Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?

Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
![]() Firewall Bug Under Active Attack Triggers CISA WarningOn August 23, 2022Source: Web Security – ThreatpostBy ThreatpostCategories: Vulnerabilities, Web Security CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.… Read more |
![]() Fake Reservation Links Prey on Weary TravelersOn August 22, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Malware, Web Security Fake travel reservations are exacting more pain from the travel weary, already dealing with the mise… Read more |
![]() Google Patches Chrome’s Fifth Zero-Day of the YearOn August 18, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arb… Read more |
![]() Phishers Swim Around 2FA in Coinbase Account HeistsOn August 8, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Web Security Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so the… Read more |
![]() Open Redirect Flaw Snags Amex, Snapchat User DataOn August 5, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Vulnerabilities, Web Security Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among ot… Read more |
![]() Universities Put Email Users at Cyber RiskOn August 2, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest prot… Read more |
![]() Threat Actors Pivot Around Microsoft’s Macro-Blocking in OfficeOn July 28, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwa… Read more |
![]() IoT Botnets Fuel DDoS Attacks – Are You Prepared?On July 26, 2022Source: Web Security – ThreatpostBy Sponsored ContentCategories: Sponsored, Vulnerabilities, Web Security, indusface The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies… Read more |
![]() Magecart Serves Up Card Skimmers on Restaurant-Ordering SystemsOn July 20, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security 300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against Menu… Read more |
![]() Authentication Risks Discovered in Okta PlatformOn July 19, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Privacy, Web Security Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational… Read more |
Beeping Computer
https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753 |
Motherboard
WP HTTP Error: A valid URL was not provided. |
Data Breeches
Terrible tales of opsec oversights: How cybercrooks get themselves caughtOn July 1, 2025Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses Connor Jones reports: They say that success breeds complacency, and complacency leads to failure. Fo… Read more |
International Criminal Court hit with cyber attack during NATO summitOn July 1, 2025Source: DataBreaches.NetBy DissentCategories: Miscellaneous, Non-U.S. Euronews with AP reports: The International Criminal Court has been targeted by a “sophisticated” cy… Read more |
Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”On July 1, 2025Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Health Data, Non-U.S. On June 28, Pembroke Regional Hospital issued a press release. The Pembroke Observer reports: The Pe… Read more |
Iran-linked hackers threaten to release emails allegedly stolen from Trump associatesOn July 1, 2025Source: DataBreaches.NetBy DissentCategories: Government Sector Rebecca Falconer reports: An Iran-linked cyberattack group that hacked President Trump’s 2024… Read more |
National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged FraudOn June 30, 2025Source: DataBreaches.NetBy DissentCategories: Health Data, ID Theft, Miscellaneous, fraud The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown,… Read more |
Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal DataOn June 30, 2025Source: DataBreaches.NetBy DissentCategories: Health Data, Non-U.S. Investing reports: Switzerland confirmed Monday that a cyberattack on the non-profit health foundati… Read more |
Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seizedOn June 30, 2025Source: DataBreaches.NetBy DissentCategories: Malware, Non-U.S., crylock The Brussels Criminal Court has sentenced a Russian hacker to 7 years in prison. His former partner… Read more |
Bolton Walk-In Clinic patient data leak locked down (finally!)On June 30, 2025Source: DataBreaches.NetBy DissentCategories: Health Data, Non-U.S., Of Note Finally, finally, FINALLY: exposed patient files from the Bolton Walk-In Clinic in Ontario have bee… Read more |
50 Customers of French Bank Hit by Insider SIM Swap ScamOn June 30, 2025Source: DataBreaches.NetBy DissentCategories: Financial Sector, Insider, Non-U.S., SIM Swap; insider threat Eric Priezkalns reports: A business student who was interning at Société Générale, a leading multina… Read more |
Ontario health agency atHome ordered to inform 200,000 patients of March data breachOn June 30, 2025Source: DataBreaches.NetBy DissentCategories: Government Sector, Health Data, Non-U.S., Subcontractor Isaac Callan and Colin D’Mello report that Ontario’s health minister is ordering atHome,… Read more |
Cyberscoop
Scammers have a new tactic: impersonating DOGEOn June 30, 2025Source: CyberScoopBy mbrackenCategories: Threats An email reviewed by Scoop News Group and analyzed by Proofpoint reveals the latest attempt by fraud… Read more |
Arrest, seizures in latest U.S. operation against North Korean IT workersOn June 30, 2025Source: CyberScoopBy Tim StarksCategories: Cybercrime, Financial, Government, Technology, Threats, China, crypto, crypto crime, Department of Justice (DOJ), Federal Bureau of Investigation (FBI), North Korea, North Korean IT workers, taiwan The coordinated steps included searches spanning 16 states involving workers who obtained employment… Read more |
Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog reportOn June 28, 2025Source: CyberScoopBy Tim StarksCategories: Cybercrime, Government, Privacy, Technology, Federal Bureau of Investigation (FBI), surveillance, mobile, United Kingdom (U.K.), Mexico, Department of Justice (DOJ), cameras, El Chapo, National Health Service A cartel affiliate notified an FBI agent about a hacker who infiltrated cameras and phones to track… Read more |
Slavery, torture, human trafficking discovered at 53 Cambodian online scamming compoundsOn June 27, 2025Source: CyberScoopBy Tim StarksCategories: Cybercrime, Amnesty International, Cambodia, human rights, pig butchering, Southeast Asia Pig butchering scams were the most common activity carried out at the facilities identified in the A… Read more |
