Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

WP HTTP Error: cURL error 52: Empty reply from server

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 1342

Motherboard

WP HTTP Error: A valid URL was not provided.

Data Breeches

Latvian national involved with Karakurt and other ransomware gangs sentenced for his role in ransomware organization

On May 4, 2026Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Malware

From the DOJ’s press release: A Latvian national was sentenced today to 102 months in prison fRead more

Medicare portal database exposed health providers’ Social Security numbers

On May 4, 2026Source: DataBreaches.NetBy Dissent
Categories: Exposure, Government Sector

Dan Diamond and Clara Ence Morse report: The Trump administration inadvertently exposed the Social SRead more

Summary of Court Approved Legal Notice for Pennsylvania State Education Association Data Incident Settlement

On May 4, 2026Source: DataBreaches.NetBy Dissent
Categories: Miscellaneous, U.S.

PHILADELPHIA, May 4, 2026 /PRNewswire/ — The following release was issued by RG/2 Claims AdminRead more

Instructure discloses second data breach in less than a year

On May 4, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Education Sector, Subcontractor, U.S.

Instructure defines itself as the “O.G. champions of open edtech. The makers of Canvas, MasterRead more

Maryland pharmacist indicted on unauthorized computer access related to U. Maryland Medical Center

On May 2, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, HIPAA, ID Theft, Insider, U.S.

From the U.S. Attorney’s Office, District of Maryland: A Maryland man is facing federal indictRead more

Russian Hacker Known as “Digit” Pleads Guilty to Cyberattacks on Ukraine and the US

On May 2, 2026Source: DataBreaches.NetBy Dissent
Categories: cyberwar, Hack

Anna Tkach reports: Russian hacker Artem Revensky has admitted to orchestrating cyberattacks targetiRead more

Michigan residents sue Thomson Reuters over public display of Social Security numbers

On May 1, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Business Sector, Exposure, State/Local

Caitlyn Rosen reports: A class of Michiganders asserted in a federal lawsuit filed Thursday that a TRead more

NYSDFS Secures $2.25 Million Cybersecurity Settlement with Delta Dental

On May 1, 2026Source: DataBreaches.NetBy Dissent
Categories: Hack, Health Data, Of Note, Subcontractor, U.S.

There is an update regarding the 2023 Delta Dental breach involving MOVEit software. Delta Dental waRead more

Never forgotten.

On May 1, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents

In memoriam. Ayrton Senna, the greatest Formula One driver of all times, lost to this world on May 1Read more

Unprecedented: Private Equity Firm Potentially on Hook for PowerSchool’s Data Breach

On May 1, 2026Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Education Sector, Subcontractor, U.S.

Tyler Bridegan, Scott Hyman, Patrick Strubbe, and Sarah Wilk of Womble Bond Dickinson write: In a fiRead more

Cyberscoop

‘Copy Fail’ is a real Linux security crisis wrapped in AI slop

On May 4, 2026Source: CyberScoopBy Matt Kapko
Categories: AI, Cybersecurity, Research, Threats, exploit, Linux, Rapid7, research, Theori, VulnCheck, vulnerability, vulnerability disclosure, vulnerability reporting

The actively exploited defect could affect every mainstream Linux distribution built since 2017, butRead more

A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory

On May 4, 2026Source: CyberScoopBy djohnson
Categories: Cybersecurity, Privacy, Technology, ad surveillance, geotargeting, lawsuit, privacy, surveillance, Take It Down Act, TikTok

The woman’s lawyer told CyberScoop they believe the company edited her video to suggest she was a “fRead more

Why data centers now belong on the critical infrastructure list

On May 4, 2026Source: CyberScoopBy Greg Otto
Categories: AI, Commentary, Artificial Intelligence (AI), critical infrastructure, op-ed

As AI drives deeper dependence across business, supply chains, and national security, the buildingsRead more

US government, allies publish guidance on how to safely deploy AI agents

On May 1, 2026Source: CyberScoopBy Greg Otto
Categories: AI, Cybersecurity, Government, Technology, Agentic AI, Artificial Intelligence (AI), Cybersecurity and Infrastructure Security Agency (CISA), identity management, nsa, prompt injection

The guidance warns that agents capable of taking real-world actions on networks are already inside cRead more

Former incident responders sentenced to 4 years in prison for committing ransomware attacks

On April 30, 2026Source: CyberScoopBy Matt Kapko
Categories: Cybercrime, Cybersecurity, Ransomware, Threats, ALPHV, BlackCat, cybercrime, Department of Justice (DOJ), DigitalMint, guilty, ransomware, ransomware negotiation, ransomware payments, Sygnia

