{"id":4439,"date":"2021-08-30T08:07:00","date_gmt":"2021-08-30T06:07:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4439"},"modified":"2023-12-07T14:24:24","modified_gmt":"2023-12-07T13:24:24","slug":"vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/","title":{"rendered":"VMware vRealize Operations patched \/ Malicious WhatsApp \/ MS Power App data leak"},"content":{"rendered":"\n<p>Welcome to&nbsp;<a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Center<\/a>&nbsp;\u2013 our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks \u2013 precisely selected by our editors.<\/p>\n\n\n\n<p>Don\u2019t miss it out!&nbsp;<a href=\"https:\/\/xopero.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up now<\/a>&nbsp;and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.<\/p>\n\n\n\n<p>In the meantime, let\u2019s check what happened in the cyber-world last week.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"vmware-patches-highseverity-vulnerabilities-in-vrealize-operations\">VMware patches high-severity vulnerabilities in vRealize Operations<\/h2>\n\n\n<p>VMware patched a series of vulnerabilities in vRealize Operations. The most severe &#8211; CVE-2021-22025, CVSS score of 8.6 &#8211; is described as a broken access control vulnerability in the vRealize Operations Manager API. An attacker who has network access to the vRealize Operations Manager API could exploit the vulnerability to add new nodes to an existing vROps cluster. The company also addressed an arbitrary log-file read vulnerability in the vRealize Operations Manager API (CVE-2021-22024, CVSS score of 7.5) and two server-side request forgery (SSRF) vulnerabilities (CVE-2021-22026 and CVE-2021-22027, CVSS score of 7.5). The vendor encourages customers to install all updates as soon as possible, to ensure they remain protected.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.securityweek.com\/vmware-patches-high-severity-vulnerabilities-vrealize-operations\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Read more<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/newsletter\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2021\/08\/sign-up-en.png\" alt=\"\" class=\"wp-image-4421\" width=\"541\" height=\"230\"\/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-spills-38-million-sensitive-data-records-via-careless-power-app-configs\">Microsoft spills 38 million sensitive data records via careless Power App configs<\/h2>\n\n\n<p>For months, Microsoft\u2019s Power Apps management portal had inadvertently leaked the data of 47 businesses totaling the exposure of 38 million personal records. Leaked data sets contain COVID-19 vaccination statuses, Social Security numbers, and email addresses. Consumers most affected are those doing business with American Airlines, Ford, the Indiana Department of Health, and New York City public schools. MS Power Apps is a tool mostly used by developers to build applications that share data locally or with the cloud. Hence, Microsoft does not consider the leaky data issue a vulnerability, rather a configuration issue. Case closed? Not for long. The company released a tool for checking Power Apps portals for leaky data. Microsoft also plans to change the product so that table permissions will be enforced by default. Much better&#8230;<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/microsoft-38-million-sensitive-records-power-app\/168885\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"malicious-whatsapp-version-infects-android-devices-with-malware\"><strong>Malicious WhatsApp version infects Android devices with malware<\/strong><\/h2>\n\n\n<p>A malicious version of the FMWhatsApp mod delivers a Triada trojan payload, a nasty surprise that infects devices with up to six additional malware applications, including the very hard-to-remove <a href=\"https:\/\/xopero.com\/blog\/en\/xopero-security-center-the-secret-behind-xhelper-has-been-revealed\/\">xHelper<\/a> trojan. The payload could be used to conduct a wide range of malicious activities, including downloading additional modules, stealthily subscribing the victims to premium services, and signing into WhatsApp accounts on the device. The attackers can also take control of the WhatsApp accounts and spread spam sent on behalf of the victims. Affected is version 16.80.0. The app, only available via unofficial third-party app stores, is one of many popular WhatsApp mods that allow users to add functionality to Facebook\u2019s WhatsApp messenger.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-whatsapp-mod-infects-android-devices-with-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"more-it-security-mustreads\">More IT security must-reads<\/h2>\n\n\n<ol class=\"wp-block-list\"><li>Ransomware gang&#8217;s script shows exactly the files they&#8217;re after (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gangs-script-shows-exactly-the-files-theyre-after\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Realtek SDK vulnerability exploitation attempts detected (CVE-2021-35395) (<a href=\"https:\/\/www.helpnetsecurity.com\/2021\/08\/24\/cve-2021-35395-exploitation\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Help Net Security<\/a>)<\/li><li>New zero-click iPhone exploit used to deploy NSO spyware (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/new-zero-click-iphone-exploit-used-to-deploy-nso-spyware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Researchers Uncover FIN8&#8217;s New Backdoor Targeting Financial Institutions (<a href=\"https:\/\/thehackernews.com\/2021\/08\/researchers-uncover-fin8s-new-backdoor.