{"id":19441,"date":"2022-06-27T02:10:16","date_gmt":"2022-06-27T10:10:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/27\/news-13174\/"},"modified":"2022-06-27T02:10:16","modified_gmt":"2022-06-27T10:10:16","slug":"news-13174","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/27\/news-13174\/","title":{"rendered":"A week in security (June 20 \u2013 June 26)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 27 Jun 2022 09:30:06 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/06\/linkedin-scams-are-a-significant-threat-warns-fbi\/\">LinkedIn scams are a &#8220;significant threat&#8221;, warns FBI<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2022\/06\/ddos-for-hire-service-provider-jailed\/\">DDoS-for-hire service provider jailed<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/06\/internet-safety-month-7-tips-for-staying-safe-online-while-on-vacation\/\">Internet Safety Month: 7 tips for staying safe online while on vacation<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/client-side-magecart-attacks-still-around-but-more-covert\/\">Client-side Magecart attacks still around, but more covert<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/security-vulnerabilities-5-times-that-organizations-got-hacked\/\">Security vulnerabilities: 5 times that organizations got hacked<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2022\/06\/you-can-be-tracked-online-using-your-chrome-browser-extensions\/\">You can be tracked online using your Chrome browser extensions<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/russias-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine\/\">Russia&#8217;s APT28 uses fear of nuclear war to spread Follina docs in Ukraine<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/dfscoerce-a-new-ntlm-relay-attack-can-take-control-over-a-windows-domain\/\">DFSCoerce, a new NTLM relay attack, can take control over a Windows domain<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/06\/watch-out-for-the-email-that-says-you-have-a-new-voicemail\/\">Watch out for the email that says &#8220;You have a new voicemail!&#8221;<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2022\/06\/7-zip-gets-mark-of-the-web-feature-increases-protection-for-users\/\">7-Zip gets Mark of the Web feature, increases protection for users<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/mega-claims-it-cant-decrypt-your-files-but-someones-managed-to\/\">MEGA claims it can\u2019t decrypt your files. But someone\u2019s managed to\u2026<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/06\/police-seize-and-dismantle-massive-phishing-operation\/\">Police seize and dismantle massive phishing operation<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/06\/rogue-cryptocurrency-billboards-go-phishing-for-wallets\/\">Rogue cryptocurrency billboards go phishing for wallets<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/06\/dial-311-for-cybersecurity-emergencies\/\">Dial 311 for\u2026cybersecurity emergencies?<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/06\/conti-ransomware-disappears-did-it-fake-its-own-death\/\">Conti ransomware group\u2019s pulse stops, but did it fake its own death?<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/06\/cybersecurity-agencies-you-dont-have-to-delete-powershell-to-secure-it\/\">Cybersecurity agencies: You don\u2019t have to delete PowerShell to secure it<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/personal\/2022\/06\/5-ways-to-avoid-being-catfished\/\">5 ways to avoid being catfished<\/a><\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-20-june-26\/\">A week in security (June 20 \u2013 June 26)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-20-june-26\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 27 Jun 2022 09:30:06 +0000<\/strong><\/p>\n<p>The most important and interesting computer security stories from the last week.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-20-june-26\/\">A week in security (June 20 \u2013 June 26)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26685,26644,12969,13561,16658,10699,25141,25142,11052,26703,26704,10514,10712,26634,6627,18710,11448,26705,19622,25828,20724,26706,3924,11191,3765,26626,26627,20795],"class_list":["post-19441","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-26685","tag-7-zip","tag-a-week-in-security","tag-apt28","tag-catfishing","tag-chrome","tag-conti","tag-conti-ransomware","tag-cryptocurrency","tag-cryptocurrency-scam","tag-cybersecurity-emergency","tag-ddos","tag-ddos-for-hire","tag-dfscoerce","tag-fbi","tag-internet-safety-month","tag-linkedin","tag-linkedin-scam","tag-magecart","tag-mark-of-the-web","tag-mega","tag-ntlm-relay-attack","tag-phishing","tag-powershell","tag-ransomware","tag-vacation-cybersecurity","tag-vacation-privacy","tag-voicemail-phishing"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19441"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19441\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19441"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}