Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
Firewall Bug Under Active Attack Triggers CISA WarningOn August 23, 2022Source: Web Security – ThreatpostBy ThreatpostCategories: Vulnerabilities, Web Security CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.… Read more |
Fake Reservation Links Prey on Weary TravelersOn August 22, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Malware, Web Security Fake travel reservations are exacting more pain from the travel weary, already dealing with the mise… Read more |
Google Patches Chrome’s Fifth Zero-Day of the YearOn August 18, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arb… Read more |
Phishers Swim Around 2FA in Coinbase Account HeistsOn August 8, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Web Security Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so the… Read more |
Open Redirect Flaw Snags Amex, Snapchat User DataOn August 5, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Vulnerabilities, Web Security Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among ot… Read more |
Universities Put Email Users at Cyber RiskOn August 2, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest prot… Read more |
Threat Actors Pivot Around Microsoft’s Macro-Blocking in OfficeOn July 28, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwa… Read more |
IoT Botnets Fuel DDoS Attacks – Are You Prepared?On July 26, 2022Source: Web Security – ThreatpostBy Sponsored ContentCategories: Sponsored, Vulnerabilities, Web Security, indusface The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies… Read more |
Magecart Serves Up Card Skimmers on Restaurant-Ordering SystemsOn July 20, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security 300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against Menu… Read more |
Authentication Risks Discovered in Okta PlatformOn July 19, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Privacy, Web Security Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational… Read more |
Beeping Computer
https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753 |
Motherboard
https://motherboard.vice.com/en_us/rss is invalid XML, likely due to invalid characters. XML error: Undeclared entity error at line 23, column 112 |
Data Breeches
Today’s reminder not to just repeat threat actors’ claims without checking or attempting to verify them first.On January 22, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses Here’s today’s reminder not to just repeat threat actors’ claims without checking… Read more |
European Commission Publishes Action Plan on Cybersecurity of Hospitals and Healthcare ProvidersOn January 21, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Non-U.S. Mark Young & David Brazil of Covington and Burling write: On 15 January 2025, the European Comm… Read more |
Cybersecurity Incident Impacting Addison Northwest School District (ANWSD)On January 21, 2025Source: DataBreaches.NetBy DissentCategories: Education Sector, U.S. Legacy data and servers have bitten another entity. Kudos to Addison Northwest School District (ANWS… Read more |
Toronto student information dating back to 1985 may have been accessed in PowerSchool cyber incidentOn January 20, 2025Source: DataBreaches.NetBy DissentCategories: Education Sector, Non-U.S., Of Note, Subcontractor Meredith Bond reports: Student information for those who attended Toronto District School Board as f… Read more |
The U.K. is considering prohibiting ransom payments. It’s a difficult issue.On January 20, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Malware, Miscellaneous, Of Note, extortion, ransom, ransomware How many times have the FBI and CISA urged entities NOT to pay ransom because it just encourages the… Read more |
DOJ confirms arrested US Army soldier is linked to AT&T and Verizon hacksOn January 18, 2025Source: DataBreaches.NetBy DissentCategories: Business Sector, Of Note, Subcontractor, U.S. Zack Whittaker reports: U.S. prosecutors have formally linked the arrest of a serving U.S. Army sold… Read more |
FBI Warned Agents It Believes Phone Logs Hacked Last YearOn January 18, 2025Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Hack, Of Note Jake Bleiberg and Margi Murphy FBI leaders have warned that they believe hackers who broke into AT… Read more |
MedSave Health Insurance TPA hacked; firm has yet to comment or respondOn January 17, 2025Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Hack, Health Data, Non-U.S. The individual known as “0mid16B” has been busy, it seems. They contacted DataBreaches o… Read more |
HHS Office for Civil Rights Settles HIPAA Ransomware Cybersecurity Investigation for $10,000On January 16, 2025Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Health Data, HIPAA, Malware, U.S. Settlement with Northeast Surgical Group marks OCR’s 10th ransomware enforcement action and 4th enfo… Read more |
FTC Takes Action Against GoDaddy for Alleged Lax Data Security for Its Website Hosting ServicesOn January 15, 2025Source: DataBreaches.NetBy DissentCategories: Business Sector, Federal, U.S. Proposed order will prohibit GoDaddy from misleading customers about its security protections and re… Read more |
Cyberscoop
Ransomware groups pose as fake tech support over TeamsOn January 21, 2025Source: CyberScoopBy djohnsonCategories: Ransomware, Microsoft, ransomware, Sophos A researcher at Sophos told CyberScoop that the company observed these tactics being used against mu… Read more |
From qualitative to quantifiable: Transforming cyber risk management for critical infrastructureOn January 21, 2025Source: CyberScoopBy mbrackenCategories: Commentary, critical infrastructure, cyber risk management, cyber risk quantification, Transportation Security Administration (TSA) TSA’s new incident disclosure rules are a good fit for cyber risk quantification. The post From qual… Read more |
TSA extends cyber requirements for pipeline ownersOn January 17, 2025Source: CyberScoopBy mbrackenCategories: Cybersecurity, Colonial Pipeline, pipeline rules, Transportation Security Administration (TSA) The agency added an additional year to two post-Colonial Pipeline security directives. The post TSA… Read more |
Noem: No anti-disinformation, misinformation action under her as DHS secretaryOn January 17, 2025Source: CyberScoopBy Tim StarksCategories: Government, Joe Biden, Josh Hawley, Kristi Noem, Cybersecurity and Infrastructure Security Agency, Trump, Disinformation Governance Board, disinformation, Biden, Biden administration, U.S. Supreme Court, CISA, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), Chris Krebs, rand paul, Supreme Court, Sen. Ron Johnson, Senate Homeland Security and Governmental Affairs Committee, Ron Johnson, Trump administration, Donald Trump She said at her confirmation hearing that CISA needs to be “smaller, more nimble” and it has gone “f… Read more |
