{"id":2229,"date":"2025-10-27T12:51:00","date_gmt":"2025-10-27T12:51:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=2229"},"modified":"2025-10-27T12:51:00","modified_gmt":"2025-10-27T12:51:00","slug":"%e2%9a%a1-weekly-recap-wsus-exploited-lockbit-5-0-returns-telegram-backdoor-f5-breach-widens","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2229","title":{"rendered":"\u26a1 Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens"},"content":{"rendered":"<p>Security, trust, and stability \u2014 once the pillars of our digital world \u2014 are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep finding new ways to exploit both system flaws and human behavior.<br \/>\nEach new breach proves a harsh truth: in cybersecurity, feeling safe can be far more dangerous than being alert.<br \/>\nHere\u2019s how that false sense of security<\/p>","protected":false},"excerpt":{"rendered":"<p>Security, trust, and stability \u2014 once the pillars of our digital world \u2014 are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2230,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2229","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2229"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2229\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2230"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}