Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

Firewall Bug Under Active Attack Triggers CISA Warning

On August 23, 2022Source: Web Security – ThreatpostBy Threatpost
Categories: Vulnerabilities, Web Security

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read more

Fake Reservation Links Prey on Weary Travelers

On August 22, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Malware, Web Security

Fake travel reservations are exacting more pain from the travel weary, already dealing with the miseRead more

Google Patches Chrome’s Fifth Zero-Day of the Year

On August 18, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbRead more

Phishers Swim Around 2FA in Coinbase Account Heists

On August 8, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Web Security

Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so theRead more

Open Redirect Flaw Snags Amex, Snapchat User Data

On August 5, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Vulnerabilities, Web Security

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among otRead more

Universities Put Email Users at Cyber Risk

On August 2, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security

DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest protRead more

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

On July 28, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwaRead more

IoT Botnets Fuel DDoS Attacks – Are You Prepared?

On July 26, 2022Source: Web Security – ThreatpostBy Sponsored Content
Categories: Sponsored, Vulnerabilities, Web Security, indusface

The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifiesRead more

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

On July 20, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuRead more

Authentication Risks Discovered in Okta Platform

On July 19, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Privacy, Web Security

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizationalRead more

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 767

Motherboard

WP HTTP Error: A valid URL was not provided.

Data Breeches

Hackers Offer to Sell Millions of Eurail User Records

On February 17, 2026Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Non-U.S., Of Note

Eduard Kovacs reports: The Netherlands-based company disclosed a data breach in mid-January, informiRead more

Security Lapse at MYH: Private Agency Fined After Viral Video

On February 17, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Health Data, Non-U.S., Subcontractor

Devdiscourse reports: A private security firm faced a fine of Rs 25,000 [USD $275.77] on Tuesday aftRead more

Poland arrests suspect linked to Phobos ransomware operation

On February 17, 2026Source: DataBreaches.NetBy Dissent
Categories: Malware

Sergiu Gatlan reports: Polish police have detained a 47-year-old man suspected of ties to the PhobosRead more

Montana hospital restores phones as cyber-related network disruptions persist

On February 17, 2026Source: DataBreaches.NetBy Dissent
Categories: Hack, Health Data, U.S.

Dysruption Hub reports: Livingston HealthCare in Livingston, Montana, says its phone system has beenRead more

Marietta also affected by BridgePay ransomware attack.

On February 16, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Government Sector, Malware, U.S.

Marietta, Georgia is one of numerous entities affected by the BridgePay ransomware attack. On FebruaRead more

He tried to extort the Dutch police. It didn’t work out well for him.

On February 16, 2026Source: DataBreaches.NetBy Dissent
Categories: Exposure, Government Sector, Non-U.S.

He wanted something in return for returning files to the Dutch police. What he got in return was anRead more

Nevada unveils new statewide data classification policy months after cyberattack

On February 14, 2026Source: DataBreaches.NetBy Dissent
Categories: Legislation, State/Local, U.S.

Eric Neugeboren reports: Nevada’s IT agency has rolled out a new policy aimed at standardizing the pRead more

Guernsey medical practice sanctioned after cyber criminals access patient data through email account

On February 14, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Commentaries and Analyses, Health Data, Non-U.S., Phishing

itv reports: Guernsey’s Data Protection Authority (ODPA) has sanctioned First Contact Health aRead more

Cyber Attacks on Schools Plateaued in 2025, but More Records Exposed

On February 14, 2026Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Education Sector, U.S.

Abby Sourwine reports: Ransomware attacks against schools and universities held relatively steady inRead more

New “Kurd Hackers Forum” Focuses on Middle Eastern Data Breaches and Leaks

On February 14, 2026Source: DataBreaches.NetBy Dissent
Categories: Miscellaneous, Non-U.S.

Reza abasi notes that there is a new forum called the “Kurd Hacker Forum” that focuses oRead more

Cyberscoop

Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed

On February 18, 2026Source: CyberScoopBy Matt Kapko
Categories: Research, Threats, apache, backdoor, Brickstorm, China, Cybersecurity and Infrastructure Security Agency (CISA), dell technologies, Google Threat Intelligence Group, Grimbolt, hacking, malware, Mandiant, Silk Typhoon, UNC5221, UNC6201, virtual machines, vulnerability, zero-day, zero-day exploit

Google researchers said Chinese attackers have been exploiting a zero-day since mid-2024, and they’vRead more

Polish authorities arrest alleged Phobos ransomware affiliate

On February 17, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybercrime, Ransomware, ransomware, cybercrime, Poland, Department of Justice (DOJ), 8Base, Phobos

The 47-year-old man, who was not identified, faces up to five years in prison for producing, obtainiRead more

Palo Alto Networks’ Koi acquisition is all about keeping AI agents in check

On February 17, 2026Source: CyberScoopBy Greg Otto
Categories: Money, AI, Artificial Intelligence (AI), Palo Alto Networks, mergers and acquisitions, Agentic AI, Koi Security

