{"id":2175,"date":"2007-02-01T00:00:00","date_gmt":"2007-02-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/01\/dorf-storms-the-malware-charts\/"},"modified":"2021-12-30T11:40:49","modified_gmt":"2021-12-30T11:40:49","slug":"dorf-storms-the-malware-charts","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/01\/dorf-storms-the-malware-charts\/","title":{"rendered":"Dorf storms the malware charts"},"content":{"rendered":"<p>The latest malware monitoring data from Sophos said that Dorf has rampaged to the top of the monthly malware threat chart to account for almost 50 per cent of all malware seen during January.  Dorf was aggressively spammed out posing as breaking news of deaths caused by stormy European weather during January.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophos has seen more than 2,500 variants of the Dorf malware, almost a third of the new threats identified during January 2007.  The majority were intercepted by Sophos&#8217; proactive Behavioral Genotype Protection technology even before they were formally identified as belonging to the Dorf family of malware.<\/p>\n<p>http:\/\/www.vnunet.com\/vnunet\/news\/2173872\/dorf-storms-top-malware-charts<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2175","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2175"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2175\/revisions"}],"predecessor-version":[{"id":4662,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2175\/revisions\/4662"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}