Cussins Enterprises LLC

Technology is a paint brush on the canvas of life. 
What can we paint for you?

Cybersecurity News

Awareness of what is happening is the 1st to a secure system.

Threat Post

Firewall Bug Under Active Attack Triggers CISA Warning

On August 23, 2022Source: Web Security – ThreatpostBy Threatpost
Categories: Vulnerabilities, Web Security

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read more

Fake Reservation Links Prey on Weary Travelers

On August 22, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Malware, Web Security

Fake travel reservations are exacting more pain from the travel weary, already dealing with the miseRead more

Google Patches Chrome’s Fifth Zero-Day of the Year

On August 18, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbRead more

Phishers Swim Around 2FA in Coinbase Account Heists

On August 8, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Web Security

Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so theRead more

Open Redirect Flaw Snags Amex, Snapchat User Data

On August 5, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Vulnerabilities, Web Security

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among otRead more

Universities Put Email Users at Cyber Risk

On August 2, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Vulnerabilities, Web Security

DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest protRead more

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office

On July 28, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwaRead more

IoT Botnets Fuel DDoS Attacks – Are You Prepared?

On July 26, 2022Source: Web Security – ThreatpostBy Sponsored Content
Categories: Sponsored, Vulnerabilities, Web Security, indusface

The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifiesRead more

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

On July 20, 2022Source: Web Security – ThreatpostBy Elizabeth Montalbano
Categories: Hacks, Malware, Web Security

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuRead more

Authentication Risks Discovered in Okta Platform

On July 19, 2022Source: Web Security – ThreatpostBy Nate Nelson
Categories: Privacy, Web Security

Four newly discovered attack paths could lead to PII exposure, account takeover, even organizationalRead more

Beeping Computer

https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753

Motherboard

https://motherboard.vice.com/en_us/rss is invalid XML, likely due to invalid characters. XML error: Undeclared entity error at line 23, column 112

Data Breeches

Today’s reminder not to just repeat threat actors’ claims without checking or attempting to verify them first.

On January 22, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses

Here’s today’s reminder not to just repeat threat actors’ claims without checkingRead more

European Commission Publishes Action Plan on Cybersecurity of Hospitals and Healthcare Providers

On January 21, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Non-U.S.

Mark Young & David Brazil of Covington and Burling write: On 15 January 2025, the European CommRead more

Cybersecurity Incident Impacting Addison Northwest School District (ANWSD)

On January 21, 2025Source: DataBreaches.NetBy Dissent
Categories: Education Sector, U.S.

Legacy data and servers have bitten another entity. Kudos to Addison Northwest School District (ANWSRead more

Toronto student information dating back to 1985 may have been accessed in PowerSchool cyber incident

On January 20, 2025Source: DataBreaches.NetBy Dissent
Categories: Education Sector, Non-U.S., Of Note, Subcontractor

Meredith Bond reports: Student information for those who attended Toronto District School Board as fRead more

The U.K. is considering prohibiting ransom payments. It’s a difficult issue.

On January 20, 2025Source: DataBreaches.NetBy Dissent
Categories: Commentaries and Analyses, Malware, Miscellaneous, Of Note, extortion, ransom, ransomware

How many times have the FBI and CISA urged entities NOT to pay ransom because it just encourages theRead more

DOJ confirms arrested US Army soldier is linked to AT&T and Verizon hacks

On January 18, 2025Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Of Note, Subcontractor, U.S.

Zack Whittaker reports: U.S. prosecutors have formally linked the arrest of a serving U.S. Army soldRead more

FBI Warned Agents It Believes Phone Logs Hacked Last Year

On January 18, 2025Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Hack, Of Note

Jake Bleiberg and Margi Murphy FBI leaders have warned that they believe hackers who broke into ATRead more

MedSave Health Insurance TPA hacked; firm has yet to comment or respond

On January 17, 2025Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Hack, Health Data, Non-U.S.

The individual known as “0mid16B” has been busy, it seems. They contacted DataBreaches oRead more

HHS Office for Civil Rights Settles HIPAA Ransomware Cybersecurity Investigation for $10,000

On January 16, 2025Source: DataBreaches.NetBy Dissent
Categories: Breach Incidents, Health Data, HIPAA, Malware, U.S.

Settlement with Northeast Surgical Group marks OCR’s 10th ransomware enforcement action and 4th enfoRead more

FTC Takes Action Against GoDaddy for Alleged Lax Data Security for Its Website Hosting Services

On January 15, 2025Source: DataBreaches.NetBy Dissent
Categories: Business Sector, Federal, U.S.