The company says it will integrate Koi’s technology into its security offerings to improve visibilitRead more

Citizen Lab links Cellebrite to the hacking of a Kenyan presidential candidate’s phone

On February 17, 2026Source: CyberScoopBy Tim Starks
Categories: Privacy, privacy, Cellebrite, Citizen Lab, Kenya, Immigration and Customs Enforcement (ICE), Boniface Mwangi

The research lab says forensic evidence suggests the phone-cracking technology was used against BoniRead more

Unit 42: Nearly two-thirds of breaches now start with identity abuse

On February 17, 2026Source: CyberScoopBy Matt Kapko
Categories: Technology, Threats, Research, Cybercrime, Cybersecurity, access management, AI, credential theft, cybercrime, data breaches, identity, incident response, initial access, Misconfiguration, Palo Alto Networks, ransomware, Salesloft, Salesloft Drift, Social engineering, stolen credentials, Unit 42

Palo Alto Network’s incident response firm said identity-based attacks are exploding as poor securitRead more

Why ‘secure-by-design’ systems are non-negotiable in the AI era

On February 17, 2026Source: CyberScoopBy Greg Otto
Categories: Commentary, Cybersecurity, AI, critical infrastructure, data centers, op-ed, operational technology, secure by design, software bill of materials, supply chain

Trillions in AI infrastructure face systemic failure unless security begins at the chip and ends witRead more

Proofpoint acquires Acuvity to tackle the security risks of agentic AI

On February 13, 2026Source: CyberScoopBy Greg Otto
Categories: AI, Money, Artificial Intelligence (AI), Proofpoint, mergers and acquisitions, Agentic AI, prompt injection, model context protocol (MCP)

Proofpoint is snapping up the startup to solve the industry’s newest headache: knowing what your autRead more

Apple discloses first actively exploited zero-day of 2026

On February 12, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybersecurity, Threats, Apple, vulnerability disclosure, attack, Cybersecurity and Infrastructure Security Agency (CISA), zero days, vulnerability reporting, zero-day

The vendor said the memory-corruption defect was exploited to target specific people, but it did notRead more

Google finds state-sponsored hackers use AI at ‘all stages’ of attack cycle 

On February 12, 2026Source: CyberScoopBy djohnson
Categories: Technology, Cybersecurity, AI, Russia, China, Iran, Artificial Intelligence (AI), North Korea, research, APT, AI hacking, Google Gemini

The research underscores how AI tools have matured in their cyber offensive capabilities, even as itRead more

CISA to host industry feedback sessions on cyber incident reporting regulation

On February 12, 2026Source: CyberScoopBy Tim Starks
Categories: Government, Policy, chemical plants, CIRCIA, Cybersecurity and Infrastructure Security Agency (CISA), ransomware, regulation, small business

One industry official told CyberScoop the town halls are probably not what CIRCIA needs right now. TRead more

Krebs On Security

The Hacker News

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

On February 17, 2026Source: The Hacker NewsBy

Cloud attacks move fast — faster than most incident response teams. In data centers, investigationsRead more

Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins. Cloud forensics is fundamentally

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

On February 17, 2026Source: The Hacker NewsBy

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support wRead more

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection. The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

On February 17, 2026Source: The Hacker NewsBy

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and rRead more

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase.

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

On February 17, 2026Source: The Hacker NewsBy

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distribRead more

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an information stealer known as StealC. "The threat actors cloned a legitimate Oura MCP Server – a tool that connects AI assistants to Oura Ring health data – and built a deceptive

My Day Getting My Hands Dirty with an NDR System

On February 17, 2026Source: The Hacker NewsBy

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human rRead more

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to be a network security analyst now? My objective As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

On February 17, 2026Source: The Hacker NewsBy

New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligenRead more

New research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the "Summarize with AI" button that's being increasingly placed on websites in ways that mirror classic search engine poisoning (SEO). The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

On February 17, 2026Source: The Hacker NewsBy

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryptiRead more

Apple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages. The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS. "End-to-end encryption is in beta and is not available for all

Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

On February 16, 2026Source: The Hacker NewsBy

Cybersecurity researchers disclosed they have detected a case of an information stealer infection suRead more

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment. "This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [

Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers

On February 16, 2026Source: The Hacker NewsBy

A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, anRead more

A new study has found that multiple cloud-based password managers, including Bitwarden, Dashlane, and LastPass, are susceptible to password recovery attacks under certain conditions. "The attacks range in severity from integrity violations to the complete compromise of all vaults in an organization," researchers Matteo Scarlata, Giovanni Torrisi, Matilda Backendal, and Kenneth G. Paterson said.

Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

On February 16, 2026Source: The Hacker NewsBy

This week’s recap shows how small gaps are turning into big entry points. Not always through new expRead more

This week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question. Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being used side by side, whichever path

How Can We Help?

9 + 2 =

Share This