{"id":4504,"date":"2023-03-01T12:24:29","date_gmt":"2023-03-01T12:24:29","guid":{"rendered":"\/cybersecurity-blog\/?p=4504"},"modified":"2023-04-06T09:10:53","modified_gmt":"2023-04-06T09:10:53","slug":"malware-news-digest-february-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/","title":{"rendered":"Cybersecurity News Digest: February 2023"},"content":{"rendered":"\n<p>Another month filled with intriguing cybersecurity incidents has come and gone, and we\u2019re ready to share the news with you.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reddit falls victim to a phishing attack<\/h2>\n\n\n\n<p>When someone as seasoned as an r\/Reddit moderator falls victim to phishing, it really sets into perspective how dangerous these attacks are. That&#8217;s exactly what <a href=\"https:\/\/www.reddit.com\/r\/reddit\/comments\/10y427y\/we_had_a_security_incident_heres_what_we_know\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">happened<\/a> this month, when an attacker directed Reddit employees to a website that imitated the company\u2019s intranet gateway, in an attempt to steal credentials and auth tokens.&nbsp;<\/p>\n\n\n\n<p>This led to a security breach that exposed some confidential information, but Reddit&#8217;s prompt investigation concluded that no user data had been leaked.<\/p>\n\n\n\n<p>Reddit was highly praised for how openly the platform has handled communication with its community, after the incident took place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A critical vulnerability exploited in the ZK framework<\/h2>\n\n\n\n<p>CISA <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warns<\/a> that hackers are actively exploiting a critical vulnerability in ZK, a popular open source web development framework written in Java.<\/p>\n\n\n\n<p>The vulnerability that is now tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-36537\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-36537<\/a>, was used in a recent attack to gain initial access to ConnectWise R1Soft Server Backup Manager software and plant a backdoor. Companies running ZK Framework versions 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 are currently at risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">KeePass denies having a vulnerability<\/h2>\n\n\n\n<p>The vulnerability which is now tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-24055\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-24055<\/a> was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/keepass-disputes-vulnerability-allowing-stealthy-password-theft\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">found<\/a> in an extremely popular open-source password manager KeePass. With the exploit, attackers who have write access to a system can edit the KeePass XML configuration and insert a malicious trigger that will export the whole database, including all usernames and passwords in plaintext.<\/p>\n\n\n\n<p>However, the development team behind KeePass doesn\u2019t agree, maintaining that this is only true as long as the program is run in an insecure environment, hence the vulnerability doesn\u2019t count.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New hacker group targets China with targeted attacks<\/h2>\n\n\n\n<p>Beijing-based security experts have uncovered a new hacking group \u2014 made up of members primarily from Europe and North America \u2014 that has been targeting Chinese online resources. The group, which is confusingly named Against The West (ATW), poses a serious risk to the country&#8217;s data security, experts <a href=\"https:\/\/www.globaltimes.cn\/page\/202302\/1285744.shtml\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">say<\/a>.<\/p>\n\n\n\n<p>According to a report obtained by the Global Times, the cyber gang has claimed to have leaked sensitive information such as source code and database of more than 100 information systems of important government agencies, aviation, and infrastructure departments over 70 times since 2021, and their activity has been intensifying thorough 2022.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Go Daddy admits a multi-year security breach<\/h2>\n\n\n\n<p>Go Daddy, a major web hosting company, <a href=\"https:\/\/aboutus.godaddy.net\/newsroom\/company-news\/news-details\/2023\/Statement-on-recent-website-redirect-issues\/default.aspx\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">revealed<\/a> a long-term security breach. The hackers were able to access the companye&#8217;s source code, as well as customer, and employee login information, which allowed them to abuse Go Daddy&#8217;s services by launching a series of watering hole attacks. This involves inserting malicious code into websites hosted by the provider.<\/p>\n\n\n\n<p>Apparently, this has been going on for some years, but folks at GoDaddy are finally on top of the breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Google Engineers promise to eradicate prototype pollution<\/h2>\n\n\n\n<p>Programmers at Google have created a plan to combat prototype pollution, a well-known vulnerability that affects web security. This language flaw in JavaScript permits attackers to modify objects they have no authority over in real-time. This issue happens when there is no distinction between objects and their blueprints.<\/p>\n\n\n\n<p>The solution was described at length on <a href=\"https:\/\/github.com\/tc39\/proposal-symbol-proto\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GitHub<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-text-color has-background\" style=\"color:#000000;background-color:#ffffff\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"alignwide has-text-align-center wp-block-heading\" id=\"schedule-a-visit\" style=\"font-size:30px;font-style:normal;font-weight:600;line-height:1.15;text-transform:uppercase\"><strong>Try ANY.RUN for Enterprises <\/strong><\/h3>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"schedule-a-visit\" style=\"font-size:15px;line-height:1.15;text-transform:lowercase\">Combat new threats together  \u2013 ANALYZE MALWARE IN A TEAM<\/h2>\n\n\n\n<div class=\"wp-block-buttons alignwide has-custom-font-size has-normal-font-size is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size is-style-fill has-normal-font-size\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest2&amp;utm_content=demo_button\" style=\"border-radius:45px;color:#ffffff;background-color:#00b0e8\" target=\"_blank\" rel=\"noreferrer noopener\">Get a demo<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">A vulnerability found in Cisco ClamAV&nbsp;<\/h2>\n\n\n\n<p>A potentially dangerous flaw in an anti-malware scanning product has been identified in Cisco\u2019s networking hardware. Specifically, a security flaw affecting the ClamAV scanning library (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-20032\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-20032<\/a>) has resulted in critical security risks for Cisco\u2019s Secure Web Appliance and multiple versions of the Cisco Secure Endpoint, including Windows, MacOS, Linux, and cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Toyota patches a critical backdoor<\/h2>\n\n\n\n<p>A <a href=\"https:\/\/www.securityweek.com\/vulnerability-provided-access-to-toyota-supplier-management-network\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">significant<\/a> vulnerability in the internet portal of Toyota\u2019s international vendor management system was uncovered by U.S.