{"id":11795,"date":"2024-07-17T11:50:42","date_gmt":"2024-07-17T09:50:42","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=11795"},"modified":"2024-11-21T14:10:41","modified_gmt":"2024-11-21T13:10:41","slug":"attribution-mitigation-and-liability","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/17\/attribution-mitigation-and-liability\/","title":{"rendered":"THREAT INTEL: Oversight in Global Cybersecurity &#038; Cybercrime: Attribution, Liability &#038; Mitigation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11795\" class=\"elementor elementor-11795\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57dfd9dd e-flex e-con-boxed e-con e-parent\" data-id=\"57dfd9dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8997bf elementor-widget elementor-widget-html\" data-id=\"c8997bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47a78d2f e-con-full e-flex e-con e-parent\" data-id=\"47a78d2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2110c53b e-con-full e-flex e-con e-child\" data-id=\"2110c53b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18404ec0 elementor-widget elementor-widget-image\" data-id=\"18404ec0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"197\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-300x197.jpg\" class=\"attachment-medium size-medium wp-image-11799\" alt=\"147683\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-300x197.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-768x503.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: rawpixel.com\/Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13a10fa9 elementor-widget elementor-widget-html\" data-id=\"13a10fa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65db0136 e-con-full e-flex e-con e-child\" data-id=\"65db0136\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71d3951b elementor-widget elementor-widget-wp-widget-text\" data-id=\"71d3951b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Wednesday 17 July\u00a0 2024 at 11:00 CET<br \/>\n<strong>Helping keep European SMEs CYBERSafe!<\/strong><\/p>\n<p><strong>THREAT INTEL: O<span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">versight in Global Cybersecurity and Cybercrime: Attribution, Liability, and Mitigation (AML).<\/span><\/span>\u00a0<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Oversight+in+Global+Cybersecurity+%26+Cybercrime%3A+Attribution%2C+Liability+%26+Mitigation+t+Assets.&amp;sca_esv=9ce04a1690bce6d9&amp;sca_upv=1&amp;sxsrf=ADLYWILUtjuzwnNBZeAfPzVokllWamV1aw%3A1721290254185&amp;ei=Ds6YZtX2CrOYkdUPjZ2_CA&amp;ved=0ahUKEwjVtZ_xkbCHAxUzTKQEHY3ODwEQ4dUDCA8&amp;uact=5&amp;oq=Oversight+in+Global+Cybersecurity+%26+Cybercrime%3A+Attribution%2C+Liability+%26+Mitigation+t+Assets.&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiXU92ZXJzaWdodCBpbiBHbG9iYWwgQ3liZXJzZWN1cml0eSAmIEN5YmVyY3JpbWU6IEF0dHJpYnV0aW9uLCBMaWFiaWxpdHkgJiBNaXRpZ2F0aW9uIHQgQXNzZXRzLjIGEAAYBxgeMgYQABgHGB4yBhAAGAcYHjIGEAAYBxgeMgwQLhjRAxgHGMcBGB4yBhAAGAcYHjIGEAAYBxgeMggQABgHGAoYHjIGEAAYBxgeMgYQABgHGB5IlRBQAFjtB3AAeACQAQCYAfYBoAH2AaoBAzItMbgBA8gBAPgBAfgBApgCAaACkwKYAwCSBwMyLTGgB64H&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 170724 at 12:15 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p><strong><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">From my presentation to the Financial Crime Forum, I discussed a critical issue and oversight in global Cybersecurity and Cybercrime: Attribution, Liability, and Mitigation (AML).<\/span><\/span><\/strong><\/p>\n<p>Unlike it&#8217;s more familiar namesake, <strong>Anti-Money Laundering, ALM<\/strong> in <strong>Cybersecurity<\/strong> looks at <strong>Attribution, Mitigation, and Liability<\/strong>. Money Laundering may also come into the mix.<\/p>\n<p>This situation is specifically illustrated through a recent harrowing case of a woman who lost her entire savings while purchasing a house and featured on Channel 5 TV. <strong>Cybercriminals<\/strong> intercepted email exchanges, altered bank details, and orchestrated a seamless scam, leading to a loss of \u00a3120,000.<\/p>\n<p>However, whilst the pain is being felt by all involved, none more so than the unfortunate victim, a chilling fact: the mail servers of the supplier, the victim, and even the bank are all compromised. The servers, maintained by a tech giant, harbour insecure and blacklisted IPv4 addresses. The Access and attack could have exploited any or all servers and parties.<\/p>\n<p>Consequently, the supplier lost a sale, the victim lost her life savings, and the bank now face legal challenges for merely executing a payment request.<\/p>\n<p>Surely, someone must be liable and someone is to blame? 3rd \ud83e\udd49 party cyber insurance <a id=\"ember995\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/gerry-kennedy-42368413\/\" target=\"_blank\" rel=\"noopener\">Gerry Kennedy<\/a>.<\/p>\n<p>This scenario underscores a pervasive issue: the profound lack of competence and understanding in security in the first place closely followed by those investigating such <strong>Cybercrimes<\/strong>, namely <strong>Attribution, Mitigation, and Liabilit<\/strong>y which are all too often obscured, leaving the true culprits unscathed.<\/p>\n<p>Instead, symptoms are addressed in a futile game of Digital Whack-a-Mole, with false attributions abounding. Legal outcomes become a game of chance, devoid of real knowledge or facts.<\/p>\n<p>This recurring scam highlights a dire need for greater understanding, knowledge, and change.