Cussins Enterprises LLC
Technology is a paint brush on the canvas of life.
What can we paint for you?
Cybersecurity News
Awareness of what is happening is the 1st to a secure system.Threat Post
Firewall Bug Under Active Attack Triggers CISA WarningOn August 23, 2022Source: Web Security – ThreatpostBy ThreatpostCategories: Vulnerabilities, Web Security CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.… Read more |
Fake Reservation Links Prey on Weary TravelersOn August 22, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Malware, Web Security Fake travel reservations are exacting more pain from the travel weary, already dealing with the mise… Read more |
Google Patches Chrome’s Fifth Zero-Day of the YearOn August 18, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security, Google Chrome, zero-day vulnerabilities An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arb… Read more |
Phishers Swim Around 2FA in Coinbase Account HeistsOn August 8, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Web Security Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so the… Read more |
Open Redirect Flaw Snags Amex, Snapchat User DataOn August 5, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Vulnerabilities, Web Security Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among ot… Read more |
Universities Put Email Users at Cyber RiskOn August 2, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Vulnerabilities, Web Security DMARC analysis by Proofpoint shows that institutions in the U.S. have among some of the poorest prot… Read more |
Threat Actors Pivot Around Microsoft’s Macro-Blocking in OfficeOn July 28, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwa… Read more |
IoT Botnets Fuel DDoS Attacks – Are You Prepared?On July 26, 2022Source: Web Security – ThreatpostBy Sponsored ContentCategories: Sponsored, Vulnerabilities, Web Security, indusface The increased proliferation of IoT devices paved the way for the rise of IoT botnets that amplifies… Read more |
Magecart Serves Up Card Skimmers on Restaurant-Ordering SystemsOn July 20, 2022Source: Web Security – ThreatpostBy Elizabeth MontalbanoCategories: Hacks, Malware, Web Security 300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against Menu… Read more |
Authentication Risks Discovered in Okta PlatformOn July 19, 2022Source: Web Security – ThreatpostBy Nate NelsonCategories: Privacy, Web Security Four newly discovered attack paths could lead to PII exposure, account takeover, even organizational… Read more |
Beeping Computer
https://www.bleepingcomputer.com/feed/ is invalid XML, likely due to invalid characters. XML error: XML_ERR_NAME_REQUIRED at line 1, column 753 |
Motherboard
https://motherboard.vice.com/en_us/rss is invalid XML, likely due to invalid characters. XML error: Undeclared entity error at line 22, column 112 |
Data Breeches
5 Alleged Members of Scattered Spider Charged Federally (1)On November 20, 2024Source: DataBreaches.NetBy DissentCategories: Of Note, Phishing, U.S. LOS ANGELES – Law enforcement today unsealed criminal charges against five defendants who allegedly… Read more |
Thai loyalty membership card data of 5 million customers put up for sale on hacking forumOn November 20, 2024Source: DataBreaches.NetBy DissentCategories: Breach Incidents, Hack Central Group is a multinational conglomerate in Thailand that describes itself as one of the larges… Read more |
Attackers Targeting VPNs Account for 28.7 Percent of Ransomware Incidents in Q3 According to Corvus Insurance Cyber Threat ReportOn November 20, 2024Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses A press release from Corvus Insurance has some statistics worth mulling over: Corvus Insurance, a w… Read more |
Apple says Mac users targeted in zero-day cyberattacksOn November 20, 2024Source: DataBreaches.NetBy DissentCategories: Miscellaneous Zack Whittaker reports: Apple released security updates on Tuesday that it says are “recommended for… Read more |
Fintech Giant Finastra Investigating Data BreachOn November 20, 2024Source: DataBreaches.NetBy DissentCategories: Business Sector, Financial Sector, Hack Brian Krebs reports: The financial technology firm Finastra is investigating the alleged large-scale… Read more |
Hibernation is Over? Akira Ransomware: Published Over 30 New Victims on their DLS (updated)On November 20, 2024Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Malware Adi Bleih reports: The Akira ransomware group has been active since March 2023, targeting diverse in… Read more |
