{"id":10930,"date":"2024-07-01T11:30:01","date_gmt":"2024-07-01T09:30:01","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=10930"},"modified":"2024-07-10T10:45:08","modified_gmt":"2024-07-10T08:45:08","slug":"digital-certificates","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/01\/digital-certificates\/","title":{"rendered":"THREAT INTEL: Replace All Internet Assets\u2019 Digital Certificates before the asset becomes NOT SECURE"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10930\" class=\"elementor elementor-10930\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e5137b4 e-flex e-con-boxed e-con e-parent\" data-id=\"1e5137b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-309ede0f elementor-widget elementor-widget-html\" data-id=\"309ede0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e9beab5 e-con-full e-flex e-con e-parent\" data-id=\"6e9beab5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7de61f8 e-con-full e-flex e-con e-child\" data-id=\"7de61f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cfd968e elementor-widget elementor-widget-image\" data-id=\"7cfd968e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.flickr.com\/photos\/groovysoup\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory-300x200.jpg\" class=\"attachment-medium size-medium wp-image-10947\" alt=\"technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: usertrmk\/FreePikk<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a6d9ddd elementor-widget elementor-widget-html\" data-id=\"6a6d9ddd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3208ac26 e-con-full e-flex e-con e-child\" data-id=\"3208ac26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b8a5ff1 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4b8a5ff1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Monday 01 July\u00a0 2024 at 11:50 CET<\/p>\n<p><strong>THREAT INTEL: Replace All Internet Facing Assets&#8217; Digital Certificates Before The Asset Becomes NOT SECURE&#8230;<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Replace+All+Internet+Facing+Assets%E2%80%99+Digital+Certificates+Before+The+Asset+Becomes+NOT+SECURE&amp;sca_esv=a5295d27d6bcdf79&amp;sca_upv=1&amp;sxsrf=ADLYWIJXaRZO5lmFvnP0SXX2zAoZ8TBOCg%3A1719909147304&amp;ei=G7uDZsGaEqzqi-gP8LDuiQY&amp;ved=0ahUKEwiBlJXu-IeHAxUs9QIHHXCYO2EQ4dUDCA8&amp;uact=5&amp;oq=Replace+All+Internet+Facing+Assets%E2%80%99+Digital+Certificates+Before+The+Asset+Becomes+NOT+SECURE&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiXlJlcGxhY2UgQWxsIEludGVybmV0IEZhY2luZyBBc3NldHPigJkgRGlnaXRhbCBDZXJ0aWZpY2F0ZXMgQmVmb3JlIFRoZSBBc3NldCBCZWNvbWVzIE5PVCBTRUNVUkUyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyDRAuGNEDGMcBGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gJIrgxQAFj2BHABeAGQAQCYAQCgAQCqAQC4AQPIAQD4AQH4AQKYAgGgAhGoAgqYAxGSBwExoAcA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 010724 at 12:20 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><strong>BREAKING NEWS:<\/strong><\/p>\n<p><strong>From Tomorrow, You Have Exactly 4 Months To Discover and Replace All Internet Facing Assets&#8217; Digital Certificates Before The Asset Becomes NOT SECURE&#8230;<\/strong><\/p>\n<p>&#8221;From November 1, 2024 <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/google\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Google<\/a><\/strong> the world\u2019s most-used web browser will no longer trust digital certificates issued by <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a>,<\/strong> one of the world\u2019s most-used certificate authorities. How widespread are Entrust digital security certificates? Customers include <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/jpmorganchase\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">JPMorganChase<\/a>, <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/delltechnologies\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Dell Technologies<\/a>, <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/ernstandyoung\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">EY<\/a>, <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/mastercard\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Mastercard<\/a><\/strong> and <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/merrilllynch\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Merrill Lynch<\/strong><\/a>, not to mention numerous governments worldwide.&#8221;<\/p>\n<p>This poses three significant challenges:<\/p>\n<p>1) Most Organizations <strong>DO NOT<\/strong> have a full inventory of their Internet Assets<br \/>\n2) Most Organizations <strong>DO NOT<\/strong> have a full inventory of their Digital Certs<br \/>\n3) Most Organizations <strong>DO NOT<\/strong> have the full capability to do either&#8230;<\/p>\n<p>Whitethorn and Whitethorn Shield from <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><\/strong> I hear you say&#8230;<\/p>\n<p><strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><\/strong> are uniquely placed to discover ALL <strong>Internet Assets<\/strong> and ALL <strong>Digital Certificate<\/strong>s as we have previously for the FBI, Governments, FAA, Central Banks, Trident Submarine Program, and many more.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-437b2453 elementor-widget elementor-widget-image\" data-id=\"437b2453\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"489\" height=\"304\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724.jpg\" class=\"attachment-large size-large wp-image-10934\" alt=\"AJ_010724\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724.jpg 489w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724-300x187.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724-400x250.jpg 400w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12feb233 elementor-widget elementor-widget-wp-widget-text\" data-id=\"12feb233\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>We are currently assisting the <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/secgov\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">U.S. Securities and Exchange Commission<\/a> <\/strong>and the <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Information Commissioner&#8217;s Office<\/strong><\/a> with two huge cases. In both, the organization fell foul of control and management of their critical <strong>Internet Assets<\/strong>, <strong>PKI<\/strong>, and <strong>DNS<\/strong> and suffered major cyberattacks by enabling sub domain takeover and <strong>DNS<\/strong> attacks.<\/p>\n<p>We have previously discovered Russian and Chinese Root Certificates in Critical Infrastructure, and Chinese Root Certificates with full admin access and 1000 year validity. We have also discovered Bogus Servers and Servers that have lost Command Control (C2) which grounded the entire U.S. air space on 11 January 2023.<\/p>\n<p><strong>CLM<\/strong> organizations <strong>DO NOT<\/strong> Discover. <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Cybersec Innovation Partners<\/strong><\/a> <strong>DO<\/strong>&#8230;<\/p>\n<p>On the 1 November 2024 there will be massive numbers of Internet Assets that become Not Secure by default. Please make sure they are <strong>NOT<\/strong> yours.<\/p>\n<p>@<a class=\"app-aware-link \" href=\"mailto:andrew.jenkinson@cybersecip.com\" target=\"_self\" data-test-app-aware-link=\"\">andrew.jenkinson@cybersecip.com<\/a><\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/jisc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Jisc<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/foxnews24x7.com\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FoxNews24X7.com<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213255301712486403&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BOQc0pillR6uPGSTj65r%2Fng%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213255301712486403\" target=\"_blank\" rel=\"noopener\">InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213255301712486403\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213255301712486403\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI\u00a0<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78fd50ac e-con-full e-flex e-con e-child\" data-id=\"78fd50ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15a00e51 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"15a00e51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-355cffe3 elementor-widget elementor-widget-wp-widget-text\" data-id=\"355cffe3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a40600f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a40600f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56391ea6 e-flex e-con-boxed e-con e-parent\" data-id=\"56391ea6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: usertrmk\/FreePikk Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":10947,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[505],"class_list":["post-10930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/technologist-with-grey-tablet-his-hands-make-set-up-production-line-while-standing-department-dairy-factory.jpg",500,333,false]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/10930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=10930"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/10930\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/10947"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=10930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=10930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=10930"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=10930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}