Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
| WP HTTP Error: cURL error 52: Empty reply from server |
Beeping Computer
| https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 767 |
Motherboard
| WP HTTP Error: A valid URL was not provided. |
Data Breeches
City of Anthony, NM, public records have been suspiciously disappeared, locked, or wipedOn April 13, 2026Source: DataBreaches.NetBy DissentCategories: Government Sector, Miscellaneous, Of Note There are insider breaches, and then there are fourth-degree felonies and other possible charges if… Read more |
A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms HardOn April 13, 2026Source: DataBreaches.NetBy DissentCategories: Business Sector, Commentaries and Analyses, Hack, U.S. When the FBI issued a Private Industry Notice in May 2025 about the Silent Ransom Group (SRG) target… Read more |
Booking.com warns customers their private travel details may have been accessed by ‘unauthorised party’On April 13, 2026Source: DataBreaches.NetBy DissentCategories: Business Sector, Hack Here we go again? Lara Pearce reports: Popular travel website Booking.com has warned customers that… Read more |
GTA-maker Rockstar Games hacked again but downplays impactOn April 13, 2026Source: DataBreaches.NetBy DissentCategories: Business Sector, Hack, Subcontractor Joe Tidy reports: Grand Theft Auto developer Rockstar Games has been targeted for a second time in t… Read more |
MN: Spring Lake Park Schools Closed After Suspected Ransomware AttackOn April 13, 2026Source: DataBreaches.NetBy DissentCategories: Education Sector, U.S. Spring Lake Park Today reports: Spring Lake Park Schools in Minnesota were forced to close on Monday… Read more |
Brockton Hospital still dealing with aftermath of ransomware attackOn April 11, 2026Source: DataBreaches.NetBy DissentCategories: Health Data, Malware Yesterday, Bryan Lambert reported: Health care providers at Brockton Hospital are preparing to work… Read more |
Silent Ransom Group leaked another big law firm: Orrick, Herrington & SutcliffeOn April 10, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Business Sector, Hack Jones Day wasn’t the only big law firm to recently fall prey to threat actors variously known… Read more |
Ex-Meta worker investigated for downloading 30,000 private Facebook photosOn April 9, 2026Source: DataBreaches.NetBy DissentCategories: Business Sector, Insider Laura Cress reports: A former Meta employee suspected of downloading around 30,000 private images of… Read more |
Lotte Card given notice of $3M penalty, business suspension over massive data breachOn April 9, 2026Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Financial Sector, Non-U.S. Yonhap News reports: Lotte Card has been notified by the financial watchdog that it is liable for ar… Read more |
86% of businesses refused to pay cyber ransoms in 2025 — Coalition InsuranceOn April 9, 2026Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Commentaries and Analyses Two firms recently told DataBreaches that about 30% or more of their clients pay ransom after a cybe… Read more |
Cyberscoop
Secretary Mullin must help finish the job: Urge the Senate to confirm PlankeyOn April 14, 2026Source: CyberScoopBy Greg OttoCategories: Commentary, Cybersecurity, Government, China, CISA, Iran, leadership, op-ed, Russia, Senate With global cyber threats escalating and budget cuts looming, CISA needs a Senate-confirmed director… Read more |
![]() Here’s how cyber heavyweights in the US and UK are dealing with Claude MythosOn April 13, 2026Source: CyberScoopBy djohnsonCategories: AI, Anthropic, Artificial Intelligence (AI), capture the flag, Cloud Security Alliance, Cybersecurity and Infrastructure Security Agency (CISA), nsa, operational technology, Project Glasswing, SANS Institute Two reports from former high-level U.S. cyber officials and the UK government’s top AI research inst… Read more |
OpenAI’s Mac apps need updates thanks to the Axios hackOn April 13, 2026Source: CyberScoopBy Matt KapkoCategories: Technology, Threats, Research, Cybersecurity, AI, Artificial Intelligence (AI), cybercrime, hacking, open source, open source software, OpenAI, supply chain, supply chain attacks The company said a developer tool automatically retrieved a malicious version of the popular open-so… Read more |
Commerce setting up new AI export regime to push adoption of ‘American AI’ abroadOn April 10, 2026Source: CyberScoopBy djohnsonCategories: Uncategorized, Government, Geopolitics, Cybersecurity, AI, Trump administration, export control, Dept of Commerce The department is looking to create a “menu of priority AI export packages that the U.S. Government… Read more |
Iranian attacks on US critical infrastructure puts 3,900 devices in crosshairsOn April 9, 2026Source: CyberScoopBy Matt KapkoCategories: Cybersecurity, Geopolitics, Government, Research, Threats, automation, Censys, energy, government, industrial control systems (ICS), Iran, operational technology, programmable logic controllers, Rockwell Automation, water sector Censys researchers warned that thousands of devices are exposed to the Iranian government’s campaign… Read more |
Why is the timeline to quantum-proof everything constantly shrinking?On April 9, 2026Source: CyberScoopBy djohnsonCategories: Cybersecurity, China, encryption, Google, Oratomic, quantum computing, SandboxAQ Experts say advancements in hardware, mathematics and growing fear of Chinese scientific breakthroug… Read more |
Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’On April 9, 2026Source: CyberScoopBy Tim StarksCategories: Government, Technology, Threats, routers, Forest Blizzard, cyber strategy, Brett Leatherman, TP-Link Technologies, CyclopsBlink, cyberespionage, VPNfilter, GRU, APT28, Fancy Bear, DNS, Russia, Federal Bureau of Investigation (FBI) FBI cyber chief Brett Leatherman told CyberScoop the Russian GRU campaign was unique in how it could… Read more |