Phobos Ransomware Administrator Extradited from South Korea to Face Cybercrime ChargesOn November 18, 2024Source: DataBreaches.NetBy DissentCategories: Malware Russian National Alleged to Have Coordinated Sale, Distribution, and Operation of Phobos Ransomware… Read more |
T-Mobile Hack Linked To Chinese State Sponsored HackersOn November 18, 2024Source: DataBreaches.NetBy DissentCategories: Business Sector, Of Note Lars Daniel reports: T-Mobile is the latest telecommunications company to report being impacted by a… Read more |
Bipartisan effort to clean up cyber regulations gets a boost in House, but calendar is tightOn November 18, 2024Source: DataBreaches.NetBy DissentCategories: Legislation, Of Note, U.S. Martin Matishak reports: A House Republican late last week introduced legislation to untangle the co… Read more |
Thames Water’s IT ‘falling apart’ and is hit by cyber-attacks, sources claimOn November 18, 2024Source: DataBreaches.NetBy DissentCategories: Commentaries and Analyses, Non-U.S. Anna Isaac reports: “The software we use is older than me, and some of the hardware is older than my… Read more |
Cyberscoop
CISOs can now obtain professional liability insuranceOn November 20, 2024Source: CyberScoopBy Greg OttoCategories: Cybersecurity, Financial, Crum & Forster, insurance A new business insurance offering can shield CISOs from personal losses in the event of a lawsuit. T… Read more |
US charges five men linked to ‘Scattered Spider’ with wire fraudOn November 20, 2024Source: CyberScoopBy Greg OttoCategories: Cybercrime, cybercrime, Department of Justice (DOJ) The men have been charged with conspiracy to commit wire fraud. The post US charges five men linked… Read more |
Vulnerability disclosure policy bill for federal contractors clears Senate panelOn November 20, 2024Source: CyberScoopBy mbrackenCategories: Policy, cyber workforce, cybersecurity workforce, IT supply chain, vdp, vulnerability disclosure, vulnerability reporting The Homeland Security and Governmental Affairs Committee on Wednesday also advanced legislation to s… Read more |
Sen. Blumenthal wants FCC to get busy on telecom wiretap security rulesOn November 19, 2024Source: CyberScoopBy Tim StarksCategories: Cybersecurity, Election Security, Government, Policy, Privacy, Technology, adam meyers, China, CrowdStrike, Donald Trump, FCC, Federal Communications Commission, regulation, regulators, Richard Blumenthal, Senate Judiciary Committee, surveillance, telecommunications, telecoms The subcommittee chair said the FCC has the ability to act now in response to Salt Typhoon targeting… Read more |
Microsoft launches ‘Zero Day Quest’ competition to enhance cloud and AI securityOn November 19, 2024Source: CyberScoopBy Greg OttoCategories: AI, Cybersecurity, Uncategorized, bug bounty, cloud computing, Microsoft The tech giant is upping the bounties attached to several popular systems. The post Microsoft launch… Read more |
Bipartisan Senate bill targets supply chain threats from foreign adversariesOn November 19, 2024Source: CyberScoopBy mbrackenCategories: Threats, China, FASC, Federal Acquisition Security Council, Office of the National Cyber Director The bill would strengthen oversight powers for the body charged with investigating IT products from… Read more |
Rail and pipeline representatives push to dial back TSA’s cyber mandatesOn November 19, 2024Source: CyberScoopBy Christian VasquezCategories: Cybersecurity, Colonial Pipeline, Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), House Homeland Security Committee, industrial control systems (ICS), pipeline rules, policy, railroads, Transportation Security Administration (TSA) House Republicans during a Tuesday hearing were sympathetic to industry calls for shaving down cyber… Read more |
Botnet serving as ‘backbone’ of malicious proxy network taken offlineOn November 19, 2024Source: CyberScoopBy mbrackenCategories: Cybercrime, Black Lotus Labs, botnets, cybercrime, DDoS, ngioweb, NSOCKS, Shadowserver, Spur Lumen Technology’s Black Lotus Labs took the ngioweb botnet and NSOCKS proxy offline Tuesday. The po… Read more |
Attackers are hijacking Jupyter notebooks to host illegal Champions League streamsOn November 19, 2024Source: CyberScoopBy Christian VasquezCategories: Cybercrime, Cybersecurity, Research, Threats, Champions League, Cloud, cloud security, cybercrime, Jupyter, open source, piracy, UEFA Normally reserved for data analysis, a cybersecurity firm caught online content pirates hosting socc… Read more |