Treasury sanctions Chinese cybersecurity company, affiliate for Salt Typhoon hacksOn January 17, 2025Source: CyberScoopBy djohnsonCategories: Cybercrime, China, Flax Typhoon, Office of Foreign Assets Control (OFAC), Salt Typhoon, Treasury Department It’s the first formal attribution for the campaign that has swept up data from at least nine telecom… Read more |
Closing software-understanding gap is critical to national security, CISA saysOn January 17, 2025Source: CyberScoopBy mbrackenCategories: Cybersecurity, China, DARPA, software, nsa, Cybersecurity and Infrastructure Security Agency (CISA) In a joint report with DARPA and others, the cyber agency said that knowledge gap “exacerbates” risk… Read more |
Restoring U.S. cyber resilience: A blueprint for the new administrationOn January 17, 2025Source: CyberScoopBy Greg OttoCategories: Commentary, CDK Global, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), MOVEit Transfer, resilience, Salt Typhoon, Volt Typhoon The Trump administration can start by returning CISA to its core mission, former DHS and California… Read more |
How HHS has strengthened cybersecurity of hospitals and health care systemsOn January 17, 2025Source: CyberScoopBy mbrackenCategories: Commentary, Department of Health and Human Services (HHS), health care The agency has embraced performance goals, provided resources to small systems and improved coordina… Read more |
Treasury sanctions North Korea over remote IT worker schemesOn January 16, 2025Source: CyberScoopBy Greg OttoCategories: Geopolitics, Government, North Korea, North Korean IT workers, sanctions, Treasury Department The North Korean office responsible for the scheme, Department 53, was created to funnel money back… Read more |
Biden cyber executive order gets mostly plaudits, but its fate is uncertainOn January 16, 2025Source: CyberScoopBy Tim StarksCategories: Government, AI, AI executive order, artificial intelligence, Bennie Thompson, Biden, Biden administration, Bob Kolasky, Center for Cybersecurity Policy and Law, Center for Democracy & Technology, Center for Democracy and Technology, Chris Inglis, CISA, cloud computing, contracting, critical infrastructure, Cybersecurity and Infrastructure Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), Donald Trump, encryption, fraud, House Homeland Security Committee, Joe Biden, Mark Green, National Cyber Director, National Risk Management Center, National Security Council, National Security Council (NSC), Office of the National Cyber Director, operational technology, phishing, quantum computing, supply chain, supply chain security, Trump, Trump administration At least one key Republican told CyberScoop that he wasn’t happy about the last-minute nature of the… Read more |
Krebs On Security
The Hacker News
Oracle Releases January 2025 Patch to Address 318 Flaws Across Major ProductsOn January 22, 2025Source: The Hacker NewsByOracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new… Read more Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services.
The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances.
"Easily exploitable |
Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT DevicesOn January 22, 2025Source: The Hacker NewsByWeb infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Ter… Read more Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date.
The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia. The activity originated |
Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei RoutersOn January 21, 2025Source: The Hacker NewsByCybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in… Read more Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc Botnet.
The ongoing activity "demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks," Qualys security researcher Shilpesh |
13,000 MikroTik Routers Hijacked by Botnet for Malspam and CyberattacksOn January 21, 2025Source: The Hacker NewsByA global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagat… Read more A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices.
The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week. "This |
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized PartiesOn January 21, 2025Source: The Hacker NewsByA former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitti… Read more A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity.
Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to |
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing ProjectsOn January 21, 2025Source: The Hacker NewsByImagine receiving a penetration test report that leaves you with more questions than answers. Questi… Read more Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app tested?" or " Were there any security issues that could have been identified during testing?" often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest |
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software InstallersOn January 21, 2025Source: The Hacker NewsByCybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chin… Read more Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT.
The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week.
The infection chain commences with a phishing |
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security AuditsOn January 21, 2025Source: The Hacker NewsByThe Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown… Read more The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests.
The AnyDesk requests claim to be for conducting an audit to assess the "level of security," CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to |
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and RoutersOn January 20, 2025Source: The Hacker NewsByNew research has uncovered security vulnerabilities in multiple tunneling protocols that could allow… Read more New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks.
"Internet hosts that accept tunneling packets without verifying the sender's identity can be hijacked to perform anonymous attacks and provide access to their networks," Top10VPN said in a study, as part of a collaboration with KU Leuven professor |
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence CollectionOn January 20, 2025Source: The Hacker NewsByThe Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targ… Read more The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks.
The artifacts in question, named Tanzeem (meaning "organization" in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the |