Proposed order will prohibit GoDaddy from misleading customers about its security protections and reRead more

Cyberscoop

Ransomware groups pose as fake tech support over Teams

On January 21, 2025Source: CyberScoopBy djohnson
Categories: Ransomware, Microsoft, ransomware, Sophos

A researcher at Sophos told CyberScoop that the company observed these tactics being used against muRead more

From qualitative to quantifiable: Transforming cyber risk management for critical infrastructure

On January 21, 2025Source: CyberScoopBy mbracken
Categories: Commentary, critical infrastructure, cyber risk management, cyber risk quantification, Transportation Security Administration (TSA)

TSA’s new incident disclosure rules are a good fit for cyber risk quantification. The post From qualRead more

TSA extends cyber requirements for pipeline owners

On January 17, 2025Source: CyberScoopBy mbracken
Categories: Cybersecurity, Colonial Pipeline, pipeline rules, Transportation Security Administration (TSA)

The agency added an additional year to two post-Colonial Pipeline security directives. The post TSARead more

Noem: No anti-disinformation, misinformation action under her as DHS secretary

On January 17, 2025Source: CyberScoopBy Tim Starks
Categories: Government, Joe Biden, Josh Hawley, Kristi Noem, Cybersecurity and Infrastructure Security Agency, Trump, Disinformation Governance Board, disinformation, Biden, Biden administration, U.S. Supreme Court, CISA, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), Chris Krebs, rand paul, Supreme Court, Sen. Ron Johnson, Senate Homeland Security and Governmental Affairs Committee, Ron Johnson, Trump administration, Donald Trump

She said at her confirmation hearing that CISA needs to be “smaller, more nimble” and it has gone “fRead more

Treasury sanctions Chinese cybersecurity company, affiliate for Salt Typhoon hacks 

On January 17, 2025Source: CyberScoopBy djohnson
Categories: Cybercrime, China, Flax Typhoon, Office of Foreign Assets Control (OFAC), Salt Typhoon, Treasury Department

It’s the first formal attribution for the campaign that has swept up data from at least nine telecomRead more

Closing software-understanding gap is critical to national security, CISA says

On January 17, 2025Source: CyberScoopBy mbracken
Categories: Cybersecurity, China, DARPA, software, nsa, Cybersecurity and Infrastructure Security Agency (CISA)

In a joint report with DARPA and others, the cyber agency said that knowledge gap “exacerbates” riskRead more

Restoring U.S. cyber resilience: A blueprint for the new administration

On January 17, 2025Source: CyberScoopBy Greg Otto
Categories: Commentary, CDK Global, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), MOVEit Transfer, resilience, Salt Typhoon, Volt Typhoon

The Trump administration can start by returning CISA to its core mission, former DHS and CaliforniaRead more

How HHS has strengthened cybersecurity of hospitals and health care systems

On January 17, 2025Source: CyberScoopBy mbracken
Categories: Commentary, Department of Health and Human Services (HHS), health care

The agency has embraced performance goals, provided resources to small systems and improved coordinaRead more

Treasury sanctions North Korea over remote IT worker schemes

On January 16, 2025Source: CyberScoopBy Greg Otto
Categories: Geopolitics, Government, North Korea, North Korean IT workers, sanctions, Treasury Department

The North Korean office responsible for the scheme, Department 53, was created to funnel money backRead more

Biden cyber executive order gets mostly plaudits, but its fate is uncertain

On January 16, 2025Source: CyberScoopBy Tim Starks
Categories: Government, AI, AI executive order, artificial intelligence, Bennie Thompson, Biden, Biden administration, Bob Kolasky, Center for Cybersecurity Policy and Law, Center for Democracy & Technology, Center for Democracy and Technology, Chris Inglis, CISA, cloud computing, contracting, critical infrastructure, Cybersecurity and Infrastructure Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), Donald Trump, encryption, fraud, House Homeland Security Committee, Joe Biden, Mark Green, National Cyber Director, National Risk Management Center, National Security Council, National Security Council (NSC), Office of the National Cyber Director, operational technology, phishing, quantum computing, supply chain, supply chain security, Trump, Trump administration

At least one key Republican told CyberScoop that he wasn’t happy about the last-minute nature of theRead more

Krebs On Security

The Hacker News

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

On January 22, 2025Source: The Hacker NewsBy

Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 newRead more

Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances. "Easily exploitable

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices

On January 22, 2025Source: The Hacker NewsBy

Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 TerRead more

Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia. The activity originated

Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routers

On January 21, 2025Source: The Hacker NewsBy

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws inRead more

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc Botnet. The ongoing activity "demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks," Qualys security researcher Shilpesh

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

On January 21, 2025Source: The Hacker NewsBy

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagatRead more

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week. "This

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

On January 21, 2025Source: The Hacker NewsBy

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmittiRead more

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity. Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

On January 21, 2025Source: The Hacker NewsBy

Imagine receiving a penetration test report that leaves you with more questions than answers. QuestiRead more

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app tested?" or " Were there any security issues that could have been identified during testing?" often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

On January 21, 2025Source: The Hacker NewsBy

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted ChinRead more

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences with a phishing

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

On January 21, 2025Source: The Hacker NewsBy

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknownRead more

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the "level of security," CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

On January 20, 2025Source: The Hacker NewsBy

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allowRead more

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. "Internet hosts that accept tunneling packets without verifying the sender's identity can be hijacked to perform anonymous attacks and provide access to their networks," Top10VPN said in a study, as part of a collaboration with KU Leuven professor

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

On January 20, 2025Source: The Hacker NewsBy

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targRead more

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning "organization" in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the

How Can We Help?

8 + 5 =

Share This