Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
| WP HTTP Error: cURL error 52: Empty reply from server |
Beeping Computer
| https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 1342 |
Motherboard
| WP HTTP Error: A valid URL was not provided. |
Data Breeches
Latvian national involved with Karakurt and other ransomware gangs sentenced for his role in ransomware organizationOn May 4, 2026Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Malware From the DOJ’s press release: A Latvian national was sentenced today to 102 months in prison f… Read more |
Medicare portal database exposed health providers’ Social Security numbersOn May 4, 2026Source: DataBreaches.NetBy DissentCategories: Exposure, Government Sector Dan Diamond and Clara Ence Morse report: The Trump administration inadvertently exposed the Social S… Read more |
Summary of Court Approved Legal Notice for Pennsylvania State Education Association Data Incident SettlementOn May 4, 2026Source: DataBreaches.NetBy DissentCategories: Miscellaneous, U.S. PHILADELPHIA, May 4, 2026 /PRNewswire/ — The following release was issued by RG/2 Claims Admin… Read more |
Instructure discloses second data breach in less than a yearOn May 4, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Education Sector, Subcontractor, U.S. Instructure defines itself as the “O.G. champions of open edtech. The makers of Canvas, Master… Read more |
Maryland pharmacist indicted on unauthorized computer access related to U. Maryland Medical CenterOn May 2, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, HIPAA, ID Theft, Insider, U.S. From the U.S. Attorney’s Office, District of Maryland: A Maryland man is facing federal indict… Read more |
Russian Hacker Known as “Digit” Pleads Guilty to Cyberattacks on Ukraine and the USOn May 2, 2026Source: DataBreaches.NetBy DissentCategories: cyberwar, Hack Anna Tkach reports: Russian hacker Artem Revensky has admitted to orchestrating cyberattacks targeti… Read more |
Michigan residents sue Thomson Reuters over public display of Social Security numbersOn May 1, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Business Sector, Exposure, State/Local Caitlyn Rosen reports: A class of Michiganders asserted in a federal lawsuit filed Thursday that a T… Read more |
NYSDFS Secures $2.25 Million Cybersecurity Settlement with Delta DentalOn May 1, 2026Source: DataBreaches.NetBy DissentCategories: Hack, Health Data, Of Note, Subcontractor, U.S. There is an update regarding the 2023 Delta Dental breach involving MOVEit software. Delta Dental wa… Read more |
Never forgotten.On May 1, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents In memoriam. Ayrton Senna, the greatest Formula One driver of all times, lost to this world on May 1… Read more |
Unprecedented: Private Equity Firm Potentially on Hook for PowerSchool’s Data BreachOn May 1, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Education Sector, Subcontractor, U.S. Tyler Bridegan, Scott Hyman, Patrick Strubbe, and Sarah Wilk of Womble Bond Dickinson write: In a fi… Read more |
Cyberscoop
‘Copy Fail’ is a real Linux security crisis wrapped in AI slopOn May 4, 2026Source: CyberScoopBy Matt KapkoCategories: AI, Cybersecurity, Research, Threats, exploit, Linux, Rapid7, research, Theori, VulnCheck, vulnerability, vulnerability disclosure, vulnerability reporting The actively exploited defect could affect every mainstream Linux distribution built since 2017, but… Read more |
A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitoryOn May 4, 2026Source: CyberScoopBy djohnsonCategories: Cybersecurity, Privacy, Technology, ad surveillance, geotargeting, lawsuit, privacy, surveillance, Take It Down Act, TikTok The woman’s lawyer told CyberScoop they believe the company edited her video to suggest she was a “f… Read more |
Why data centers now belong on the critical infrastructure listOn May 4, 2026Source: CyberScoopBy Greg OttoCategories: AI, Commentary, Artificial Intelligence (AI), critical infrastructure, op-ed As AI drives deeper dependence across business, supply chains, and national security, the buildings… Read more |
US government, allies publish guidance on how to safely deploy AI agentsOn May 1, 2026Source: CyberScoopBy Greg OttoCategories: AI, Cybersecurity, Government, Technology, Agentic AI, Artificial Intelligence (AI), Cybersecurity and Infrastructure Security Agency (CISA), identity management, nsa, prompt injection The guidance warns that agents capable of taking real-world actions on networks are already inside c… Read more |
Former incident responders sentenced to 4 years in prison for committing ransomware attacksOn April 30, 2026Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Cybersecurity, Ransomware, Threats, ALPHV, BlackCat, cybercrime, Department of Justice (DOJ), DigitalMint, guilty, ransomware, ransomware negotiation, ransomware payments, Sygnia Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million from… Read more |
FCC tightens KYC rules for telecoms, closes loophole for banned foreign servicesOn April 30, 2026Source: CyberScoopBy djohnsonCategories: Cybersecurity, Government, Policy, FCC, Know Your Customer, regulation, robocall, supply chain security, telecommunications The commission wants telecoms to do more to verify their callers and prevent illegal calls and scams… Read more |
Congress kicks the can down the road on surveillance law (again)On April 30, 2026Source: CyberScoopBy Tim StarksCategories: Government, Policy, Privacy, Congress, FISA, John Thune, Mark Warner, privacy, Ron Wyden, Section 702, Senate Intelligence Committee, surveillance, tom cotton It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, an… Read more |
