IT Security Newsletter

IT Security Newsletter - 3/9/2026

Written by Cadre | Mon, Mar 9, 2026

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI said this week that it is investigating "suspicious activities" on an internal system that contains sensitive information related to surveillance operations and investigations. The bureau is working to determine the scope and impact of the problem, according to a notification sent to members of Congress that says the unnamed culprit is using sophisticated techniques to exploit FBI network security controls. READ MORE...

Cognizant TriZetto breach exposes health data of 3.4 million patients

TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people. The firm, which has been operating under the Cognizant umbrella since 2014, disclosed that it detected suspicious activity on a web portal on October 2, 2025, and launched an investigation with the help of external cybersecurity experts. READ MORE...

Microsoft warns North Korean threat groups are scaling up fake worker schemes with generative AI

North Korean threat groups are using artificial intelligence tools to accelerate and expand the country's long-running scheme to get remote technical workers hired at global companies for longer durations, Microsoft Threat Intelligence said in a report Friday. AI services are empowering North Korean operatives across the attack lifecycle. Attackers have turned AI into a "force multiplier" that bolsters and automates their efforts to conduct research on targets, develop malicious resources, etc. READ MORE...

Krebs on Security: How AI Assistants are Moving the Security Goalposts

AI-based assistants or "agents" - autonomous programs that have access to the user's computer, files, online services and can automate virtually any task - are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations. READ MORE...

We've seen ransomware cost American lives. Here's what it will actually take to stop it.

Flights canceled. Emergency rooms shut down. Centuries-old companies shuttered. Ransomware and other similar cyberattacks have become so routine that even those serious human and economic consequences are often overlooked or easily forgotten. This lack of focus is dangerous. As former leaders of FBI and CISA cyber units, we've seen cybercrime ripple through communities - disrupting critical services, destroying jobs, and sometimes costing lives. READ MORE...

Spyware disguised as emergency-alert app sent to Israeli smartphones

Hamas-linked attackers are dropping spyware disguised as an emergency-alert app on Israelis' smartphones via SMS messages, according to security researchers. Acronis Threat Research Unit (TRU) analysts discovered the malicious app - a trojanized version of the Red Alert rocket app used by millions of Israelis - on March 1, after multiple citizens began reporting the scam on social media. READ MORE...

Trump's new cybersecurity strategy makes promises but lacks details

The Trump administration on Friday released a cybersecurity strategy that commits the U.S. to disrupting malicious cyber threat actors, protecting critical infrastructure, harnessing the power of AI and reducing regulations on businesses. The seven-page Cyber Strategy for America offers no details about how the government will implement the six pillars of President Donald Trump's ambitious cybersecurity agenda. READ MORE...

Quiz sites trick users into enabling unwanted browser notifications

Our support team flagged a number of customers who suspected their device might be infected with malware, but Malwarebytes scans came up empty. When the customers provided screenshots, our Malware Removal Support team quickly recognized the format as web push notifications. The reason the scans came up clean is that these notifications aren't malware on the device. They're browser notifications from websites that trick users into clicking "Allow." READ MORE...

ClickFix Attack Uses Windows Terminal to Evade Detection

A new variant of the ClickFix attack evades detection by instructing victims to use Windows Terminal instead of the Run dialog, Microsoft warns. Like traditional ClickFix attacks, the campaign relies on fake CAPTCHA pages, troubleshooting prompts, and verification lures to trick victims into executing malicious PowerShell commands. What sets the new campaign apart, however, is the fact that victims are instructed to open Windows Terminal directly, instead of relying on the Windows Run dialog. READ MORE...

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in hacking campaigns conducted by three distinct groups. The hacking campaigns came to light on Thursday in a report published by Google. All three campaigns used Coruna, the name of an advanced hacking kit that amassed 23 separate iOS exploits into five potent exploit chains. READ MORE...

  • ...in 1862, the Union ironclad warship USS Monitor fights CSS Virginia to a draw in the Battle of Hampton Roads, the first ever battle between two such vessels.
  • ...in 1933, FDR submits his Emergency Banking Act to Congress, in an attempt to stabilize the Depression-era banking system.
  • ...in 1934, Soviet cosmonaut Yuri Gagarin, the first human being to travel into space and achieve Earth orbit on the historic Vostok 1 mission, is born in Klushino, USSR.
  • ...in 1979, award-winning actor and musician Oscar Isaac ("Inside Llewyn Davis", "Star Wars: The Force Awakens") is born in Guatemala City, Guatemala.