{"id":20516,"date":"2022-10-31T16:10:05","date_gmt":"2022-11-01T00:10:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/10\/31\/news-14249\/"},"modified":"2022-10-31T16:10:05","modified_gmt":"2022-11-01T00:10:05","slug":"news-14249","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/10\/31\/news-14249\/","title":{"rendered":"A week in security (October 24 &#8211; 30)"},"content":{"rendered":"<p>Last week on Malwarebytes Labs:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/podcast\/2022\/10\/a-gym-heist-goes-cyber-in-london\">Lock and Code: A gym heist in London goes cyber<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/health-care-provider-notifies-patients-of-potential-breach-of-personal-data-due-to-tracking-pixels\">Healthcare site leaks personal health information via Google and Meta tracking pixels<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/bogus-gift-vouchers-open-gateway-to-medical-records-and-food-plundering\">An odd kind of cybercrime: Gift vouchers, medical records, and&#8230;food<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/cisco-patch-needed-for-remote-file-access-vulnerability-in-identity-services-engine\">Cisco warns of ISE vulnerability with no fixed release or workaround<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/10\/an-interview-with-cyber-threat-hunter-hiep-hinh\">A cyber threat hunter talks about what he&rsquo;s learned in his 16+ year cybersecurity career<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/malware-authors-use-malformed-signature-trick-to-bypass-mark-of-the-web\">Malformed signature trick can bypass Mark of the Web<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/zero-day-threat-discovered-for-iphones-and-ipads.-update-your-devices-now\">iPhone zero-day. Update your devices now!<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/point-of-sale-malware-used-stole-the-details-of-over-167000-credit-cards\">Point-of-sale malware used to steal 167,000 credit cards<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/fbi-cisa-hhs-issue-joint-alert-about-daixin-ransomware-team\">US agencies issue warning about DAIXIN Team ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/next-year-chrome-will-start-forcing-users-to-update-their-windows\">Chrome users, you have 3 months to say goodbye to Windows 7 and 8.1<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/critical-openssl-fix-due-november-1st-get-ready-to-patch\">Critical OpenSSL fix due Nov 1&mdash;what you need to know<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/new-streaming-ad-technology-plays-hide-and-seek-with-gamers\">New streaming ad technology plays hide-and-seek with gamers<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/fake-proof-of-concepts-used-to-lure-security-professionals\">Fake Proof-of-Concepts used to lure security professionals<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/maintenance-mode-aims-to-keep-phone-data-private-during-repairs\">Maintenance Mode aims to keep phone data private during repairs<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/medibank-customers-personal-data-compromised-by-cyber-attack\">Medibank customers&#8217; personal data compromised by cyber attack<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/report-popular-yet-harmful-browser-hijackers-could-be-used-for-more-nefarious-tasks\">Dormant Colors browser hijackers could be used for more nefarious tasks, report says<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/10\/what-is-ransomware-as-a-service-and-how-is-it-evolving\">What is ransomware-as-a-service and how is it evolving?<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/update-chrome-now-and-fix-a-vulnerability-with-an-existing-exploit-for-it\">A Chrome fix for an in-the-wild exploit is out&mdash;Check your version<\/a><\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/a-week-in-security-october-24-30\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/news' rel='category tag'>News<\/a><\/p>\n<p>Tags: week in security<\/p>\n<p>Tags:  weekly blog roundup<\/p>\n<p>The most important and interesting computer security stories from the last week.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/a-week-in-security-october-24-30' title='A week in security (October 24 - 30)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/10\/a-week-in-security-october-24-30'>A week in security (October 24 &#8211; 30)<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32,10498,10506],"class_list":["post-20516","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-news","tag-week-in-security","tag-weekly-blog-roundup"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20516"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20516\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20516"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}