{"id":567,"date":"2017-05-16T03:27:20","date_gmt":"2017-05-16T03:27:20","guid":{"rendered":"http:\/\/192.168.7.74\/infosystem\/?p=567"},"modified":"2018-12-03T03:32:10","modified_gmt":"2018-12-03T03:32:10","slug":"shadow-brokers-who-leaked-wannacry-smb-exploit-are-back-with-more-0-day","status":"publish","type":"post","link":"https:\/\/infosystem.id\/index.php\/2017\/05\/16\/shadow-brokers-who-leaked-wannacry-smb-exploit-are-back-with-more-0-day\/","title":{"rendered":"Shadow Brokers, Who Leaked WannaCry SMB Exploit, Are Back With More 0-Day"},"content":{"rendered":"<blockquote><p><span style=\"font-size: 12pt;\">The infamous hacking collective Shadow Brokers \u2013 the one who leaked the Windows SMB exploit in public that led to last weekend\u2019s WannaCrypt menace \u2013 are back, this time, to cause more damage. In typically broken English, the Shadow Brokers published a fresh statement (with full of frustration) a few hours ago, promising to release more zero-day bugs and exploits for various desktop and mobile<\/span><\/p><\/blockquote>\n<p><span style=\"font-size: 12pt;\">Source:\u00a0<em><a href=\"http:\/\/thehackernews.com\/2017\/05\/shodow-brokers-wannacry-hacking.html\">Shadow Brokers, Who Leaked WannaCry SMB Exploit, Are Back With More 0-Days<\/a><\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The infamous hacking collective Shadow Brokers \u2013 the one who leaked the Windows SMB exploit in public that led to last weekend\u2019s WannaCrypt menace \u2013 are back, this time, to cause more damage. In typically broken English, the Shadow Brokers published a fresh statement (with full of frustration) a few hours ago, promising to release&hellip;<\/p>\n","protected":false},"author":1,"featured_media":568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/comments?post=567"}],"version-history":[{"count":1,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/567\/revisions"}],"predecessor-version":[{"id":569,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/posts\/567\/revisions\/569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media\/568"}],"wp:attachment":[{"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/media?parent=567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/categories?post=567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosystem.id\/index.php\/wp-json\/wp\/v2\/tags?post=567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}