{"id":11230,"date":"2024-07-08T13:43:20","date_gmt":"2024-07-08T11:43:20","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=11230"},"modified":"2024-11-21T14:11:28","modified_gmt":"2024-11-21T13:11:28","slug":"insecure-dns","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/08\/insecure-dns\/","title":{"rendered":"THREAT INTEL: SOLAR WINDS &#8211; Over 18,000 Clients exposed in the most invasive cyberattack in history"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11230\" class=\"elementor elementor-11230\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47e1ce5e e-flex e-con-boxed e-con e-parent\" data-id=\"47e1ce5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b831b14 elementor-widget elementor-widget-html\" data-id=\"5b831b14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-63a9cf3c e-con-full e-flex e-con e-parent\" data-id=\"63a9cf3c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-41648187 e-con-full e-flex e-con e-child\" data-id=\"41648187\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa602e elementor-widget elementor-widget-image\" data-id=\"3aa602e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.flickr.com\/photos\/groovysoup\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"225\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-300x225.jpg\" class=\"attachment-medium size-medium wp-image-11234\" alt=\"security-breach-hacker-cyber-crime-privacy-policy-concept\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-300x225.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-768x576.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept.jpg 786w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: rawpixel.com\/FreePik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f1e92de elementor-widget elementor-widget-html\" data-id=\"5f1e92de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-161ada22 e-con-full e-flex e-con e-child\" data-id=\"161ada22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ee6c600 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3ee6c600\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Monday 08 July\u00a0 2024 at 12:50 CET<\/p>\n<p><strong>THREAT INTEL: SOLAR WINDS: the most invasive cyberattack in history, impacting 18,000 clients, including critical U.S. government agencies<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=SOLAR+WINDS+%E2%80%93+the+most+invasive+cyberattack+in+history%2C+impacting+18%2C000+clients%2C+including+critical+U.S.+government+agencies&amp;sca_esv=ac280b94449c27e4&amp;sca_upv=1&amp;sxsrf=ADLYWIJmrlluxSTc7-f_QcbCtiB2vvUg3Q%3A1720518120874&amp;ei=6AWNZuSANY2rxc8PiZyeGA&amp;ved=0ahUKEwjklLK71ZmHAxWNVfEDHQmOBwMQ4dUDCA8&amp;uact=5&amp;oq=SOLAR+WINDS+%E2%80%93+the+most+invasive+cyberattack+in+history%2C+impacting+18%2C000+clients%2C+including+critical+U.S.+government+agencies&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAif1NPTEFSIFdJTkRTIOKAkyB0aGUgbW9zdCBpbnZhc2l2ZSBjeWJlcmF0dGFjayBpbiBoaXN0b3J5LCBpbXBhY3RpbmcgMTgsMDAwIGNsaWVudHMsIGluY2x1ZGluZyBjcml0aWNhbCBVLlMuIGdvdmVybm1lbnQgYWdlbmNpZXMyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gIyBxAjGCcY6gJI_w5QAFi1BXABeACQAQCYAQCgAQCqAQC4AQPIAQD4AQH4AQKYAgGgAieoAgqYAyeSBwExoAcA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 080724 at 13:20 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">In December 2020, the world witnessed one of the most invasive <strong>Cyberattacks<\/strong> in history, targeting <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a><\/strong> and impacting 18,000 clients, including critical U.S. government agencies.<\/span><\/span><\/p>\n<p>At the time we extensively researched this incident and provided crucial evidence to the Senate Intelligence Committee, we authored &#8220;Stuxnet to Sunburst: 20 Years of Digital Exploitation.&#8221;<\/p>\n<p>It was later confirmed, perfectly aligned to our research and findings, <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a> had been exploited by compromised Not Secure and Insecure subdomains and servers.<\/p>\n<p>Despite our ongoing efforts to assist <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a> and <a id=\"ember454\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/tim-brown-ciso\/\" target=\"_blank\" rel=\"noopener\"><strong>Tim Brown<\/strong><\/a> in addressing the identified security vulnerabilities, it is with profound disappointment that we report their continued exposure to <strong>Cyber Threats<\/strong>.<\/p>\n<p>Our recent investigation uncovered alarming evidence of <strong>NOT SECURE SolarWinds Orion subdomains and INSECURE DNS servers<\/strong>, illustrating a persistent negligence in <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a><\/strong> cybersecurity measures.<\/p>\n<p>The original exploitation of these weaknesses by malicious actors, who injected harmful code into the <strong>Orion<\/strong> software (<strong>Sunburst<\/strong>) which was subsequently trusted and downloaded automatically by users\u2014highlighted a severe oversight that remains unrectified.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54edb36d elementor-widget elementor-widget-image\" data-id=\"54edb36d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"285\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_080724-1024x456.jpg\" class=\"attachment-large size-large wp-image-11233\" alt=\"AJ_080724\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_080724-1024x456.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_080724-300x134.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_080724-768x342.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_080724-1536x685.jpg 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_080724.jpg 1759w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ffe76d4 elementor-widget elementor-widget-wp-widget-text\" data-id=\"7ffe76d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a>&#8216; failure to secure their digital infrastructure, even after the catastrophic breach and our repeated offers of assistance, is inexcusable.<\/p>\n<p>This negligence not only compromises their clients&#8217; sensitive data but also endangers national security. The persistent vulnerability of <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a><\/strong>&#8216; Assets underscores a critical need for immediate, robust security enhancements to prevent future incidents.<\/p>\n<p>As we prepare to present our findings at this weeks Forensic Science Guild, we publicly call upon <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SolarWinds<\/a> <\/strong>to take urgent action. The ongoing risks posed by their insecure systems demand accountability and immediate remediation.<\/p>\n<p>It is imperative that <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/solarwinds\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>SolarWinds<\/strong><\/a> acknowledges the gravity of their security lapses and implements comprehensive measures to safeguard against further <strong>Cyberattacks<\/strong>. The time for action is now, before another devastating breach occurs, or to halt the ongoing <strong>MiTM<\/strong> attacks in flight.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/secgov\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">U.S. Securities and Exchange Commission<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Information Commissioner&#8217;s Office<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-security-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Security Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-crime-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Crime Agency (NCA)<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/aucyberseccoord\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Cyber Security Coordinator<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/central-intelligence-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Central Intelligence Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/abcnews\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ABC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/itv-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ITV News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7215962435470401536&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BaTDoTDXkRgmm7%2BJUwNzOwQ%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7215962435470401536\" target=\"_blank\" rel=\"noopener\">InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7215962435470401536\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7215962435470401536\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f346377 e-con-full e-flex e-con e-child\" data-id=\"4f346377\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b6e5b91 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1b6e5b91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53e29e0f elementor-widget elementor-widget-wp-widget-text\" data-id=\"53e29e0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71e69b17 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71e69b17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-618cda5d e-flex e-con-boxed e-con e-parent\" data-id=\"618cda5d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: rawpixel.com\/FreePik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11234,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[415],"class_list":["post-11230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept.jpg",786,590,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-300x225.jpg",300,225,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-768x576.jpg",640,480,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept.jpg",640,480,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept.jpg",786,590,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept.jpg",786,590,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept.jpg",786,590,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/security-breach-hacker-cyber-crime-privacy-policy-concept-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=11230"}],"version-history":[{"count":1,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11230\/revisions"}],"predecessor-version":[{"id":15947,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11230\/revisions\/15947"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11234"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=11230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=11230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=11230"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=11230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}