How to remove the cybersecurity gridlock from the nation’s energy lifelinesOn November 19, 2024Source: CyberScoopBy Greg OttoCategories: Commentary, Cybersecurity, Government, Policy, critical infrastructure A unified approach from both public and private sectors is essential to safeguard our critical infra… Read more |
Krebs On Security
The Hacker News
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card DataOn November 21, 2024Source: The Hacker NewsByThreat hunters are warning about an updated version of the Python-based NodeStealer that's now equip… Read more Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims' Facebook Ads Manager accounts and harvest credit card data stored in web browsers.
"They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement," Netskope Threat Labs researcher |
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile PaymentsOn November 20, 2024Source: The Hacker NewsByThreat actors are increasingly banking on a new technique that leverages near-field communication (N… Read more Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim's funds at scale.
The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic.
"Criminals can now misuse Google Pay and Apple |
NHIs Are the Future of Cybersecurity: Meet NHIDROn November 20, 2024Source: The Hacker NewsByThe frequency and sophistication of modern cyberattacks are surging, making it increasingly challeng… Read more The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes. While organizations often take |
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart PackageOn November 20, 2024Source: The Hacker NewsByMultiple decade-old security vulnerabilities have been disclosed in the needrestart package installe… Read more Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction.
The Qualys Threat Research Unit (TRU), which identified and reported the flaws early last month, said they are trivial to exploit, necessitating that |
Microsoft Launches Windows Resiliency Initiative to Boost Security and System IntegrityOn November 20, 2024Source: The Hacker NewsByMicrosoft has announced a new Windows Resiliency Initiative as a way to improve security and reliabi… Read more Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliability, as well as ensure that system integrity is not compromised.
The idea, the tech giant said, is to avoid incidents like that of CrowdStrike's earlier this July, enable more apps and users to be run without admin privileges, add controls surrounding the use of unsafe apps and drivers, and offer |
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom NetworksOn November 20, 2024Source: The Hacker NewsByA new China-linked cyber espionage group has been attributed as behind a series of targeted cyber at… Read more A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.
Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications |
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day VulnerabilitiesOn November 20, 2024Source: The Hacker NewsByApple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to… Read more Apple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild.
The flaws are listed below -
CVE-2024-44308 (CVSS score: 8.8) - A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content
CVE-2024-44309 (CVSS score: 6.1 |
Oracle Warns of Agile PLM Vulnerability Currently Under Active ExploitationOn November 20, 2024Source: The Hacker NewsByOracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Managemen… Read more Oracle is warning that a high-severity security flaw impacting the Agile Product Lifecycle Management (PLM) Framework has been exploited in the wild.
The vulnerability, tracked as CVE-2024-21287 (CVSS score: 7.5), could be exploited sans authentication to leak sensitive information.
"This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network |
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT DevicesOn November 19, 2024Source: The Hacker NewsByThe malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOC… Read more The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal.
"At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly utilizing small office/home office (SOHO) routers and IoT devices," the Black Lotus Labs team at |
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports BroadcastsOn November 19, 2024Source: The Hacker NewsByMalicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream rip… Read more Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools.
The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a report shared with The |