{"id":14861,"date":"2024-10-22T09:01:12","date_gmt":"2024-10-22T07:01:12","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=14861"},"modified":"2024-11-21T13:36:48","modified_gmt":"2024-11-21T12:36:48","slug":"alert-nk-state-actors","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/10\/22\/alert-nk-state-actors\/","title":{"rendered":"STATE ACTORS: SKILLS GAP &#8211; NK Hackers exploiting Cyber Skills Shortage to blag jobs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14861\" class=\"elementor elementor-14861\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cedff81 e-flex e-con-boxed e-con e-parent\" data-id=\"4cedff81\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6dc1055b elementor-widget elementor-widget-html\" data-id=\"6dc1055b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2240e11e e-con-full e-flex e-con e-parent\" data-id=\"2240e11e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6db56765 e-con-full e-flex e-con e-child\" data-id=\"6db56765\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6eaf8106 elementor-widget elementor-widget-image\" data-id=\"6eaf8106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"366\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-1024x585.jpg\" class=\"attachment-large size-large wp-image-14864\" alt=\"CYBERInsights | Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-1024x585.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-300x171.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-768x439.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: IfOnlyCommunications\/AI<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-435663f0 e-con-full e-flex e-con e-child\" data-id=\"435663f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3085f96d elementor-widget elementor-widget-html\" data-id=\"3085f96d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<center\/><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.47&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\"><IMG border=\"0\" alt=\"nordvpn\" src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=rv%2fnShY4wLA&bids=572706.47&subid=0&type=4&gridnum=16\"><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3941c16d elementor-widget elementor-widget-wp-widget-text\" data-id=\"3941c16d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>CYBER Insights &#8211; Helping Keep Small Business CYBERSafe!<\/strong><br \/>\nGibraltar: Monday\u00a0 21 October 2024 at 11:00 CEST<\/p>\n<p><b>STATE ACTORS: SKILLS GAP &#8211; NK Hackers exploiting Cyber Skills Shortage to blag SME Cybersecurity Jobs.\u00a0<\/b><br \/>\nBy: Iain Fraser &#8211; <a href=\"https:\/\/www.google.com\/search?q=cybersecurity+journalist&amp;client=opera&amp;hs=J2J&amp;sca_esv=4b48ab93829afc9b&amp;sxsrf=ADLYWIJJxCdzfo9XXGpMHq8BhsB4jkM6-g%3A1725554192279&amp;ei=EN7ZZu7sELiikdUPj53AsAs&amp;ved=0ahUKEwjutK-lnqyIAxU4UaQEHY8OELYQ4dUDCBA&amp;uact=5&amp;oq=cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiGGN5YmVyc2VjdXJpdHkgam91cm5hbGlzdDIKECMYgAQYJxiKBTIKECMYgAQYJxiKBTIEECMYJzIFEAAYgAQyBhAAGBYYHjILEAAYgAQYhgMYigUyCBAAGIAEGKIESNpQUKMIWPRCcAJ4AJABBJgB7AGgAd4mqgEGMC4zMi4xuAEDyAEA-AEBmAIboALHH6gCCsICBxAjGLADGCfCAgcQABiwAxgewgIOEAAYgAQYsAMYhgMYigXCAgsQABiABBiwAxiiBMICBxAjGCcY6gLCAhEQLhiABBiRAhjRAxjHARiKBcICCxAAGIAEGJECGIoFwgIKEAAYgAQYQxiKBcICEBAuGIAEGNEDGEMYxwEYigXCAgoQLhiABBhDGIoFwgILEC4YgAQY0QMYxwHCAgUQLhiABJgDB4gGAZAGCJIHBjIuMjMuMqAHgM8C&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\n<a href=\"https:\/\/docs.google.com\/presentation\/d\/1hoiW_cE9plS9lNkFSCGpmEvNrTC7SC1Da_0yrrdkfJM\/pub?start=true&amp;loop=false&amp;delayms=5000\" target=\"_blank\" rel=\"noopener\">CYBERInsights\/<\/a>THREATIntel<br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cyber+pr&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cyber News &amp; Intel<\/a><em><br \/>\n#CyberInsights #CyberSecurity #CyberMedia #CyberPR #CyberAwareness #CyberSkillsShortage #SME #SmallBusiness #smallbusinessowner\u00a0 <\/em><em>#StateActors #MSP\u00a0 #CloudGuard<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38d1cd65 e-flex e-con-boxed e-con e-parent\" data-id=\"38d1cd65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-466ff0c6 e-con-full e-flex e-con e-child\" data-id=\"466ff0c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-152e6a60 elementor-widget elementor-widget-html\" data-id=\"152e6a60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49a88e45 e-con-full e-flex e-con e-child\" data-id=\"49a88e45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15150c3f elementor-widget elementor-widget-wp-widget-text\" data-id=\"15150c3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>North Korean Hackers<\/strong> have increasingly been using fake identities to secure jobs as <strong>IT<\/strong> and <strong>Cybersecurity<\/strong> professionals in Western companies, including the <strong>UK<\/strong>, as part of their broader strategy to launch <strong>Cyberattacks<\/strong> and steal data. In several reported cases, these hackers have successfully infiltrated businesses by falsifying their credentials and posing as legitimate job applicants. Once hired, they exploit their access to internal systems to exfiltrate sensitive data, disrupt operations, or even extort their employers for ransom.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32e75acc elementor-widget elementor-widget-video\" data-id=\"32e75acc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/o0VBJG6HQaw?si=XnHruOhE9Rk1gtEp&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e79ac77 elementor-widget elementor-widget-wp-widget-text\" data-id=\"3e79ac77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>One well-known instance involved a <strong>North Korean<\/strong> <strong>Hacker<\/strong> hired by a US-based Fortune 500 company, which discovered the breach only after the hacker had downloaded sensitive data and demanded a six-figure ransom in <strong>Cryptocurrency<\/strong>. This case underscores how <strong>North Korean<\/strong> <strong>Cyber<\/strong> operatives often use forged identities to infiltrate companies, sometimes even assuming multiple personas to apply for different roles at the same company\u200b<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-123ad48e elementor-widget elementor-widget-image\" data-id=\"123ad48e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"366\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-1024x585.jpg\" class=\"attachment-large size-large wp-image-14864\" alt=\"CYBERInsights | Small Business Cybersecurity\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-1024x585.jpg 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-300x171.