{"id":10980,"date":"2024-07-02T13:37:16","date_gmt":"2024-07-02T11:37:16","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=10980"},"modified":"2024-07-10T10:46:54","modified_gmt":"2024-07-10T08:46:54","slug":"internet-assets","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/02\/internet-assets\/","title":{"rendered":"THREAT INTEL: Organizations need full visibility of Internet Assets, Digital Certs, Keys &#038; Servers."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10980\" class=\"elementor elementor-10980\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d88cf3e e-flex e-con-boxed e-con e-parent\" data-id=\"6d88cf3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45ef2216 elementor-widget elementor-widget-html\" data-id=\"45ef2216\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76be3180 e-con-full e-flex e-con e-parent\" data-id=\"76be3180\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ec57ff9 e-con-full e-flex e-con e-child\" data-id=\"ec57ff9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9257848 elementor-widget elementor-widget-image\" data-id=\"9257848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.flickr.com\/photos\/groovysoup\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-300x200.jpg\" class=\"attachment-medium size-medium wp-image-10984\" alt=\"standard-quality-control-collage-concept (2)\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: FreePik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-134ccff4 elementor-widget elementor-widget-html\" data-id=\"134ccff4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14af7e77 e-con-full e-flex e-con e-child\" data-id=\"14af7e77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-326caea9 elementor-widget elementor-widget-wp-widget-text\" data-id=\"326caea9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Tuesday 02 July\u00a0 2024 at 13:00 CET<\/p>\n<p><strong>THREAT INTEL: An organization needs full visibility of Internet Assets, Digital Certificates, Encrypted Keys, and Servers.<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=An+organization+needs+full+visibility+of+Internet+Assets%2C+Digital+Certificates%2C+Encrypted+Keys%2C+and+Servers.&amp;sca_esv=0835a04e1987451a&amp;sca_upv=1&amp;sxsrf=ADLYWIKGd852rP1nBdPENcih70dISIwvsQ%3A1719995802645&amp;ei=mg2FZrmIJ8HPi-gPjqaS8Ak&amp;ved=0ahUKEwi5vdPWu4qHAxXB5wIHHQ6TBJ4Q4dUDCA8&amp;uact=5&amp;oq=An+organization+needs+full+visibility+of+Internet+Assets%2C+Digital+Certificates%2C+Encrypted+Keys%2C+and+Servers.&amp;gs_lp=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&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 020724 at 13:20 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>With 4 months before further chaos rains down across the Digital World and Internet, the attached anonymised report demonstrates the unrivalled discovery and efficacy of Whitethorn and Whitethorn Shield.<\/p>\n<p>An organization needs full visibility, <strong>Whitethorn<\/strong> and <strong>Whitethorn Shield<\/strong> provide unrivalled visibility of Internet Assets, Digital Certificates, Encrypted Keys, and Servers.<\/p>\n<p>Testimony to this statement:<\/p>\n<p>1) The attached comprehensive report for a UK based Nuclear Provider where we identified previously unknown Chinese and Russian Root Certificates.<\/p>\n<p>2) Our discovery of a Korean server inside the DNS of <strong><a class=\"app-aware-link \" href=\"http:\/\/vote.gov\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Vote.gov<\/a> <\/strong>when we assisted the <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><\/strong> in the lead up to the 2020 Presidential Election.<\/p>\n<p>3) On January 11, 2023, when we showed the <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/faa\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Federal Aviation Administration<\/a><\/strong> they did not have Control of their NOTAM&#8217;s servers resulting in the closure of the entire U.S. air space.<\/p>\n<p>Public Key Infrastructure (<strong>PKI<\/strong>) and Domain Name System (<strong>DNS<\/strong>) are CRITICAL to security and have for decades been dangerously overlooked and ignored.<\/p>\n<p>Whilst the <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/google\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Google<\/a> <\/strong>and <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a><\/strong> issue has come to a head and <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/entrust\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Entrust<\/a> <\/strong>Digital Certs WILL NO LONGER be Trusted from the 31 October 2024, we truly hope this action by <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/google\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Google<\/a><\/strong> acts as a catalyst for this critical area to be placed firmly at the top of the URGENT SECURITY TO DO LIST.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-341f9761 elementor-widget elementor-widget-image\" data-id=\"341f9761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"500\" height=\"184\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/whitethorn.jpg\" class=\"attachment-large size-large wp-image-10983\" alt=\"whitethorn\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/whitethorn.jpg 500w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/whitethorn-300x110.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c9f292f elementor-widget elementor-widget-wp-widget-text\" data-id=\"2c9f292f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>To conclude, one may believe they have the very best security in the world, one may be air gapped, one may spend a $billion on Security however, if one DOES NOT manage and control one&#8217;s <strong>DNS<\/strong> and <strong>PKI<\/strong>, all that spend and security may be in vain and worthless.<\/p>\n<p><strong>Stuxnet<\/strong> and <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a><\/strong> are just two cases among many thousands of examples that exploit Not Secure Domains, Servers, <strong>DNS<\/strong> and <strong>PKI<\/strong> every year.<\/p>\n<p><a class=\"app-aware-link \" href=\"mailto:andrew.jenkinson@cybersecip.com\" target=\"_self\" data-test-app-aware-link=\"\">andrew.jenkinson@cybersecip.com<\/a> We are pleased to assist.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbi\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Federal Bureau of Investigation (FBI)<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/uksfo\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Serious Fraud Office (UK)<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Information Commissioner&#8217;s Office<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/digicert-inc-\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">DigiCert<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/venafi\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Venafi<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/globalsign\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GlobalSign<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/sectigo\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Sectigo<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/wearekeyfactor\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Keyfactor<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/jisc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Jisc<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/nhs\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">NHS<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213530686090002432&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BQDxmoO6PRfacjdlQKyh9xA%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213530686090002432\" target=\"_blank\" rel=\"noopener\">InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213530686090002432\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7213530686090002432\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a332f19 e-con-full e-flex e-con e-child\" data-id=\"a332f19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa70377 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3aa70377\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cybersecip.com\/whitethorn\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34ae4cc elementor-widget elementor-widget-wp-widget-text\" data-id=\"34ae4cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25c41f22 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"25c41f22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15aa530b e-flex e-con-boxed e-con e-parent\" data-id=\"15aa530b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: FreePik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":10989,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[505],"class_list":["post-10980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/standard-quality-control-collage-concept-2-2.jpg",500,334,false]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/10980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=10980"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/10980\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/10989"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=10980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=10980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=10980"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=10980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}