{"id":10938,"date":"2024-07-02T11:00:44","date_gmt":"2024-07-02T09:00:44","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=10938"},"modified":"2024-07-03T10:35:29","modified_gmt":"2024-07-03T08:35:29","slug":"entrust-digital-certificates","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/02\/entrust-digital-certificates\/","title":{"rendered":"THREAT INTEL: Replace Entrust Digital Certificates Now, before they become Untrusted on 1 Nov 2024."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10938\" class=\"elementor elementor-10938\">\n\t\t\t\t<div class=\"elementor-element elementor-element-443e9845 e-flex e-con-boxed e-con e-parent\" data-id=\"443e9845\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65f28c41 elementor-widget elementor-widget-html\" data-id=\"65f28c41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74204bc4 e-con-full e-flex e-con e-parent\" data-id=\"74204bc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6aee1f80 e-con-full e-flex e-con e-child\" data-id=\"6aee1f80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-208c9c7 elementor-widget elementor-widget-image\" data-id=\"208c9c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.flickr.com\/photos\/groovysoup\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1-300x200.jpg\" class=\"attachment-medium size-medium wp-image-10942\" alt=\"standard-quality-control-collage (1)\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: FreePik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6175c643 elementor-widget elementor-widget-html\" data-id=\"6175c643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75bb5daa e-con-full e-flex e-con e-child\" data-id=\"75bb5daa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf1ddcd elementor-widget elementor-widget-wp-widget-text\" data-id=\"5cf1ddcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Tuesday 02 July 2024 at 11:50 CET<\/p>\n<p><strong>THREAT INTEL: Replace Entrust Digital Certificates Now, before they become Untrusted on 1 Nov 2024.<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Replace+Entrust+Digital+Certificates+Now%2C+before+they+become+Untrusted+on+1+Nov+2024.&amp;sca_esv=0835a04e1987451a&amp;sca_upv=1&amp;sxsrf=ADLYWIKqJ1pdxe8nbi9LsF7pXc6GDKa30Q%3A1719995432517&amp;ei=KAyFZsOeH6-8xc8PyP2xkAs&amp;ved=0ahUKEwjD0pSmuoqHAxUvXvEDHch-DLIQ4dUDCA8&amp;uact=5&amp;oq=Replace+Entrust+Digital+Certificates+Now%2C+before+they+become+Untrusted+on+1+Nov+2024.&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiVVJlcGxhY2UgRW50cnVzdCBEaWdpdGFsIENlcnRpZmljYXRlcyBOb3csIGJlZm9yZSB0aGV5IGJlY29tZSBVbnRydXN0ZWQgb24gMSBOb3YgMjAyNC4yBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gJIrA1QAFi4BXABeACQAQCYAQCgAQCqAQC4AQPIAQD4AQH4AQKYAgGgAhOoAgqYAxKSBwExoAcA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 020724 at 12:20 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \" data-artdeco-is-focused=\"true\">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><strong>The Countdown is on<\/strong>: There are 123 Days to identify and replace <strong><a href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_blank\" rel=\"noopener\">Entrust<\/a> Digital Certificates<\/strong> before they become Untrusted on 1 Nov 2024.<\/p>\n<p>The task, in order or importance:<\/p>\n<p>1) Identify ALL Internet Facing Assets using <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a><\/strong> Certs<br \/>\n2) Replace ALL <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a><\/strong> Certs by 1 November 2024<\/p>\n<p>Sounds easy doesn&#8217;t it. The challenge however is vast. The majority of companies <strong>DO NOT<\/strong> have a full inventory of their Internet Assets mainly due to the &#8216;<strong>Digital Gold Rush<\/strong>&#8216; over the last 15 -20 years.<\/p>\n<p>Hundreds, even Thousands of subdomains are literally strewn all over the place used by criminals to gain unlawful Access into a Network. That&#8217;s before we start thinking configuration, redirection, and of course <strong>DNS<\/strong>&#8230; Servers using <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Entrust<\/strong><\/a> Certs will also be effected.<\/p>\n<p>Sadly, we are not able to help everyone, however, Whitethorn and Whitethorn Shield can identify ALL Internet Assets and Identify the Digital Certificate issuer whether it be <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/digicert-inc-\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">DigiCert<\/a>,<\/strong> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/globalsign\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>GlobalSign<\/strong><\/a>, or any other, including <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a><\/strong>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"update-components-image update-components-image--single-image update-components-mini-update-v2__reshared-content update-components-mini-update-v2__reshared-content--with-divider \">\n<div class=\"relative\">\n<div class=\"update-components-image__container\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53497cd7 elementor-widget elementor-widget-image\" data-id=\"53497cd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"306\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724_2.jpg\" class=\"attachment-large size-large wp-image-10941\" alt=\"AJ_010724_2\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724_2.jpg 786w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724_2-300x144.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_010724_2-768x367.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135d17f0 elementor-widget elementor-widget-wp-widget-text\" data-id=\"135d17f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><span class=\"break-words\n      tvm-parent-container\"><span dir=\"ltr\"><br \/>\nOnce identified, the appropriate certs can be replaced with certs from a Trusted provider. Panic over&#8230;<\/p>\n<p>As I say, the scale of the problem is pretty vast and unfortunately the only way we could ever hope to identify ALL <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Entrust<\/strong><\/a> Certs in the wild is if <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a><\/strong> themselves were to offer this as a service from us. That is unlikely to happen so in the meantime, please start forming an orderly que.<\/p>\n<p><a class=\"app-aware-link \" href=\"mailto:andrew.jenkinson@cybersecip.com\" target=\"_self\" data-test-app-aware-link=\"\">andrew.jenkinson@cybersecip.com<\/a><\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Information Commissioner&#8217;s Office<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/secgov\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">U.S. Securities and Exchange Commission<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/icann\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ICANN<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/ietf\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">IETF<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/itv-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ITV News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/abcnews\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ABC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213421750284382209\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\"><span class=\"visually-hidden\">hashtag<\/span><span aria-hidden=\"true\">#<\/span>InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213421750284382209\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213421750284382209\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a><\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b4c3534 e-con-full e-flex e-con e-child\" data-id=\"7b4c3534\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-768064d8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"768064d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58431056 elementor-widget elementor-widget-wp-widget-text\" data-id=\"58431056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fe0820e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2fe0820e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ace0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"2ace0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: FreePik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":10942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[505],"class_list":["post-10938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-1.jpg",400,267,false]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/10938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=10938"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/10938\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/10942"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=10938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=10938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=10938"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=10938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}