{"id":18340,"date":"2022-02-22T16:00:12","date_gmt":"2022-02-23T00:00:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/22\/news-12073\/"},"modified":"2022-02-22T16:00:12","modified_gmt":"2022-02-23T00:00:12","slug":"news-12073","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/22\/news-12073\/","title":{"rendered":"Recent Cyberattacks Target Open-source Web Servers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/cyberattacks-increasingly-target-open-source-web-servers\/open-web-servers-rnp.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jon Clay| Date: Tue, 22 Feb 2022 00:00:00 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/b\/recent-cyberattacks-open-source-web-servers.html\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/b\/cyberattacks-increasingly-target-open-source-web-servers\/open-web-servers-rnp.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jon Clay| Date: Tue, 22 Feb 2022 00:00:00 +0000<\/strong><\/p>\n<p>Malicious actors take advantage of people\u2019s reliance on web servers to perform attacks like remote code execution, access control bypass, denial of service, or even cyberjacking the victim servers to mine cryptocurrencies.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[24529,24512,24513,24528,24780,25080],"class_list":["post-18340","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-trend-micro-research-apt-targeted-attacks","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-exploits-vulnerabilities","tag-trend-micro-research-network","tag-trend-micro-research-security-strategies"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18340"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18340\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18340"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}