-based security researcher Eaton Zveare. This issue related to the implementation of JWT (JSON Web Token) verification and would permit anybody possessing a legitimate email address to enter into any account.<\/p>\n\n\n\n<p>The Global Supplier Preparation Information Management System (GSPIMS) is an online platform that offers Toyota personnel and providers access to existing jobs, polls, info on acquisitions, and more. The vulnerability has since been patched.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Meta fixes a 2FA bypass<\/h2>\n\n\n\n<p>Facebook&#8217;s parent company, Meta, has recently addressed a serious security vulnerability that could have allowed cyber attackers to bypass two-factor authentication (2FA) that relies on SMS-based verification. This flaw, which was <a href=\"https:\/\/medium.com\/pentesternepal\/two-factor-authentication-bypass-on-facebook-3f4ac3ea139c\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">discovered<\/a> by a security researcher named Manoj Gautam, could confirm a targeted user&#8217;s previously verified Facebook mobile number by exploiting a rate-limiting issue within Instagram.&nbsp;<\/p>\n\n\n\n<p>The vulnerability could have allowed cybercriminals to brute-force the verification pin required to confirm someone&#8217;s phone number, effectively bypassing the 2FA process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Belgium to become a safe-haven for ethical hackers<\/h2>\n\n\n\n<p>Belgium has <a href=\"https:\/\/ccb.belgium.be\/en\/news\/new-legal-framework-reporting-it-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">announced<\/a> the development of a legal framework to regulate ethical hacking, thus becoming the first European state to govern the work of independent penetration testers. Crucially, the new legislation clears up the circumstances that may or may not lead to law violation.<\/p>\n\n\n\n<p>The announcement emphasizes the significance of white-hat hacking and the duties of pen-testers, who attempt to get into online systems for educational or security purposes without a prearranged agreement with the target.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN\u2019s February updates<\/h2>\n\n\n\n<p>An in-depth XLoader analysis, ChatGPT shenanigans, where we tried to get it to be useful for blue teamers and failed, an announcement about our stand in GISEC 2023, and an interview with a security expert and educator J\u00e9zer Ferreira, where we discuss the state of security in Latin America, OSINT methods and much, much more:<\/p>\n\n\n\n<p>These are the February posts to read from ANY.RUN:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/xloader-formbook-encryption-analysis-and-malware-decryption\/\">https:\/\/any.run\/cybersecurity-blog\/xloader-formbook-encryption-analysis-and-malware-decryption\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/we-asked-chatgpt-to-analyze-malware\/\">https:\/\/any.run\/cybersecurity-blog\/we-asked-chatgpt-to-analyze-malware\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/visit-any-run-stand-at-gisec-2023\/\">https:\/\/any.run\/cybersecurity-blog\/visit-any-run-stand-at-gisec-2023\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-jezer-ferreira\/\">https:\/\/any.run\/cybersecurity-blog\/expert-qa-jezer-ferreira\/<\/a><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/blog-adm.susp.io\/cybersecurity-blog\/xloader-formbook-encryption-analysis-and-malware-decryption\/\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another month filled with intriguing cybersecurity incidents has come and gone, and we\u2019re ready to share the news with you. Reddit falls victim to a phishing attack When someone as seasoned as an r\/Reddit moderator falls victim to phishing, it really sets into perspective how dangerous these attacks are. That&#8217;s exactly what happened this month, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4513,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[10,15],"class_list":["post-4504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity News Digest: February 2023 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"New threats alert, malicious packages, blank image attacks &amp; Google Ads phishing scams \u2014 this month&#039;s review of the cybersecurity world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Zalesskiy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/\"},\"author\":{\"name\":\"Jack Zalesskiy\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Cybersecurity News Digest: February 2023\",\"datePublished\":\"2023-03-01T12:24:29+00:00\",\"dateModified\":\"2023-04-06T09:10:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/\"},\"wordCount\":976,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\",\"malware\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/\",\"name\":\"Cybersecurity News Digest: February 2023 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-03-01T12:24:29+00:00\",\"dateModified\":\"2023-04-06T09:10:53+00:00\",\"description\":\"New threats alert, malicious packages, blank image attacks & Google Ads phishing scams \u2014 this month's review of the cybersecurity world.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity News Digest: February 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Jack Zalesskiy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"caption\":\"Jack Zalesskiy\"},\"description\":\"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity News Digest: February 2023 - ANY.RUN&#039;s Cybersecurity Blog","description":"New threats alert, malicious packages, blank image attacks & Google Ads phishing scams \u2014 this month's review of the cybersecurity world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/","twitter_misc":{"Written by":"Jack Zalesskiy","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/"},"author":{"name":"Jack Zalesskiy","@id":"https:\/\/any.run\/"},"headline":"Cybersecurity News Digest: February 2023","datePublished":"2023-03-01T12:24:29+00:00","dateModified":"2023-04-06T09:10:53+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/"},"wordCount":976,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/","name":"Cybersecurity News Digest: February 2023 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-03-01T12:24:29+00:00","dateModified":"2023-04-06T09:10:53+00:00","description":"New threats alert, malicious packages, blank image attacks & Google Ads phishing scams \u2014 this month's review of the cybersecurity world.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-february-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity News Digest: February 2023"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Jack Zalesskiy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","caption":"Jack Zalesskiy"},"description":"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4504"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4504"}],"version-history":[{"count":7,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4504\/revisions"}],"predecessor-version":[{"id":4670,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4504\/revisions\/4670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4513"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}