentCategories: Miscellaneous, Non-U.S. Reza abasi notes that there is a new forum called the “Kurd Hacker Forum” that focuses o… Read more |
Cyberscoop
Chinese hackers exploited a Dell zero-day for 18 months before anyone noticedOn February 18, 2026Source: CyberScoopBy Matt KapkoCategories: Research, Threats, apache, backdoor, Brickstorm, China, Cybersecurity and Infrastructure Security Agency (CISA), dell technologies, Google Threat Intelligence Group, Grimbolt, hacking, malware, Mandiant, Silk Typhoon, UNC5221, UNC6201, virtual machines, vulnerability, zero-day, zero-day exploit Google researchers said Chinese attackers have been exploiting a zero-day since mid-2024, and they’v… Read more |
Polish authorities arrest alleged Phobos ransomware affiliateOn February 17, 2026Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Ransomware, ransomware, cybercrime, Poland, Department of Justice (DOJ), 8Base, Phobos The 47-year-old man, who was not identified, faces up to five years in prison for producing, obtaini… Read more |
Palo Alto Networks’ Koi acquisition is all about keeping AI agents in checkOn February 17, 2026Source: CyberScoopBy Greg OttoCategories: Money, AI, Artificial Intelligence (AI), Palo Alto Networks, mergers and acquisitions, Agentic AI, Koi Security The company says it will integrate Koi’s technology into its security offerings to improve visibilit… Read more |
Citizen Lab links Cellebrite to the hacking of a Kenyan presidential candidate’s phoneOn February 17, 2026Source: CyberScoopBy Tim StarksCategories: Privacy, privacy, Cellebrite, Citizen Lab, Kenya, Immigration and Customs Enforcement (ICE), Boniface Mwangi The research lab says forensic evidence suggests the phone-cracking technology was used against Boni… Read more |
Unit 42: Nearly two-thirds of breaches now start with identity abuseOn February 17, 2026Source: CyberScoopBy Matt KapkoCategories: Technology, Threats, Research, Cybercrime, Cybersecurity, access management, AI, credential theft, cybercrime, data breaches, identity, incident response, initial access, Misconfiguration, Palo Alto Networks, ransomware, Salesloft, Salesloft Drift, Social engineering, stolen credentials, Unit 42 Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor securit… Read more |
Why ‘secure-by-design’ systems are non-negotiable in the AI eraOn February 17, 2026Source: CyberScoopBy Greg OttoCategories: Commentary, Cybersecurity, AI, critical infrastructure, data centers, op-ed, operational technology, secure by design, software bill of materials, supply chain Trillions in AI infrastructure face systemic failure unless security begins at the chip and ends wit… Read more |
Proofpoint acquires Acuvity to tackle the security risks of agentic AIOn February 13, 2026Source: CyberScoopBy Greg OttoCategories: AI, Money, Artificial Intelligence (AI), Proofpoint, mergers and acquisitions, Agentic AI, prompt injection, model context protocol (MCP) Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your aut… Read more |
Apple discloses first actively exploited zero-day of 2026On February 12, 2026Source: CyberScoopBy Matt KapkoCategories: Cybersecurity, Threats, Apple, vulnerability disclosure, attack, Cybersecurity and Infrastructure Security Agency (CISA), zero days, vulnerability reporting, zero-day The vendor said the memory-corruption defect was exploited to target specific people, but it did not… Read more |
Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycleOn February 12, 2026Source: CyberScoopBy djohnsonCategories: Technology, Cybersecurity, AI, Russia, China, Iran, Artificial Intelligence (AI), North Korea, research, APT, AI hacking, Google Gemini The research underscores how AI tools have matured in their cyber offensive capabilities, even as it… Read more |
CISA to host industry feedback sessions on cyber incident reporting regulationOn February 12, 2026Source: CyberScoopBy Tim StarksCategories: Government, Policy, chemical plants, CIRCIA, Cybersecurity and Infrastructure Security Agency (CISA), ransomware, regulation, small business One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. T… Read more |
Krebs On Security
The Hacker News
![]() Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches FasterOn February 17, 2026Source: The Hacker NewsByCloud attacks move fast — faster than most incident response teams. In data centers, investigations… Read more Cloud attacks move fast — faster than most incident response teams.
In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins.
Cloud forensics is fundamentally |
![]() Researchers Show Copilot and Grok Can Be Abused as Malware C2 ProxiesOn February 17, 2026Source: The Hacker NewsByCybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support w… Read more Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection.
The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok |
![]() Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA UpdatesOn February 17, 2026Source: The Hacker NewsByA new Android backdoor that's embedded deep into the device firmware can silently harvest data and r… Read more A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky.
The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase. |
![]() SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC InfostealerOn February 17, 2026Source: The Hacker NewsByCybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distrib… Read more Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an information stealer known as StealC.
"The threat actors cloned a legitimate Oura MCP Server – a tool that connects AI assistants to Oura Ring health data – and built a deceptive |
![]() My Day Getting My Hands Dirty with an NDR SystemOn February 17, 2026Source: The Hacker NewsByMy objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human r… Read more My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to be a network security analyst now?
My objective
As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response ( |
![]() Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot RecommendationsOn February 17, 2026Source: The Hacker NewsByNew research from Microsoft has revealed that legitimate businesses are gaming artificial intelligen… Read more New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine poisoning (SEO).
The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant |
![]() Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer BetaOn February 17, 2026Source: The Hacker NewsByApple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encrypti… Read more Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages.
The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS.
"End-to-end encryption is in beta and is not available for all |
![]() Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway TokensOn February 16, 2026Source: The Hacker NewsByCybersecurity researchers disclosed they have detected a case of an information stealer infection su… Read more Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment.
"This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [ |
![]() Study Uncovers 25 Password Recovery Attacks in Major Cloud Password ManagersOn February 16, 2026Source: The Hacker NewsByA new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, an… Read more A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions.
"The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said. |
![]() Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI MalwareOn February 16, 2026Source: The Hacker NewsByThis week’s recap shows how small gaps are turning into big entry points. Not always through new exp… Read more This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question.
Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being used side by side, whichever path |
How Can We Help?




























