Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

WP HTTP Error: cURL error 52: Empty reply from server

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 767

Motherboard

WP HTTP Error: A valid URL was not provided.

Data Breeches

City of Anthony, NM, public records have been suspiciously disappeared, locked, or wiped

On April 13, 2026Source: DataBreaches.NetBy Dissent
Categories: Government Sector, Miscellaneous, Of Note

There are insider breaches, and then there are fourth-degree felonies and other possible charges ifRead more

A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard

On April 13, 2026Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Commentaries and Analyses, Hack, U.S.

When the FBI issued a Private Industry Notice in May 2025 about the Silent Ransom Group (SRG) targetRead more

Booking.com warns customers their private travel details may have been accessed by ‘unauthorised party’

On April 13, 2026Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Hack

Here we go again?  Lara Pearce reports: Popular travel website Booking.com has warned customers thatRead more

GTA-maker Rockstar Games hacked again but downplays impact

On April 13, 2026Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Hack, Subcontractor

Joe Tidy reports: Grand Theft Auto developer Rockstar Games has been targeted for a second time in tRead more

MN: Spring Lake Park Schools Closed After Suspected Ransomware Attack

On April 13, 2026Source: DataBreaches.NetBy Dissent
Categories: Education Sector, U.S.

Spring Lake Park Today reports: Spring Lake Park Schools in Minnesota were forced to close on MondayRead more

Brockton Hospital still dealing with aftermath of ransomware attack

On April 11, 2026Source: DataBreaches.NetBy Dissent
Categories: Health Data, Malware

Yesterday, Bryan Lambert reported:  Health care providers at Brockton Hospital are preparing to workRead more

Silent Ransom Group leaked another big law firm: Orrick, Herrington & Sutcliffe

On April 10, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Business Sector, Hack

Jones Day wasn’t the only big law firm to recently fall prey to threat actors variously knownRead more

Ex-Meta worker investigated for downloading 30,000 private Facebook photos

On April 9, 2026Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Insider

Laura Cress reports: A former Meta employee suspected of downloading around 30,000 private images ofRead more

Lotte Card given notice of $3M penalty, business suspension over massive data breach

On April 9, 2026Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Financial Sector, Non-U.S.

Yonhap News reports: Lotte Card has been notified by the financial watchdog that it is liable for arRead more

86% of businesses refused to pay cyber ransoms in 2025 — Coalition Insurance

On April 9, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Commentaries and Analyses

Two firms recently told DataBreaches that about 30% or more of their clients pay ransom after a cybeRead more

Cyberscoop

Secretary Mullin must help finish the job: Urge the Senate to confirm Plankey

On April 14, 2026Source: CyberScoopBy Greg Otto
Categories: Commentary, Cybersecurity, Government, China, CISA, Iran, leadership, op-ed, Russia, Senate

With global cyber threats escalating and budget cuts looming, CISA needs a Senate-confirmed directorRead more

Here’s how cyber heavyweights in the US and UK are dealing with Claude Mythos

On April 13, 2026Source: CyberScoopBy djohnson
Categories: AI, Anthropic, Artificial Intelligence (AI), capture the flag, Cloud Security Alliance, Cybersecurity and Infrastructure Security Agency (CISA), nsa, operational technology, Project Glasswing, SANS Institute

Two reports from former high-level U.S. cyber officials and the UK government’s top AI research instRead more

OpenAI’s Mac apps need updates thanks to the Axios hack

On April 13, 2026Source: CyberScoopBy Matt Kapko
Categories: Technology, Threats, Research, Cybersecurity, AI, Artificial Intelligence (AI), cybercrime, hacking, open source, open source software, OpenAI, supply chain, supply chain attacks

The company said a developer tool automatically retrieved a malicious version of the popular open-soRead more

Commerce setting up new AI export regime to push adoption of ‘American AI’ abroad

On April 10, 2026Source: CyberScoopBy djohnson
Categories: Uncategorized, Government, Geopolitics, Cybersecurity, AI, Trump administration, export control, Dept of Commerce

 The department is looking to create a “menu of priority AI export packages that the U.S. GovernmentRead more

Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairs

On April 9, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybersecurity, Geopolitics, Government, Research, Threats, automation, Censys, energy, government, industrial control systems (ICS), Iran, operational technology, programmable logic controllers, Rockwell Automation, water sector

Censys researchers warned that thousands of devices are exposed to the Iranian government’s campaignRead more

Why is the timeline to quantum-proof everything constantly shrinking?