cPanel’s authentication bypass bug is being exploited in the wild, CISA warnsOn April 30, 2026Source: CyberScoopBy Greg OttoCategories: Research, Threats, cPanel, Cybersecurity and Infrastructure Security Agency (CISA), Rapid7, VulnCheck, vulnerability, watchTowr, website hosting The agency added the flaw to the KEV list days after hosting providers confirmed active, ongoing att… Read more |
Two new extortion crews are speedrunning the Scattered Spider playbookOn April 30, 2026Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Cybersecurity, Ransomware, Research, Threats, academia, automotive, aviation, BlackFile, Cloud, Cordial Spider, CrowdStrike, data theft, extortion, financial sector, Financial services, hospitality, legal, Palo Alto Networks, residential proxy network, retail, saas, Scattered Spider, Snarky Spider, technology, The Com, Unit 42 CrowdStrike says The Com-affiliated threat groups are using voice phishing and fake SSO pages to bre… Read more |
Everyone’s building AI agents. Almost nobody’s ready for what they do to identity.On April 30, 2026Source: CyberScoopBy Greg OttoCategories: AI, Commentary, Agentic AI, Artificial Intelligence (AI), identity, op-ed Anthropic recently announced that it would not release Mythos, its most powerful AI model, to the pu… Read more |
Krebs On Security
The Hacker News
![]() Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM ToolsOn May 4, 2026Source: The Hacker NewsByAn active phishing campaign has been observed targeting multiple vectors since at least April 2025,… Read more An active phishing campaign has been observed targeting multiple vectors since at least April 2025, with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to compromised hosts.
The activity, codenamed VENOMOUS#HELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares overlaps with clusters |
![]() Progress Patches Critical MOVEit Automation Bug Enabling Authentication BypassOn May 4, 2026Source: The Hacker NewsByProgress Software has released updates to address two security flaws in MOVEit Automation, including… Read more Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass.
MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts.
The |
![]() ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreOn May 4, 2026Source: The Hacker NewsByThis week, the shadows moved faster than the patches. While most teams were still triaging last mont… Read more This week, the shadows moved faster than the patches.
While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems.
The game has shifted from breach to occupation. They’re living inside SaaS sessions, pushing code with trusted commits, and scaling |
![]() 2026: The Year of AI-Assisted AttacksOn May 4, 2026Source: The Hacker NewsByOn December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibiti… Read more On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japan's largest internet cafe chain. When asked, the young man shared his motivation for the hack: he wanted to buy Pokémon cards.
In a sense, this is a fairly conventional story. |
![]() Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and RussiaOn May 4, 2026Source: The Hacker NewsByThe China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting org… Read more The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor.
The activity involved using phishing emails that mimic correspondence from the Income Tax Department of India in December 2025, followed by a similar campaign aimed at Russian entities.
"Both waves followed a nearly identical |
![]() Critical cPanel Vulnerability Weaponized to Target Government and MSP NetworksOn May 4, 2026Source: The Hacker NewsByA previously unknown threat actor has been observed targeting government and military entities in So… Read more A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers in the Philippines, Laos, Canada, South Africa, and the U.S., by exploiting the recently disclosed vulnerability in cPanel.
The activity, detected by Ctrl-Alt-Intel on May 2, 2026, involves the |
![]() Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701MOn May 4, 2026Source: The Hacker NewsByA coordinated international operation involving U.S. and Chinese authorities has arrested at least 2… Read more A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, resulting in millions of dollars in losses.
The crackdown was led by the Dubai Police, under the United Arab Emirates (UAE) Ministry of Interior, in partnership with the U.S. Federal |
![]() CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEVOn May 3, 2026Source: The Hacker NewsByThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclose… Read more The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.
The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an |
![]() Trellix Confirms Source Code Breach With Unauthorized Repository AccessOn May 2, 2026Source: The Hacker NewsByCybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized acce… Read more Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code.
It said it "recently identified" the compromise of its source code repository and that it began working with "leading forensic experts" to resolve the matter immediately. It also said it has notified law enforcement of the matter.
Trellix did not disclose the |
![]() 30,000 Facebook Accounts Hacked via Google AppSheet Phishing CampaignOn May 1, 2026Source: The Hacker NewsByA newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phish… Read more A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts.
The activity has been codenamed AccountDumpling by Guardio, with the scheme selling the stolen accounts back through an illicit storefront run by the threat actors. In all, roughly 30,000 Facebook accounts are |
How Can We Help?



