![]() Don’t just fight fraud, hunt itOn April 9, 2026Source: CyberScoopBy Greg OttoCategories: Commentary, Uncategorized, White House, critical infrastructure, fraud, Artificial Intelligence (AI), op-ed, National Cybersecurity Strategy, identity fraud As traditional fraud markers become obsolete, we must treat digital identity as critical infrastruct… Read more |
Hack-for-hire spyware campaign targets journalists in Middle East, North AfricaOn April 8, 2026Source: CyberScoopBy Tim StarksCategories: Geopolitics, Privacy, Threats, Access Now, Committee to Protect Journalists, Bitter, ProSpy, smex, hack-for-hire, Africa, Android, Lebanon, India, spearphishing, Egypt, United Arab Emirates (UAE), ESET, Middle East, Lookout, spyware, privacy Access Now, Lookout and SMEX joined research forces to find a campaign involving suspected Indian go… Read more |
Feds quash widespread Russia-backed espionage network spanning 18,000 devicesOn April 7, 2026Source: CyberScoopBy Matt KapkoCategories: Cybersecurity, Government, Research, Threats, Department of Justice (DOJ), TP-Link Technologies, Black Lotus Labs, Microsoft Threat Intelligence, MicroTik, Forest Blizzard, United Kingdom (U.K.), Federal Bureau of Investigation (FBI), Russia, espionage, Microsoft, Fancy Bear, APT28, GRU, NCSC Forest Blizzard, a threat group attributed to Russia’s GRU, hijacked network traffic to steal creden… Read more |
Krebs On Security
The Hacker News
![]() Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta AdsOn April 14, 2026Source: The Hacker NewsByA nascent Android remote access trojan called Mirax has been observed actively targeting Spanis… Read more A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta.
"Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real |
![]() Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)On April 14, 2026Source: The Hacker NewsByOX Security recently analyzed 216 million security findings across 250 organizations over a 90-day p… Read more OX Security recently analyzed 216 million security findings across 250 organizations over a 90-day period. The primary takeaway: while raw alert volume grew by 52% year-over-year, prioritized critical risk grew by nearly 400%.
The surge in AI-assisted development is creating a "velocity gap" where the density of high-impact vulnerabilities is scaling faster than |
![]() 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 UsersOn April 14, 2026Source: The Hacker NewsByCybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome ext… Read more Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited.
According to Socket, the extensions are published |
![]() ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched ServersOn April 14, 2026Source: The Hacker NewsByA critical security vulnerability impacting ShowDoc, a document management and collaboration se… Read more A critical security vulnerability impacting ShowDoc, a document management and collaboration service popular in China, has come under active exploitation in the wild.
The vulnerability in question is CVE-2025-0520 (aka CNVD-2020-26585), which carries a CVSS score of 9.4 out of 10.0.
It relates to a case of unrestricted file upload that stems from improper validation of |
![]() CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe SoftwareOn April 14, 2026Source: The Hacker NewsByThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen securi… Read more The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The list of vulnerabilities is as follows -
CVE-2026-21643 (CVSS score: 9.1) - An SQL injection vulnerability in Fortinet FortiClient EMS that could allow an unauthenticated attacker to |
![]() JanelaRAT Malware Targets Latin American Banks with 14,739 Attacks in Brazil in 2025On April 13, 2026Source: The Hacker NewsByBanks and financial institutions in Latin American countries like Brazil and Mexico have continued t… Read more Banks and financial institutions in Latin American countries like Brazil and Mexico have continued to be the target of a malware family called JanelaRAT.
A modified version of BX RAT, JanelaRAT is known to steal financial and cryptocurrency data associated with specific financial entities, as well as track mouse inputs, log keystrokes, take screenshots, and collect system metadata.
"One of the |
![]() FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud AttemptsOn April 13, 2026Source: The Hacker NewsByThe U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police,… Read more The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims' account credentials and attempt more than $20 million in fraud.
In tandem, authorities detained the alleged developer, who has& |
![]() ⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and MoreOn April 13, 2026Source: The Hacker NewsByMonday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are t… Read more Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light. It is one of those mornings where the gap between a quiet shift and a full-blown incident response is basically |
![]() Your MTTD Looks Great. Your Post-Alert Gap Doesn'tOn April 13, 2026Source: The Hacker NewsByAnthropic restricted its Mythos Preview model last week after it autonomously found and exploited ze… Read more Anthropic restricted its Mythos Preview model last week after it autonomously found and exploited zero-day vulnerabilities in every major operating system and browser. Palo Alto Networks' Wendi Whitmore warned that similar capabilities are weeks or months from proliferation. CrowdStrike's 2026 Global Threat Report puts average eCrime breakout time at 29 minutes. Mandiant's M-Trends |
![]() North Korea's APT37 Uses Facebook Social Engineering to Deliver RokRAT MalwareOn April 13, 2026Source: The Hacker NewsByThe North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh… Read more The North Korean hacking group tracked as APT37 (aka ScarCruft) has been attributed to a fresh multi-stage, social engineering campaign in which threat actors approached targets on Facebook and added them as friends on the social media platform, turning the trust-building exercise into a delivery channel for a remote access trojan called RokRAT.
"The threat actor used two Facebook |
How Can We Help?





















