{"id":2316,"date":"2025-11-03T12:56:00","date_gmt":"2025-11-03T12:56:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=2316"},"modified":"2025-11-03T12:56:00","modified_gmt":"2025-11-03T12:56:00","slug":"%e2%9a%a1-weekly-recap-lazarus-hits-web3-intel-amd-tees-cracked-dark-web-leak-tool-more","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2316","title":{"rendered":"\u26a1 Weekly Recap: Lazarus Hits Web3, Intel\/AMD TEEs Cracked, Dark Web Leak Tool &amp; More"},"content":{"rendered":"<p>Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems\u2014some just hours after being found. No system was fully safe.<br \/>\nFrom spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted backups and secure areas were put to the test.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems\u2014some just hours after being found.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2317,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2316","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2316"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}