On April 9, 2026Source: CyberScoopBy djohnson
Categories: Cybersecurity, China, encryption, Google, Oratomic, quantum computing, SandboxAQ

Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthrougRead more

Don’t just fight fraud, hunt it

On April 9, 2026Source: CyberScoopBy Greg Otto
Categories: Commentary, Uncategorized, White House, critical infrastructure, fraud, Artificial Intelligence (AI), op-ed, National Cybersecurity Strategy, identity fraud

As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructRead more

Hack-for-hire spyware campaign targets journalists in Middle East, North Africa

On April 8, 2026Source: CyberScoopBy Tim Starks
Categories: Geopolitics, Privacy, Threats, Access Now, Committee to Protect Journalists, Bitter, ProSpy, smex, hack-for-hire, Africa, Android, Lebanon, India, spearphishing, Egypt, United Arab Emirates (UAE), ESET, Middle East, Lookout, spyware, privacy

Access Now, Lookout and SMEX joined research forces to find a campaign involving suspected Indian goRead more

Feds quash widespread Russia-backed espionage network spanning 18,000 devices

On April 7, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybersecurity, Government, Research, Threats, Department of Justice (DOJ), TP-Link Technologies, Black Lotus Labs, Microsoft Threat Intelligence, MicroTik, Forest Blizzard, United Kingdom (U.K.), Federal Bureau of Investigation (FBI), Russia, espionage, Microsoft, Fancy Bear, APT28, GRU, NCSC

Forest Blizzard, a threat group attributed to Russia’s GRU, hijacked network traffic to steal credenRead more

Krebs On Security

The Hacker News

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

On April 14, 2026Source: The Hacker NewsBy

A nascent Android remote access trojan called Mirax has been observed actively targeting SpanisRead more

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta. "Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

On April 14, 2026Source: The Hacker NewsBy

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day pRead more

OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly 400%. The surge in AI-assisted development is creating a "velocity gap" where the density of high-impact vulnerabilities is scaling faster than

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

On April 14, 2026Source: The Hacker NewsBy

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extRead more

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited. According to Socket, the extensions are published

ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

On April 14, 2026Source: The Hacker NewsBy

A critical security vulnerability impacting ShowDoc, a document management and collaboration seRead more

A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0. It relates to a case of unrestricted file upload that stems from improper validation of

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

On April 14, 2026Source: The Hacker NewsBy

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen securiRead more

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2026-21643 (CVSS score: 9.1) -  An SQL injection vulnerability in  Fortinet FortiClient EMS that could allow an unauthenticated attacker to

JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025

On April 13, 2026Source: The Hacker NewsBy

Banks and financial institutions in Latin American countries like Brazil and Mexico have continued tRead more

Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT. A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect system metadata. "One of the

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

On April 13, 2026Source: The Hacker NewsBy

The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police,Read more

The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims' account credentials and attempt more than $20 million in fraud. In tandem, authorities detained the alleged developer, who has&

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

On April 13, 2026Source: The Hacker NewsBy

Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tRead more

Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings where the gap between a quiet shift and a full-blown incident response is basically

Your MTTD Looks Great. Your Post-Alert Gap Doesn't

On April 13, 2026Source: The Hacker NewsBy

Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zeRead more

Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from proliferation. CrowdStrike's 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant's M-Trends

North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT Malware

On April 13, 2026Source: The Hacker NewsBy

The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a freshRead more

The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan called RokRAT. "The threat actor used two Facebook

How Can We Help?

9 + 14 =

Share This