{"id":19317,"date":"2022-06-13T03:10:06","date_gmt":"2022-06-13T11:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/13\/news-13050\/"},"modified":"2022-06-13T03:10:06","modified_gmt":"2022-06-13T11:10:06","slug":"news-13050","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/13\/news-13050\/","title":{"rendered":"A week in security (June 6 &#8211; June 12)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 13 Jun 2022 10:29:57 +0000<\/strong><\/p>\n<p>Last week on Malwarebytes Labs:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/06\/fbi-warns-of-scammers-soliciting-donations-for-ukraine\/\">FBI warns of scammers soliciting donations for Ukraine<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/microsoft-autopatch-is-here-but-can-you-use-it\/\">Microsoft autopatch is here&#8230;but can you use it?<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/06\/rsa-2022-prometheus-ransomwares-flaws-inspired-researchers-to-try-to-build-a-near-universal-decryption-tool\/\">Prometheus ransomware&#8217;s flaws inspired researchers to try to build a near-universal decryption tool<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/rotten-apples-banned-from-the-app-store\/\">Rotten apples banned from App store<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2022\/06\/hackers-can-take-over-accounts-you-havent-even-created-yet\/\">Hackers can take over accounts you haven&#8217;t even created yet<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/06\/ransomware-task-force-priorities-see-progress-in-first-year\/\">Ransomware Task Force priorities see progress in first year<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2022\/06\/coffee-app-in-hot-water-for-constant-tracking-of-user-location\/\">Coffee app in hot water for constant tracking of user location<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2022\/06\/ssndob-marketplace-shut-down-by-global-law-enforcement-operation\/\">SSNDOB stolen data marketplace shut down by global law enforcement operation<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/5-linux-malware-families-smbs-should-protect-themselves-against\/\">5 Linux malware families SMBs should protect themselves against<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/opinion\/2022\/06\/awful-4chan-chat-bot-spouts-racial-slurs-and-antisemitic-abuse\/\">Awful 4chan chat bot spouts racial slurs and antisemitic abuse<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\/\">MakeMoney malvertising campaign adds fake update template<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/privacy-2\/2022\/06\/apples-passkeys-attempt-to-solve-the-password-problem\/\">Apple&#8217;s passkeys attempt to solve the password problem<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2022\/06\/update-now-patch-against-vulnerabilities-in-meeting-owl-pro-and-whiteboard-owl-devices\/\">Update now! Patch against vulnerabilities in Meeting Owl Pro and Whiteboard Owl devices<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/06\/blackbasta-is-the-latest-ransomware-to-target-esxi-virtual-machines-on-linux\/\">BlackBasta is the latest ransomware to target ESXi virtual machines on Linux<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/06\/facebook-users-targeted-in-massive-phishing-campaign\/\">Facebook users targeted in massive phishing campaign<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2022\/06\/asyncrat-surpasses-dridex-trickbot-and-emotet-to-become-dominant-email-threat\/\">ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/06\/cloud-data-breaches-4-biggest-threats-to-cloud-storage-security\/\">Cloud data breaches: 4 biggest threats to cloud storage security<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/scams\/2022\/06\/whatsapp-spam-offers-up-bq-fathers-day-contest-2022\/\">WhatsApp spam offers up &#8220;B&amp;Q Father&#8217;s Day Contest 2022&#8221;<\/a><\/li>\n<\/ul>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-6-june-12\/\">A week in security (June 6 &#8211; June 12)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-6-june-12\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 13 Jun 2022 10:29:57 +0000<\/strong><\/p>\n<p>The most important and interesting computer security stories from the last week.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/a-week-in-security\/2022\/06\/a-week-in-security-june-6-june-12\/\">A week in security (June 6 &#8211; June 12)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15120,12969,26499,26500,26501,26486,24038,26502,10486,11970,15715,26503,3589,6627,25474,10496,21882,26504,10531,26482,10516,3924,26441,26505,3765,26469,26472,13256,8642,11586,11587,10440,26485,26436],"class_list":["post-19317","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-4chan","tag-a-week-in-security","tag-apple-passkeys","tag-asyncrat","tag-bq-fathers-day-contest-2022","tag-blackbasta","tag-blog-recap","tag-cloud-data-breach","tag-decryption-tool","tag-dridex","tag-emotet","tag-esxi","tag-facebook","tag-fbi","tag-federal-bureau-of-investigations","tag-linux","tag-linux-malware","tag-makemoney","tag-malvertising","tag-meeting-owl","tag-microsoft","tag-phishing","tag-prometheus","tag-prometheus-ransomware","tag-ransomware","tag-ransomware-task-force","tag-ssndob","tag-trickbot","tag-ukraine","tag-virtual-machines","tag-vm","tag-whatsapp","tag-whiteboard-owl","tag-windows-autopatch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19317"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19317\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}