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-576fcc13 elementor-widget elementor-widget-image\" data-id=\"576fcc13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"340\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_170724.jpg\" class=\"attachment-large size-large wp-image-11798\" alt=\"AJ_170724\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_170724.jpg 700w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_170724-300x159.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-458698c6 elementor-widget elementor-widget-wp-widget-text\" data-id=\"458698c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>The <strong>Cybersecurity<\/strong> industry and the legal sector must develop a deeper understanding of root causes rather than simply treating symptoms. Until we achieve this, costs and losses will continue to trickle down and through the economy with the real perpetrators of <strong>Cybercrime<\/strong> continuing to evade culpability and justice whilst leaving millions of victims in their wake.<\/p>\n<p>It\u2019s time for a paradigm shift. We must equip investigators with the knowledge and tools to trace <strong>Cybercrime<\/strong> back to their origin and attribute accordingly.<\/p>\n<p>Only then can we hold the true culprits accountable and protect future victims from similar fates. We must stop playing Digital Whack-a-Mole and start addressing the real issues at hand &#8211; INSECURE SERVERS.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-cyber-security-centre\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Cyber Security Centre<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbi\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Federal Bureau of Investigation (FBI)<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/central-intelligence-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Central Intelligence Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/us-department-of-homeland-security\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">U.S. Department of Homeland Security<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/washingtonpost\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">The Washington Post<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/the-new-york-times\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">The New York Times<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/itv-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ITV News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/channel-5\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Channel 5<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnn\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNN<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/abcnews\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ABC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fox-news-channel\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Fox News Media<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7218978484260327426&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BdkA4E5AfQiaa34ufHUCDZQ%3D%3D\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=internetsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7218978484260327426\" target=\"_blank\" rel=\"noopener\">InternetSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7218978484260327426\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7218978484260327426\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a>,<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-512ac790 e-con-full e-flex e-con e-child\" data-id=\"512ac790\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-180e1d6f elementor-align-center elementor-widget elementor-widget-button\" data-id=\"180e1d6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40bb19d5 elementor-widget elementor-widget-wp-widget-text\" data-id=\"40bb19d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-506ecbf1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"506ecbf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e891a5c e-flex e-con-boxed e-con e-parent\" data-id=\"1e891a5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: rawpixel.com\/Freepik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11799,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[415],"class_list":["post-11795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683.jpg",1000,655,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-300x197.jpg",300,197,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-768x503.jpg",640,419,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683.jpg",640,419,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683.jpg",1000,655,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683.jpg",1000,655,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683.jpg",1000,655,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/147683-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=11795"}],"version-history":[{"count":14,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11795\/revisions"}],"predecessor-version":[{"id":11884,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11795\/revisions\/11884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11799"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=11795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=11795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=11795"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=11795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}