{"id":14722,"date":"2024-10-17T11:34:14","date_gmt":"2024-10-17T09:34:14","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=14722"},"modified":"2024-11-21T13:36:49","modified_gmt":"2024-11-21T12:36:49","slug":"anonymous-sudan","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/10\/17\/anonymous-sudan\/","title":{"rendered":"EUROPOL: Charges unveiled in ongoing effort to de-anonymise DDoS group Anonymous Sudan"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14722\" class=\"elementor elementor-14722\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42bfa8dd e-flex e-con-boxed e-con e-parent\" data-id=\"42bfa8dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-279ff4b5 elementor-widget elementor-widget-html\" data-id=\"279ff4b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ce7b92 e-con-full e-flex e-con e-parent\" data-id=\"6ce7b92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-22ec0de4 e-con-full e-flex e-con e-child\" data-id=\"22ec0de4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fa0504 elementor-widget elementor-widget-image\" data-id=\"1fa0504\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"558\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg\" class=\"attachment-large size-large wp-image-11306\" alt=\"Image Credit: Oseven0\/Wikimedia\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901-300x261.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901-768x669.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Oseven0\/Wikimedia<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7fdd24 e-con-full e-flex e-con e-child\" data-id=\"f7fdd24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14bfef0b elementor-widget elementor-widget-html\" data-id=\"14bfef0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a42a9b5 elementor-widget elementor-widget-wp-widget-text\" data-id=\"a42a9b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Thursday\u00a0 17 October 2024 at xx:00 CEST<\/p>\n<p><b>EUROPOL: Charges unveiled in ongoing effort to de-anonymise DDoS group Anonymous Sudan<\/b><\/p>\n<p><b>\u00a0<\/b><br \/>\nSyndicated via\u00a0 <a href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&amp;loop=false&amp;delayms=5000\" target=\"_blank\" rel=\"noopener\">CYBERInsights\/CyberVoice<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cyber+pr&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity\u00a0 PR<\/a><em><br \/>\n#CyberInsights #CyberPR #CyberSecurity #CyberMedia #CyberPR #CyberAwareness #SME #SmallBusiness<br \/>\n#smallbusinessowner #Europol #AnonymousSudan<br \/>\n<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33494efc e-flex e-con-boxed e-con e-parent\" data-id=\"33494efc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f7502b0 e-con-full e-flex e-con e-child\" data-id=\"6f7502b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12871088 elementor-widget elementor-widget-html\" data-id=\"12871088\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-637107db e-con-full e-flex e-con e-child\" data-id=\"637107db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61fb0f4c elementor-widget elementor-widget-wp-widget-text\" data-id=\"61fb0f4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>US authorities have unveiled this week charges against two Sudanese nationals involved in a significant Distributed-Denial-of-Service (<strong>DDoS<\/strong>) cybercrime network, following an international investigation that spanned multiple countries. The investigation exposed the activities of <strong>Anonymous Sudan<\/strong>, a prolific cybercrime group conducting destructive <strong>DDoS<\/strong> attacks to support their ideologically-motivated agenda.<\/p>\n<p><strong>Europol<\/strong> coordinated the European dimension of the investigation, working closely with law enforcement agencies across <strong>Europe<\/strong> to identify victims and suspects, ensuring swift action in multiple jurisdictions.<\/p>\n<p>Victims of the attacks include sensitive government and critical infrastructure targets around the world, including the U.S. Department of Justice, the U.S. Department of Defence, the Federal Bureau of Investigation, the U.S. State Department and organisations and governments in <strong>Europe<\/strong>. Victims also included major technology platforms and network service providers in the USA.<\/p>\n<p><strong>Anonymous Sudan\u2019s<\/strong> DDoS tool was used to launch over 35 000 <strong>DDoS<\/strong> attacks in approximately one year, causing more than USD 10 million (EUR 9\u202f145\u202f000) in damages to victims in the USA alone.<\/p>\n<p>The European dimension of the investigation <strong>Europol\u2019s<\/strong> coordination ensured that European Member States impacted by the <strong>DDoS<\/strong> attacks were represented in the investigation. By facilitating cooperation between national authorities and organising coordination meetings, <strong>Europol<\/strong> enabled swift action and effective information-sharing across borders, which helped identify the perpetrators and supported the charges now being brought forward. <strong>Europol<\/strong> also provided analytical support, synthesising intelligence from various sources to create a comprehensive understanding of the <strong>DDoS<\/strong> network.<\/p>\n<p>Disabling the <strong>DDoS<\/strong> network<br \/>\nLaw enforcement agencies have not only focused on the individuals behind these attacks but have also taken steps to disable the infrastructure that supported their criminal activities.<\/p>\n<p>Specifically, the warrants authorised the seizures of computer servers that launched and controlled the <strong>DDoS<\/strong> attacks, computer servers that relayed attack commands to a broader network of attack computers, and accounts containing the source code for the <strong>DDoS<\/strong> tools used by <strong>Anonymous Sudan<\/strong>.