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>)<\/li><li>Microsoft Exchange servers being hacked by new LockFile ransomware (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-exchange-servers-being-hacked-by-new-lockfile-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Joker Virus is Back, Targeting Android Devices (<a href=\"https:\/\/www.ehackingnews.com\/2021\/08\/joker-virus-is-back-targeting-android.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">E Hacking News<\/a>)<\/li><li>Poly Network Recoups $610M Stolen from DeFi Platform (<a href=\"https:\/\/threatpost.com\/poly-network-recoups-610m-stolen-from-defi-platform\/168906\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<\/li><li>Ragnarok ransomware releases master decryptor after shutdown (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ragnarok-ransomware-releases-master-decryptor-after-shutdown\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Critical Flaw Discovered in Cisco APIC for Switches &#8211; Patch Released (<a href=\"https:\/\/thehackernews.com\/2021\/08\/critical-flaw-discovered-in-cisco-apic.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>)<\/li><li>Synology: Multiple products impacted by OpenSSL RCE vulnerability (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/synology-multiple-products-impacted-by-openssl-rce-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to&nbsp;Security Center&nbsp;\u2013 our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks \u2013 precisely selected by our editors. Don\u2019t miss it out!&nbsp;Sign up now&nbsp;and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure. In the meantime, let\u2019s check what happened in the cyber-world last week.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VMware vRealize Operations patched \/ Malicious WhatsApp...<\/title>\n<meta name=\"description\" content=\"Stay ahead in the tech world: Explore the latest VMware vRealize Operations patches for enhanced performance and security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware vRealize Operations patched \/ Malicious WhatsApp...\" \/>\n<meta property=\"og:description\" content=\"Stay ahead in the tech world: Explore the latest VMware vRealize Operations patches for enhanced performance and security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-30T06:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T13:24:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"VMware vRealize Operations patched \\\/ Malicious WhatsApp \\\/ MS Power App data leak\",\"datePublished\":\"2021-08-30T06:07:00+00:00\",\"dateModified\":\"2023-12-07T13:24:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/\"},\"wordCount\":604,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/\",\"name\":\"VMware vRealize Operations patched \\\/ Malicious WhatsApp...\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-08-30T06:07:00+00:00\",\"dateModified\":\"2023-12-07T13:24:24+00:00\",\"description\":\"Stay ahead in the tech world: Explore the latest VMware vRealize Operations patches for enhanced performance and security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VMware vRealize Operations patched \\\/ Malicious WhatsApp \\\/ MS Power App data leak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware vRealize Operations patched \/ Malicious WhatsApp...","description":"Stay ahead in the tech world: Explore the latest VMware vRealize Operations patches for enhanced performance and security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/","og_locale":"pl_PL","og_type":"article","og_title":"VMware vRealize Operations patched \/ Malicious WhatsApp...","og_description":"Stay ahead in the tech world: Explore the latest VMware vRealize Operations patches for enhanced performance and security.","og_url":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-08-30T06:07:00+00:00","article_modified_time":"2023-12-07T13:24:24+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"VMware vRealize Operations patched \/ Malicious WhatsApp \/ MS Power App data leak","datePublished":"2021-08-30T06:07:00+00:00","dateModified":"2023-12-07T13:24:24+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/"},"wordCount":604,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/","url":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/","name":"VMware vRealize Operations patched \/ Malicious WhatsApp...","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-08-30T06:07:00+00:00","dateModified":"2023-12-07T13:24:24+00:00","description":"Stay ahead in the tech world: Explore the latest VMware vRealize Operations patches for enhanced performance and security.","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/vmware-vrealize-operations-patched-malicious-whatsapp-ms-power-app-data-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"VMware vRealize Operations patched \/ Malicious WhatsApp \/ MS Power App data leak"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4439"}],"version-history":[{"count":2,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4439\/revisions"}],"predecessor-version":[{"id":5440,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4439\/revisions\/5440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}