{"id":3191,"date":"2026-02-09T12:59:00","date_gmt":"2026-02-09T12:59:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=3191"},"modified":"2026-02-09T12:59:00","modified_gmt":"2026-02-09T12:59:00","slug":"%e2%9a%a1-weekly-recap-ai-skill-malware-31tbps-ddos-notepad-hack-llm-backdoors-and-more","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=3191","title":{"rendered":"\u26a1 Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More"},"content":{"rendered":"<p>Cyber threats are no longer coming from just malware or exploits. They\u2019re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, developer tools, and communication systems, attackers are following those same paths.<br \/>\nA clear pattern this week: attackers are abusing trust. Trusted updates, trusted marketplaces, trusted apps, even<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber threats are no longer coming from just malware or exploits. They\u2019re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3192,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-3191","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3191"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3191\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/3192"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}