{"id":2893,"date":"2026-01-01T15:52:00","date_gmt":"2026-01-01T15:52:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=2893"},"modified":"2026-01-01T15:52:00","modified_gmt":"2026-01-01T15:52:00","slug":"threatsday-bulletin-ghostad-drain-macos-attacks-proxy-botnets-cloud-exploits-and-12-stories","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2893","title":{"rendered":"ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories"},"content":{"rendered":"<p>The first ThreatsDay Bulletin of 2026 lands on a day that already feels symbolic \u2014 new year, new breaches, new tricks. If the past twelve months taught defenders anything, it\u2019s that threat actors don\u2019t pause for holidays or resolutions. They just evolve faster. This week\u2019s round-up shows how subtle shifts in behavior, from code tweaks to job scams, are rewriting what \u201ccybercrime\u201d looks like in<\/p>","protected":false},"excerpt":{"rendered":"<p>The first ThreatsDay Bulletin of 2026 lands on a day that already feels symbolic \u2014 new year, new breaches, new tricks. If the past twelve months taught defenders anything, it\u2019s&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2894,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2893","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2893"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2894"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}