{"id":2488,"date":"2025-11-17T12:34:00","date_gmt":"2025-11-17T12:34:00","guid":{"rendered":"http:\/\/infosec-daily.com\/?page_id=2488"},"modified":"2025-11-17T12:34:00","modified_gmt":"2025-11-17T12:34:00","slug":"%e2%9a%a1-weekly-recap-fortinet-exploited-chinas-ai-hacks-phaas-empire-falls-more","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2488","title":{"rendered":"\u26a1 Weekly Recap: Fortinet Exploited, China&#8217;s AI Hacks, PhaaS Empire Falls &amp; More"},"content":{"rendered":"<p>This week showed just how fast things can go wrong when no one\u2019s watching. Some attacks were silent and sneaky. Others used tools we trust every day \u2014 like AI, VPNs, or app stores \u2014 to cause damage without setting off alarms.<br \/>\nIt\u2019s not just about hacking anymore. Criminals are building systems to make money, spy, or spread malware like it\u2019s a business. And in some cases, they\u2019re using the same<\/p>","protected":false},"excerpt":{"rendered":"<p>This week showed just how fast things can go wrong when no one\u2019s watching. Some attacks were silent and sneaky. Others used tools we trust every day \u2014 like AI,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2489,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2488","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2488"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2489"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}