Microsoft security updates address CrowdStrike crash, kill ‘Blue Screen of Death’On June 27, 2025Source: CyberScoopBy djohnsonCategories: Technology, antivirus, CrowdStrike, kernel, Microsoft, Windows Third-party antivirus software will no longer have access to the Windows kernel as Microsoft rolls o… Read more |
Scattered Spider strikes again? Aviation industry appears to be next target for criminal groupOn June 27, 2025Source: CyberScoopBy Greg OttoCategories: Cybercrime, Cybersecurity, Transportation, Mandiant, Scattered Spider, Unit 42 Hawaiian Airlines announced a cybersecurity incident Friday as security experts warned of a sector-w… Read more |
Notorious cybercriminal ‘IntelBroker’ arrested in France, awaits extradition to USOn June 26, 2025Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Cybersecurity, Arrest, data theft, Department of Justice (DOJ), Justice Department, Stolen data Kai West, a 25-year-old British national, is accused of stealing data from more than 40 organization… Read more |
Many data brokers aren’t registering across state lines, privacy groups sayOn June 25, 2025Source: CyberScoopBy djohnsonCategories: Cybersecurity, Privacy, data brokers, EFF, Privacy Rights Clearinghouse An analysis of four states with data broker registry laws found that hundreds of brokers are registe… Read more |
Short-term extension of expiring cyber information-sharing law could be on the tableOn June 25, 2025Source: CyberScoopBy Tim StarksCategories: Government, Policy, information sharing, Information Technology Industry Council, liability, Cybersecurity Information Sharing Act, Internet Security Alliance Time is running short for Congress to renew the 2015 Cybersecurity Information Sharing Act. The post… Read more |
Citrix users hit by actively exploited zero-day vulnerabilityOn June 25, 2025Source: CyberScoopBy Matt KapkoCategories: Cybercrime, Cybersecurity, Technology, Citrix, NetScaler, virtual private network (VPN), VPN gateway, vulnerability, zero days, zero-days The vendor disclosed the critical zero-day in NetScaler ADC and NetScaler Gateway nine days after it… Read more |
Krebs On Security
The Hacker News
![]() A New Maturity Model for Browser Security: Closing the Last-Mile RiskOn July 1, 2025Source: The Hacker NewsByDespite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still… Read more Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser.
It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks weren’t designed to handle. For security leaders who know |
![]() Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security UpdateOn July 1, 2025Source: The Hacker NewsByGoogle has released security updates to address a vulnerability in its Chrome browser for which an e… Read more Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild.
The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine.
"Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary |
![]() U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop FarmsOn July 1, 2025Source: The Hacker NewsByThe U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean… Read more The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers.
The coordinated action saw searches of 21 known or suspected "laptop farms" between June 10 and 17, 2025, across 14 states |
![]() Microsoft Removes Password Management from Authenticator App Starting August 2025On July 1, 2025Source: The Hacker NewsByMicrosoft has said that it's ending support for passwords in its Authenticator app starting August 1… Read more Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025.
Microsoft’s move is part of a much larger shift away from traditional password-based logins. The company said the changes are also meant to streamline autofill within its two-factor authentication (2FA) app, making the experience simpler and more secure.Over the past few years, Microsoft |
![]() U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical InfrastructureOn June 30, 2025Source: The Hacker NewsByU.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber… Read more U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber attacks from Iranian state-sponsored or affiliated threat actors.
"Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events," the agencies said.
"These cyber actors often |
![]() Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five SuspectsOn June 30, 2025Source: The Hacker NewsByEuropol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €4… Read more Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world.
The international effort, codenamed Operation Borrelli was carried out by the Spanish Guardia Civil, along with support from law enforcement authorities from Estonia, France, and the United States. Europol said the |
![]() Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian BanksOn June 30, 2025Source: The Hacker NewsByThe threat actor known as Blind Eagle has been attributed with high confidence to the use of the Rus… Read more The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66.
Trustwave SpiderLabs, in a report published last week, said it was able to make this connection by pivoting from Proton66-linked digital assets, leading to the discovery of an active threat cluster that leverages Visual Basic Script (VBS) files as its |
![]() Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI InventoriesOn June 30, 2025Source: The Hacker NewsByIdentity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an… Read more Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the Verizon DBIR, attackers are more commonly using stolen |
![]() ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and moreOn June 30, 2025Source: The Hacker NewsByEver wonder what happens when attackers don’t break the rules—they just follow them better than we d… Read more Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior quietly opens the door to risk?
This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a broken firewall or missed patch—it’s about the small choices, default settings |
![]() FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social EngineeringOn June 28, 2025Source: The Hacker NewsByThe U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cyber… Read more The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector.
To that end, the agency said it's actively working with aviation and industry partners to combat the activity and help victims.
"These actors rely on social engineering techniques, often impersonating |
How Can We Help?
