{"id":2658,"date":"2025-12-01T12:47:00","date_gmt":"2025-12-01T12:47:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=2658"},"modified":"2025-12-01T12:47:00","modified_gmt":"2025-12-01T12:47:00","slug":"%e2%9a%a1-weekly-recap-hot-cves-npm-worm-returns-firefox-rce-m365-email-raid-more","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2658","title":{"rendered":"\u26a1 Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid &amp; More"},"content":{"rendered":"<p>Hackers aren\u2019t kicking down the door anymore. They just use the same tools we use every day \u2014 code packages, cloud accounts, email, chat, phones, and \u201ctrusted\u201d partners \u2014 and turn them against us.<br \/>\nOne bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link on a phone, one bug in a common tool, and suddenly your mail, chats, repos, and<\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers aren\u2019t kicking down the door anymore. They just use the same tools we use every day \u2014 code packages, cloud accounts, email, chat, phones, and \u201ctrusted\u201d partners \u2014 and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2659,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2658","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2658"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2658\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2659"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}