{"id":18209,"date":"2022-02-07T04:10:04","date_gmt":"2022-02-07T12:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/07\/news-11942\/"},"modified":"2022-02-07T04:10:04","modified_gmt":"2022-02-07T12:10:04","slug":"news-11942","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/07\/news-11942\/","title":{"rendered":"A week in security (January 31 &#8211; February 6)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 07 Feb 2022 11:13:55 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/threat-actor-steals-email-with-zimbra-zero-day\/\">Threat actor steals email with Zimbra zero-day<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/02\/fbi-warns-of-bogus-job-postings-on-recruitment-sites\/\">FBI warns of bogus job postings on recruitment sites<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/02\/investment-scams-are-on-the-rise\/\">Investment scams are on the rise<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/a-worrying-etsy-listing-reveals-the-stalking-potential-of-apples-airtags\/\">A worrying Etsy listing reveals the stalking potential of Apple\u2019s AirTags<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/02\/beware-bogus-operagx-sponsorship-offers\/\">Beware bogus OperaGX sponsorship offers<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/crypto\/2022\/02\/320-milllion-stolen-from-wormhole-crypto-trading-platform\/\">$320 milllion stolen from Wormhole crypto-trading platform<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2022\/02\/cyberattack-on-fuel-supplier-causes-supply-chain-disruption\/\">Cyberattack on fuel supplier causes supply chain disruption<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/how-tos\/2022\/02\/how-to-speed-up-your-computer-or-laptop\/\">How to speed up your computer or laptop<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/02\/samba-patches-critical-vulnerability-that-allows-remote-code-execution-as-root\/\">Samba patches critical vulnerability that allows remote code execution as root<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/android\/2022\/02\/duo-of-android-dropper-and-payload-target-certain-countries-and-app-users\/\">Duo of Android dropper and payload target certain countries and app users<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/android\/2022\/02\/android-malware-brata-can-wipe-devices\/\">Android malware BRATA can wipe devices<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/apply-those-updates-now-cve-bypass-offers-up-admin-privileges-for-windows-10\/\">Apply those updates now: CVE bypass offers up admin privileges for Windows 10<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/01\/how-a-few-phd-students-revealed-that-phishing-trainings-might-just-not-work-lock-and-code-s03e03\/\">How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/01\/actors-verified-twitter-profile-hijacked-to-spam-nft-giveaways\/\">Actor\u2019s verified Twitter profile hijacked to spam NFT giveaways<\/a><\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/02\/a-week-in-security-january-31-february-6\/\">A week in security (January 31 &#8211; February 6)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/02\/a-week-in-security-january-31-february-6\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 07 Feb 2022 11:13:55 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/02\/a-week-in-security-january-31-february-6\/' title='A week in security (January 31 - February 6)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/shutterstock_610335074.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The most important and interesting security stories from the last seven days.<\/p>\n<p>Categories: <a href=\"https:\/\/blog.malwarebytes.com\/category\/a-week-in-security\/\" rel=\"category tag\">A week in security<\/a><\/p>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/airtags\/\" rel=\"tag\">AirTags<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/brata\/\" rel=\"tag\">BRATA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nfts\/\" rel=\"tag\">NFTs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/operagx\/\" rel=\"tag\">operagx<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/samba\/\" rel=\"tag\">samba<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/windows-10\/\" rel=\"tag\">windows 10<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wormhole\/\" rel=\"tag\">Wormhole<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zimbra\/\" rel=\"tag\">Zimbra<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/02\/a-week-in-security-january-31-february-6\/' title='A week in security (January 31 - February 6)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/02\/a-week-in-security-january-31-february-6\/\">A week in security (January 31 &#8211; February 6)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,24838,10462,24764,3764,24839,24805,3924,18295,10761,24804,24840],"class_list":["post-18209","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-airtags","tag-android","tag-brata","tag-malware","tag-nfts","tag-operagx","tag-phishing","tag-samba","tag-windows-10","tag-wormhole","tag-zimbra"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18209"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18209\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18209"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}