scott.swabey@lafinboy.com

Millions at risk after nationwide CodeRED alert system outage and data breach

A ransomware attack on the CodeRED emergency alert system caused a nationwide outage and exposed personal data for millions of users, putting many communities at risk just as they rely on the service for urgent public warnings. The attackers stole customer information, including email addresses and passwords, which raised concerns about account security for ....

By |March 19, 2026|Categories: 589|

New ClickFix wave infects users with hidden malware in images and fake Windows updates

Researchers have uncovered a new wave of ClickFix attacks that trick Windows users into installing malware by faking legitimate system update screens and hiding malicious code in images. The scam begins with a full-screen browser page styled to look like the official “Windows Update” interface, prompting users to press Win+R, paste a command, and ....

By |March 19, 2026|Categories: 589|

Cloudflare says it’s investigating the outage that brought down Zoom and LinkedIn

Cloudflare reported that a brief but widespread outage interrupted access to major services like Zoom and LinkedIn after a faulty configuration change disrupted its firewall and related systems. The issue was quickly identified and resolved, with the company confirming it was not the result of a cyberattack. Even though the downtime lasted only minutes, ....

By |March 19, 2026|Categories: 589|

New Android malware lets criminals control your phone and drain your bank account

The article warns about a new strain of Android malware that gives criminals full control of an infected phone and direct access to a victim’s bank accounts. It spreads through fake apps and phishing messages that trick users into granting permissions, after which the malware can read texts, capture screen activity, steal login codes, ....

By |March 19, 2026|Categories: 589|

Update Chrome now: Google fixes 13 security issues affecting billions

The article reports that Google has released fixes for 13 security flaws that affect billions of users across Android, Chrome, and other widely used services. Several of the vulnerabilities were serious enough to allow attackers to gain elevated permissions, compromise data, or execute harmful code if a user opened a malicious file or link. ....

By |March 19, 2026|Categories: 589|

Fighting fraud at scale with Mastercard Threat intelligence

he Axios sponsored article explains how Mastercard uses large-scale threat intelligence to fight fraud across the global payments ecosystem. By analyzing vast volumes of real-time transaction data and signals from banks, merchants, and networks, Mastercard can detect suspicious behavior patterns and stop fraud before it spreads. The approach relies on advanced analytics and AI ....

By |March 19, 2026|Categories: 589|

How attackers use real IT tools to take over your computer

The article explains how attackers increasingly use legitimate IT tools to take over computers, making their intrusions harder to detect because the activity looks like normal system administration. Criminals often begin by stealing credentials through phishing or exploiting weak passwords, then use trusted remote management software to move through a network, install backdoors, and ....

By |March 19, 2026|Categories: 589|

Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI

The FBI has issued a warning that criminals are harvesting publicly available photos from social media like Facebook, LinkedIn, and X and then manipulating them to create fake “proof of life” images for virtual kidnapping scams, where they contact victims’ friends or family to demand ransom for a loved one who is actually safe. ....

By |March 19, 2026|Categories: 589|

DroidLock malware locks you out of your Android device and demands ransom

Malwarebytes reports that a new Android malware called DroidLock has been discovered actively targeting users, particularly Spanish-speaking ones, by tricking them into installing a malicious app from phishing sites that impersonate legitimate services; once installed with Device Administrator and Accessibility permissions, DroidLock takes full control of the device, uses overlays to capture unlock patterns, ....

By |March 19, 2026|Categories: 589|

Wiz Co-Founder, CTO: Cybersecurity ‘Nearly Impossible’ Unless Everyone Owns It

Cybersecurity has become so complex and fast moving that it is nearly impossible to manage unless responsibility is shared across an entire organization, according to Wiz cofounder and CTO Ami Luttwak. He argues that modern cloud environments change constantly, making traditional security models that rely on a small central team ineffective at catching risks ....

By |March 19, 2026|Categories: 589|

Recent news

Go to Top