{"id":9595,"date":"2024-06-12T08:08:27","date_gmt":"2024-06-12T06:08:27","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=9595"},"modified":"2024-06-13T10:49:13","modified_gmt":"2024-06-13T08:49:13","slug":"threat-intel-musk-bans-apple-devices","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/06\/12\/threat-intel-musk-bans-apple-devices\/","title":{"rendered":"THREAT INTEL: PRIVACY &#8211; Elon Musk Threatens to Ban Apple Devices Over Privacy Concern\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9595\" class=\"elementor elementor-9595\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2267188b e-flex e-con-boxed e-con e-parent\" data-id=\"2267188b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40b046b6 elementor-widget elementor-widget-html\" data-id=\"40b046b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fe82231 e-con-full e-flex e-con e-parent\" data-id=\"4fe82231\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-39162c22 e-con-full e-flex e-con e-child\" data-id=\"39162c22\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ad914 elementor-widget elementor-widget-image\" data-id=\"5ad914\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Dmoberhaus\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-300x200.jpg\" class=\"attachment-medium size-medium wp-image-9614\" alt=\"Image Credit: DanielOBERHAUS\/Wikimedia\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-768x512.jpg 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: DanielOBERHAUS\/Wikimedia<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cc4f149 elementor-widget elementor-widget-html\" data-id=\"3cc4f149\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c7a598d e-con-full e-flex e-con e-child\" data-id=\"3c7a598d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f7f4eb3 elementor-widget elementor-widget-wp-widget-text\" data-id=\"2f7f4eb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Wednesday 12 June 2024 at 08:07 CET<\/p>\n<p><strong>THREAT INTEL: PRIVACY &#8211; Elon Musk Threatens to Ban <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Apple<\/a> Devices Over Privacy Concern\u00a0<\/strong><\/p>\n<p>By Andy Jenkinson &#8211; Guest Contributor |\u00a0 Group CEO <a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">IainFRASER.net\/CYBERInsights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=sme+cyber+insights&amp;oq=&amp;gs_lcrp=EgZjaHJvbWUqCQgAECMYJxjqAjIJCAAQIxgnGOoCMgkIARAjGCcY6gIyCQgCECMYJxjqAjIJCAMQIxgnGOoCMgkIBBAjGCcY6gIyCQgFECMYJxjqAjIJCAYQIxgnGOoCMgkIBxAjGCcY6gLSAQkxMDU1ajBqMTWoAgiwAgE&amp;sourceid=chrome&amp;ie=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cyber Insights<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Elon+Musk+Threatens+to+Ban+Apple+Devices+Over+Privacy+Concern++&amp;sca_esv=b41f59bb11203993&amp;sca_upv=1&amp;sxsrf=ADLYWIL6o6LpUdqHdJLIPLCo5UucomRtIQ%3A1718267377997&amp;ei=8a1qZtnDPJ6E7M8PzMWk8AE&amp;ved=0ahUKEwiZgMfllNiGAxUeAvsDHcwiCR4Q4dUDCBA&amp;uact=5&amp;oq=Elon+Musk+Threatens+to+Ban+Apple+Devices+Over+Privacy+Concern++&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiP0Vsb24gTXVzayBUaHJlYXRlbnMgdG8gQmFuIEFwcGxlIERldmljZXMgT3ZlciBQcml2YWN5IENvbmNlcm4gIEiVDlAAWIcFcAB4AZABAJgB4wGgAfwCqgEFMC4xLjG4AQPIAQD4AQH4AQKYAgGgAoICqAIKwgIHECMYJxjqApgDggKSBwMyLTGgB70T&amp;sclient=gws-wiz-serp#ip=1\" target=\"_blank\" rel=\"noopener\">Google Indexed on 120624 at 10:05 CET<\/a><\/p>\n<p><em>#SMECyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #Cybercrime #CyberInsurance #DNS #PKI<\/em><\/p>\n<p><strong>THREAT INTEL: PRIVACY &#8211; Elon Musk Threatens to Ban <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Apple<\/a> Devices Over Privacy Concern.\u00a0Mr. Musk announced a potential ban on iPhones and other <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Apple<\/a> devices, citing serious privacy concerns.<\/strong><\/p>\n<p>Mr. Musk&#8217;s concerns and worries extend way beyond <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Apple<\/a>&#8216;s<\/strong> ties to <strong><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/microsoft\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Microsoft<\/a>,<\/strong> focusing on the broader threat posed by <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Apple<\/strong><\/a> and <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/microsoft\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Microsoft<\/strong><\/a>&#8216;s insecure servers. This includes those used for OpenAI as the real-time screenshots below demonstrate.<\/p>\n<p>With exposed and vulnerable critical Internet Assets, the risk from enabling, even facilitating cyber criminals and cybercrime is significant.<\/p>\n<p>This move highlights the lax and sub optimal security of <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Apple<\/a>&#8216;s and <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/microsoft\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Microsoft<\/a>&#8216;s servers and DNS. This despite <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/microsoft\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Microsoft<\/a>&#8216;s issuance of CVE 2020-1350 with a CVSS of 10 on exposed DNS servers.<\/p>\n<p>Mr. Musk is right to be concerned, albeit quite possibly not knowing the major external criminal aspect and threat.