{"id":19383,"date":"2022-06-20T02:10:03","date_gmt":"2022-06-20T10:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/20\/news-13116\/"},"modified":"2022-06-20T02:10:03","modified_gmt":"2022-06-20T10:10:03","slug":"news-13116","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/20\/news-13116\/","title":{"rendered":"A week in security (June 13 \u2013 June 19)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 20 Jun 2022 09:49:33 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/serious-vulnerabilities-found-in-itarian-software-patches-available-for-saas-products\/\">Serious vulnerabilities found in ITarian software, patches available for SaaS products<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/update-chrome-now-four-high-risk-vulnerabilities-found\/\">Update Chrome now: Four high risk vulnerabilities found<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/taking-down-the-ip2scam-tech-support-campaign\/\">Taking down the IP2Scam tech support campaign<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/dont-panic-unpatchable-mac-vulnerability-discovered\/\">Don\u2019t panic! \u201cUnpatchable\u201d Mac vulnerability discovered<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/06\/introducing-malwarebytes-vulnerability-assessment-for-oneview-how-to-check-for-common-vulnerabilities-and-exposures-cves\/\">Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs)<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/multiple-adversaries-exploiting-confluence-vulnerability-warns-microsoft\/\">\u201cMultiple adversaries\u201d exploiting Confluence vulnerability, warns Microsoft<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/personal\/scams-personal\/2022\/06\/instagram-scam-steals-your-selfies-to-trick-your-friends\/\">Instagram scam steals your selfies to trick your friends<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2022\/06\/karakurt-extortion-group-threat-profile\/\">Karakurt extortion group: Threat profile<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2022\/06\/email-compromise-leads-to-healthcare-data-breach-at-kaiser-permanente\/\">Email compromise leads to healthcare data breach at Kaiser Permanente<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/its-official-today-you-can-say-goodbye-to-internet-explorer-or-can-you\/\">It\u2019s official, today you can say goodbye to Internet Explorer. Or can you?<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/update-now-microsoft-patches-follina-and-many-other-security-updates\/\">Update now!&nbsp; Microsoft patches Follina, and many other security updates<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2022\/06\/firefox-stops-advertisers-tracking-you-as-you-browse-calls-itself-the-most-private-and-secure-major-browser\/\">Firefox stops advertisers tracking you as you browse, calls itself the most \u201cprivate and secure major browser\u201d<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2022\/06\/record-breaking-https-ddos-attack\/\">Record breaking HTTPS DDoS attack<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/stealthy-symbiote-linux-malware-is-after-financial-institutions\/\">Stealthy Symbiote Linux malware is after financial institutions<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2022\/06\/photos-of-kids-taken-from-spyware-ridden-phones-found-exposed-on-the-internet\/\">Photos of kids taken from spyware-ridden phones found exposed on the internet<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/06\/interpols-first-light-operation-smashes-crime-on-a-global-scale\/\">Interpol\u2019s First Light operation smashes crime on a global scale<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/hertzbleed-exposes-computers-secret-whispers\/\">Hertzbleed exposes computers\u2019 secret whispers<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/06\/alphv-aims-to-shock-victim-with-dedicated-leak-site-for-its-employees-and-customers\/\">ALPHV squeezes victim with dedicated leak site for employees and customers<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/podcast\/2022\/06\/securing-the-software-supply-chain-with-kim-lewandowski-lock-and-code-s03e13\/\">Securing the software supply chain, with Kim Lewandowski: Lock and Code S03E13<\/a><\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-13-june-19\/\">A week in security (June 13 \u2013 June 19)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-13-june-19\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 20 Jun 2022 09:49:33 +0000<\/strong><\/p>\n<p>The most important and interesting computer security stories from the last week.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-13-june-19\/\">A week in security (June 13 \u2013 June 19)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12969,10699,21782,26422,11122,26337,26569,10829,11854,26622,26510,26553,26619,21882,24306,16821,10516,10443,19409,26623,10544],"class_list":["post-19383","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-a-week-in-security","tag-chrome","tag-confluence","tag-confluence-vulnerability","tag-firefox","tag-follina","tag-https-ddos","tag-internet-explorer","tag-interpol","tag-ip2scam","tag-itarian","tag-kaiser-permanente","tag-kim-lewandowski","tag-linux-malware","tag-lock-and-code","tag-mac-vulnerability","tag-microsoft","tag-spyware","tag-stalkerware","tag-symbiote","tag-tech-support-scam"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19383"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19383\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19383"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}