{"id":94421,"date":"2019-08-04T08:22:55","date_gmt":"2019-08-04T15:22:55","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/08\/warning-as-new-malware-bypasses-network-security-measures-to-enable-attacks-on-pcs"},"modified":"2019-08-04T08:22:55","modified_gmt":"2019-08-04T15:22:55","slug":"warning-as-new-malware-bypasses-network-security-measures-to-enable-attacks-on-pcs","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/08\/warning-as-new-malware-bypasses-network-security-measures-to-enable-attacks-on-pcs","title":{"rendered":"Warning As New Malware Bypasses Network Security Measures To Enable Attacks On PCs"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/warning-as-new-malware-bypasses-network-security-measures-to-enable-attacks-on-pcs3.jpg\"><\/a><\/p>\n<p>Another dire warning for Windows users this week, after threat researchers at Proofpoint <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/systembc-christmas-july-socks5-malware-and-exploit-kits\" target=\"_blank\" rel=\"nofollow noopener\" data-ga-track=\"ExternalLink: https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/systembc-christmas-july-socks5-malware-and-exploit-kits\">disclosed<\/a>\u201d a previously undocumented malware.\u201d This one had a twist, though, this malware was not an attack in itself, it was an enabler, hiding on infected computers, establishing a proxy that other malware can then use to manage traffic to the PC and carry out their threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another dire warning for Windows users this week, after threat researchers at Proofpoint disclosed\u201d a previously undocumented malware.\u201d This one had a twist, though, this malware was not an attack in itself, it was an enabler, hiding on infected computers, establishing a proxy that other malware can then use to manage traffic to the PC [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-94421","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/94421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=94421"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/94421\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=94421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=94421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=94421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}