{"id":2627,"date":"2025-11-27T10:03:00","date_gmt":"2025-11-27T10:03:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=2627"},"modified":"2025-11-27T10:03:00","modified_gmt":"2025-11-27T10:03:00","slug":"threatsday-bulletin-ai-malware-voice-bot-flaws-crypto-laundering-iot-attacks-and-20-more-stories","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2627","title":{"rendered":"ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks \u2014 and 20 More Stories"},"content":{"rendered":"<p>Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there\u2019s a lot happening in the cyber world.<br \/>\nCriminals are getting creative \u2014 using smart tricks to steal data, sound real, and hide in plain sight. But they\u2019re not the only ones moving fast. Governments and security teams are fighting back, shutting down fake<\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there\u2019s a lot happening in the cyber world. Criminals&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2628,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2627","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2627"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2627\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2628"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}