<\/p>\n<p>Each and every <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/apple\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Apple<\/a> and <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/microsoft\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Microsoft<\/a> user should also be concerned as they are being enforced into Insecurity Entrapment due to these exposed, highly vulnerable, and insecure servers.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f4ce513 elementor-widget elementor-widget-image\" data-id=\"4f4ce513\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"371\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Musk_120624-1024x593.png\" class=\"attachment-large size-large wp-image-9613\" alt=\"Musk_120624\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Musk_120624-1024x593.png 1024w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Musk_120624-300x174.png 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Musk_120624-768x445.png 768w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Musk_120624-1536x889.png 1536w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Musk_120624.png 1641w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57712fa elementor-widget elementor-widget-wp-widget-text\" data-id=\"57712fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><em><a id=\"ember2816\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/satyanadella\/\" target=\"_blank\" rel=\"noopener\">Satya Nadella<\/a> <a id=\"ember2817\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/bradsmi\/\" target=\"_blank\" rel=\"noopener\">Brad Smith<\/a> <a id=\"ember2818\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/ann-johnsons\/\" target=\"_blank\" rel=\"noopener\">Ann Johnson<\/a> <a id=\"ember2819\" class=\"ember-view\" href=\"https:\/\/www.linkedin.com\/in\/tom-burt-31a538a\/\" target=\"_blank\" rel=\"noopener\">Tom Burt<\/a><\/em><\/p>\n<p><em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/tesla-motors\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Tesla<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/spacex\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">SpaceX<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbi\/?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BHE4AwZnpRJGWKGLPqAHpZw%3D%3D\" target=\"_self\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/company\/fbi\/\" rel=\"noopener\">Federal Bureau of Investigation (FBI)<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/the-white-house\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">The White House<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/ncsccs\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">NCSCCS<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/information-commissioner%27s-office\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Information Commissioner&#8217;s Office<\/a><\/em><br \/>\n<em><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/security-exchange-commission\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Security Exchange Commission<\/a><\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a74ec31 e-con-full e-flex e-con e-child\" data-id=\"3a74ec31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e4311eb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7e4311eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f48a515 elementor-widget elementor-widget-wp-widget-text\" data-id=\"f48a515\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience<br \/>\nas a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and<br \/>\ninspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering<br \/>\n100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for<br \/>\nsome of the world\u2019s largest, leading organisations. Andy has a demonstrable track record<br \/>\nof largescale technical delivery and management within many sectors including the<br \/>\nProfessional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b37cc8a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5b37cc8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: DanielOBERHAUS\/Wikimedia Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9614,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[505],"class_list":["post-9595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk.jpg",1024,683,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-768x512.jpg",640,427,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk.jpg",640,427,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk.jpg",1024,683,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk.jpg",1024,683,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk.jpg",1024,683,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/06\/Image_DanielOBERHAUS_Wikimedia_EMusk-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/9595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=9595"}],"version-history":[{"count":0,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/9595\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/9614"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=9595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=9595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=9595"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=9595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}