<\/p>\n<p>A unified international response to <strong>DDoS<\/strong><br \/>\nThese law enforcement actions took place as part of Operation PowerOFF, an ongoing, coordinated effort among international law enforcement agencies aimed at dismantling criminal <strong>DDoS<\/strong>-for-hire infrastructure worldwide, and holding the administrators and users of these illegal services accountable.<\/p>\n<p>In <strong>Europe<\/strong>, law enforcement authorities in France, Luxembourg and Sweden took part in the investigation.<\/p>\n<p>In the United States, the Federal Bureau of Investigation (<strong>FBI<\/strong>), the Defence Criminal Investigative Service, State Department, and the U.S. Attorney\u2019s Office for the Central District of California took part.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b297ded elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6b297ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/charges-unveiled-in-ongoing-effort-to-de-anonymise-ddos-group-anonymous-sudan-0?mtm_campaign=newsletter\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61bd6f4f e-flex e-con-boxed e-con e-parent\" data-id=\"61bd6f4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f56b419 e-con-full e-flex e-con e-child\" data-id=\"7f56b419\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-219640be elementor-widget elementor-widget-image\" data-id=\"219640be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"144\" height=\"144\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/08\/Nord_logo_1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-12867\" alt=\"NordVPN\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6762462f e-con-full e-flex e-con e-child\" data-id=\"6762462f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62a1b5ac elementor-widget elementor-widget-wp-widget-text\" data-id=\"62a1b5ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to Small and Medium-sized enterprises (<a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>), the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations.<\/p>\n<p>The\u00a0<b>NordVPN<\/b> service allows you to connect to 5600+ servers in 60+ countries. It secures your Internet data with military-grade encryption, ensures your web activity remains private and helps bypass geographic content restrictions online. <strong>\u00a0<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a53ad26 e-flex e-con-boxed e-con e-parent\" data-id=\"5a53ad26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-669788e4 e-con-full e-flex e-con e-child\" data-id=\"669788e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60f6ade6 elementor-widget elementor-widget-image\" data-id=\"60f6ade6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-300x200.jpg\" class=\"attachment-medium size-medium wp-image-13007\" alt=\"SME Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-1024x682.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/smartmockups_ltgx5ml3.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7fbc54 e-con-full e-flex e-con e-child\" data-id=\"a7fbc54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a06a7af elementor-widget elementor-widget-html\" data-id=\"1a06a7af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f29f8af elementor-widget elementor-widget-wp-widget-text\" data-id=\"1f29f8af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>ABOUT CYBER VOICE | SME CYBER PR<\/strong><\/p>\n<p><strong>CYBERVoice<\/strong> provides direct, immediate, highly cost-effective access to our Proprietary Subscriber base* of 132,000*+ Named &amp; Profiled (PECR, <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/gdpr-compliance-for-smes\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a> &amp; DKIM Compliant) Owners, Partners &amp; Directors of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\">SMEs<\/a> throughout Europe &amp; the UK.<\/p>\n<p>CYBERVoice is available with varying User Options from Single Release to bi-Annual &amp; Unlimited Annual Campaigns available all delivering outstanding ROI! <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/cyber-voice-syndicate-now\/\" target=\"_blank\" rel=\"noopener\">Post Your First Release FREE!<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-113ceed8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"113ceed8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&#038;loop=false&#038;delayms=5000\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Oseven0\/Wikimedia Learn More \/&#8230; Image Credit: IfOnlyCommunications Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11306,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[36],"tags":[477],"ppma_author":[415],"class_list":["post-14722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-prchannel","tag-cybervoice"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg",1024,892,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901-300x261.jpg",300,261,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901-768x669.jpg",640,558,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg",640,558,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg",1024,892,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg",1024,892,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901.jpg",1024,892,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/1024px-Europol_building_The_Hague_the_Netherlands_-_901-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/prchannel\/\" rel=\"category tag\">CYBER VOICE<\/a>","tag_info":"CYBER VOICE","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/14722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=14722"}],"version-history":[{"count":8,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/14722\/revisions"}],"predecessor-version":[{"id":14731,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/14722\/revisions\/14731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11306"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=14722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=14722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=14722"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=14722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}