Ryan Goldberg and Kevin Martin attacked five companies in 2023 and extorted nearly $1.3 million fromRead more

FCC tightens KYC rules for telecoms, closes loophole for banned foreign services

On April 30, 2026Source: CyberScoopBy djohnson
Categories: Cybersecurity, Government, Policy, FCC, Know Your Customer, regulation, robocall, supply chain security, telecommunications

The commission wants telecoms to do more to verify their callers and prevent illegal calls and scamsRead more

Congress kicks the can down the road on surveillance law (again)

On April 30, 2026Source: CyberScoopBy Tim Starks
Categories: Government, Policy, Privacy, Congress, FISA, John Thune, Mark Warner, privacy, Ron Wyden, Section 702, Senate Intelligence Committee, surveillance, tom cotton

It’s the second extension of Section 702 of the Foreign Intelligence Surveillance Act in 10 days, anRead more

cPanel’s authentication bypass bug is being exploited in the wild, CISA warns

On April 30, 2026Source: CyberScoopBy Greg Otto
Categories: Research, Threats, cPanel, Cybersecurity and Infrastructure Security Agency (CISA), Rapid7, VulnCheck, vulnerability, watchTowr, website hosting

The agency added the flaw to the KEV list days after hosting providers confirmed active, ongoing attRead more

Everyone’s building AI agents. Almost nobody’s ready for what they do to identity.

On April 30, 2026Source: CyberScoopBy Greg Otto
Categories: AI, Commentary, Agentic AI, Artificial Intelligence (AI), identity, op-ed

Anthropic recently announced that it would not release Mythos, its most powerful AI model, to the puRead more

Krebs On Security

The Hacker News

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

On May 4, 2026Source: The Hacker NewsBy

An active phishing campaign has been observed targeting multiple vectors since at least April 2025,Read more

An active phishing campaign has been observed targeting multiple vectors since at least April 2025, with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to compromised hosts. The activity, codenamed VENOMOUS#HELPER, has impacted over 80 organizations, most of which are in the U.S., according to Securonix. It shares overlaps with clusters

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

On May 4, 2026Source: The Hacker NewsBy

Progress Software has released updates to address two security flaws in MOVEit Automation, includingRead more

Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts.  The

⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More

On May 4, 2026Source: The Hacker NewsBy

This week, the shadows moved faster than the patches. While most teams were still triaging last montRead more

This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pipelines into silent delivery systems. The game has shifted from breach to occupation. They’re living inside SaaS sessions, pushing code with trusted commits, and scaling

2026: The Year of AI-Assisted Attacks

On May 4, 2026Source: The Hacker NewsBy

On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access ProhibitiRead more

On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japan's largest internet cafe chain. When asked, the young man shared his motivation for the hack: he wanted to buy Pokémon cards. In a sense, this is a fairly conventional story.

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

On May 4, 2026Source: The Hacker NewsBy

The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting orgRead more

The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor. The activity involved using phishing emails that mimic correspondence from the Income Tax Department of India in December 2025, followed by a similar campaign aimed at Russian entities. "Both waves followed a nearly identical

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

On May 4, 2026Source: The Hacker NewsBy

A previously unknown threat actor has been observed targeting government and military entities in SoRead more

A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers in the Philippines, Laos, Canada, South Africa, and the U.S., by exploiting the recently disclosed vulnerability in cPanel. The activity, detected by Ctrl-Alt-Intel on May 2, 2026, involves the

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

On May 4, 2026Source: The Hacker NewsBy

A coordinated international operation involving U.S. and Chinese authorities has arrested at least 2Read more

A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, resulting in millions of dollars in losses. The crackdown was led by the Dubai Police, under the United Arab Emirates (UAE) Ministry of Interior, in partnership with the U.S. Federal

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

On May 3, 2026Source: The Hacker NewsBy

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently discloseRead more

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2026-31431 (CVSS score: 7.8), is a case of local privilege escalation (LPE) flaw that could allow an

Trellix Confirms Source Code Breach With Unauthorized Repository Access

On May 2, 2026Source: The Hacker NewsBy

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized acceRead more

Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It said it "recently identified" the compromise of its source code repository and that it began working with "leading forensic experts" to resolve the matter immediately. It also said it has notified law enforcement of the matter. Trellix did not disclose the

30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign

On May 1, 2026Source: The Hacker NewsBy

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishRead more

A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails with an aim to compromise Facebook accounts. The activity has been codenamed AccountDumpling by Guardio, with the scheme selling the stolen accounts back through an illicit storefront run by the threat actors. In all, roughly 30,000 Facebook accounts are

How Can We Help?

2 + 2 =

Share This