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-768x439.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI.jpg 1344w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4013df06 elementor-widget elementor-widget-wp-widget-text\" data-id=\"4013df06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Precautions for Small Business Owners:<\/strong><br \/>\nTo protect against such threats, <strong>Small Business<\/strong> owners should adopt several key practices when hiring <strong>Remote<\/strong> or <strong>IT<\/strong> personnel:<\/p>\n<p><strong>Thorough Background Checks:<\/strong><br \/>\n<strong>Verify<\/strong> the applicant\u2019s credentials, including past employment, references, and educational background. Be wary of inconsistencies, such as novice language skills despite claims of extensive experience.<\/p>\n<p><strong>Video Interviews:<\/strong><br \/>\nAlways conduct video interviews to ensure the applicant matches their profile photo. Pay attention to irregularities, such as attempts to avoid using the camera or strange behaviours during the call.<\/p>\n<p><strong>Monitor Financial Requests:<\/strong><br \/>\nBe cautious of employees who frequently request changes to payment details, such as bank accounts, or who want payments routed through digital wallets.<\/p>\n<p><strong>Restrict Access:<\/strong><br \/>\nLimit new hires\u2019 access to sensitive systems until their reliability is established. This can mitigate the damage in case the hire turns out to be fraudulent.<\/p>\n<p><strong>Use Monitoring Tools:<\/strong><br \/>\nImplement monitoring software to detect unusual network activity, such as accessing data outside normal business hours or from foreign IP addresses.<\/p>\n<p>By employing these steps, <strong>Small Businesses<\/strong> can reduce the risk of hiring malicious actors and protect their digital assets from <strong>State-sponsored<\/strong> threats.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93849ed elementor-align-center elementor-widget elementor-widget-button\" data-id=\"93849ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-200e5169 e-flex e-con-boxed e-con e-parent\" data-id=\"200e5169\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-eec0973 e-con-full e-flex e-con e-child\" data-id=\"eec0973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16efba7c elementor-widget elementor-widget-image\" data-id=\"16efba7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.44&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"266\" height=\"147\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/09\/Untitled-design-1.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-14897\" alt=\"Selecting an MSP | Small Business Cyber News - Cloudguard.ai\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62f5aa6b e-con-full e-flex e-con e-child\" data-id=\"62f5aa6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74c6a51e elementor-widget elementor-widget-wp-widget-text\" data-id=\"74c6a51e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Looking to select an MSP? Introducing <a href=\"https:\/\/cloudguard.ai\/\" target=\"_blank\" rel=\"noopener\">CloudGuard<\/a>, a leading Microsoft security automation specialist and Managed Security Services Provider (MSSP)<\/strong><\/p>\n<p><strong>Make managing your <a href=\"https:\/\/cyberinsights.iainfraser.net\" target=\"_blank\" rel=\"noopener\">Small Business Cybersecurity<\/a> simple and stress-free.<\/strong><br \/>\n<a href=\"https:\/\/cloudguard.ai\/\" target=\"_blank\" rel=\"noopener\"><strong><br \/>\nCloudGuard<\/strong><\/a> help <strong>SME Business Owners<\/strong> automate manual effort, remove complexity, solve talent gaps, and reduce operational costs with our 24\/7 Managed Security Services. From their new <strong>SOC<\/strong> (Security Operations Centre) in Manchester they provide\u00a0 <strong>24x7x365<\/strong> <strong>Cybersecurity<\/strong> expertise to <strong>SMEs<\/strong> (Small and Medium-sized Enterprises)\u00a0 that often lack the resources and talent to build and manage their own <strong>SOC<\/strong> teams effectively.\u00a0<strong><a href=\"https:\/\/cloudguard.ai\/services\/cybersecurity-consulting\/security-posture-assessment\/\" target=\"_blank\" rel=\"noopener\">Assess Your Cybersecurity Now<\/a> | <a href=\"https:\/\/cloudguard.ai\/cyber-clinic\/\" target=\"_blank\" rel=\"noopener\">Get Free Advice from CloudGuard<\/a><\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: IfOnlyCommunications\/AI Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":14864,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[516,561],"tags":[562,517],"ppma_author":[415],"class_list":["post-14861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberawareness","category-breach-alert","tag-breachalert","tag-cyberawareness"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI.jpg",1344,768,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-300x171.jpg",300,171,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-768x439.jpg",640,366,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-1024x585.jpg",640,366,true],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI.jpg",1344,768,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI.jpg",1344,768,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-1024x585.jpg",1024,585,true],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/NKHacker_IfOnly_AI-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberawareness\/\" rel=\"category tag\">SME CYBER AWARENESS<\/a> <a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/breach-alert\/\" rel=\"category tag\">BREACH ALERT<\/a>","tag_info":"BREACH ALERT","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/14861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=14861"}],"version-history":[{"count":38,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/14861\/revisions"}],"predecessor-version":[{"id":14988,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/14861\/revisions\/14988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/14864"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=14861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=14861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=14861"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=14861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}