{"id":1869,"date":"2025-09-29T12:36:00","date_gmt":"2025-09-29T12:36:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=1869"},"modified":"2025-09-29T12:36:00","modified_gmt":"2025-09-29T12:36:00","slug":"%e2%9a%a1-weekly-recap-cisco-0-day-record-ddos-lockbit-5-0-bmc-bugs-shadowv2-botnet-more","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=1869","title":{"rendered":"\u26a1 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet &amp; More"},"content":{"rendered":"<p>Cybersecurity never stops\u2014and neither do hackers. While you wrapped up last week, new attacks were already underway.<br \/>\nFrom hidden software bugs to massive DDoS attacks and new ransomware tricks, this week\u2019s roundup gives you the biggest security moves to know. Whether you\u2019re protecting key systems or locking down cloud apps, these are the updates you need before making your next security<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity never stops\u2014and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden software bugs to massive DDoS attacks and new ransomware tricks, this&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1870,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-1869","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1869"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1869\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/1870"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}