{"id":16103,"date":"2019-08-18T15:21:06","date_gmt":"2019-08-18T23:21:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/18\/news-9846\/"},"modified":"2019-08-18T15:21:06","modified_gmt":"2019-08-18T23:21:06","slug":"news-9846","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/08\/18\/news-9846\/","title":{"rendered":"Os ataques s\u00e3o mais coordenados. N\u00f3s tamb\u00e9m!"},"content":{"rendered":"<p><strong>Credit to Author: Leonardo Granda| Date: Wed, 12 Dec 2018 12:16:54 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>Hoje tive uma conversa muito interessante com um cliente. Falamos sobre a complexidade que vem com a interrup\u00e7\u00e3o das amea\u00e7as atuais e como os atacantes cibern\u00e9ticos est\u00e3o se tornando mais sofisticados quando se trata de perpetrar um ataque.<\/p>\n<p>Contei sobre a<a href=\"https:\/\/news.sophos.com\/es-es\/2018\/11\/27\/tecnicas-cibercriminales-informe-de-amenazas-sophoslabs-2019\/\">s t\u00e9cnicas que os cibercriminosos est\u00e3o usando<\/a> e sobre as tend\u00eancias de seguran\u00e7a cibern\u00e9tica que nossos especialistas da <a href=\"https:\/\/news.sophos.com\/es-es\/2018\/11\/20\/sophos-desvela-las-nuevas-tendencias-en-ciberseguridad-para-2019\/\">SophosLabs prev\u00eaem para 2019.<\/a><\/p>\n<p>Mas o ponto crucial da conversa veio quando eu comentei sobre nossos recursos de integra\u00e7\u00e3o entre todas as nossas solu\u00e7\u00f5es e como fornecemos uma &#8220;<a href=\"https:\/\/www.sophos.com\/es-es\/lp\/synchronized-security.aspx\">seguran\u00e7a sincronizada<\/a>&#8220;, em que o cliente percebe uma resposta autom\u00e1tica a um incidente, simplificando a administra\u00e7\u00e3o de TI e dando maior profundidade na an\u00e1lise de amea\u00e7as desconhecidas. Desta forma, encurtando a superf\u00edcie dos ataques.<\/p>\n<p>Eu senti que eu estava dizendo a ela todas as caracter\u00edsticas fundamentais do nosso modelo de Sincroniza\u00e7\u00e3o Seguran\u00e7a, mas pr\u00f3ximo ato me disse &#8230;. se parece interessante, eu vi outras plataformas que fazem o mesmo.<\/p>\n<p>Foi quando pensei que, como expliquei, nem todos os modelos s\u00e3o os mesmos e <a href=\"https:\/\/www.checkpoint.com\/architecture\/infinity\/\">muitas vezes usam apenas um nome ou logotipo de mercado que acabou sendo bem-sucedido<\/a> (como aconteceu com a m\u00e1gica do Machine Learning), mas que realmente existem diferenciais importantes.<\/p>\n<p>Isso me levou a escrever o artigo a seguir, a fim de dar uma r\u00e1pida vis\u00e3o geral do potencial da Sophos na interconex\u00e3o e n\u00e3o apenas porque encabe\u00e7amos essa quest\u00e3o. Mas tamb\u00e9m porque continuamos a demonstrar lideran\u00e7a neste assunto.<\/p>\n<h2><strong>Vamos ver alguns casos de uso<\/strong><\/h2>\n<p><strong>Exemplo 1<\/strong>. O endpoint e \/ ou o servidor avisam o Firewall de que est\u00e3o comprometidos para evitar que a amea\u00e7a se espalhe pela rede.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55018\" data-permalink=\"https:\/\/news.sophos.com\/pt-br\/2018\/12\/12\/los-ataques-estan-mas-coordinados-nosotros-tambien\/screen-shot-2018-12-11-at-9-39-16-pm\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png\" data-orig-size=\"1127,593\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-12-11 at 9.39.16 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=640\" class=\"aligncenter size-full wp-image-55018\" src=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=640&#038;h=337\" alt=\"\" width=\"640\" height=\"337\" srcset=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=640&amp;h=337 640w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=150&amp;h=79 150w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=300&amp;h=158 300w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=768&amp;h=404 768w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png?w=1024&amp;h=539 1024w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-39-16-pm.png 1127w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Nesse cen\u00e1rio, o invasor \u00e9 incapaz de fazer um movimento lateral do ataque, pois quando a amea\u00e7a \u00e9 detectada, o firewall atua automaticamente modificando suas regras para impedir a propaga\u00e7\u00e3o.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Exemplo 2<\/strong>. Um dispositivo m\u00f3vel da empresa n\u00e3o est\u00e1 em conformidade com os padr\u00f5es de seguran\u00e7a e, automaticamente, o Access Point bloqueia o acesso \u00e0 rede at\u00e9 que os n\u00edveis de seguran\u00e7a apropriados sejam restaurados. Voc\u00ea pode ver um <a href=\"https:\/\/vimeo.com\/282748672\">v\u00eddeo explicativo<\/a> de como nossa tecnologia funciona em tempo real.<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55021\" data-permalink=\"https:\/\/news.sophos.com\/pt-br\/2018\/12\/12\/los-ataques-estan-mas-coordinados-nosotros-tambien\/screen-shot-2018-12-11-at-8-53-36-pm\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png\" data-orig-size=\"1112,585\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-12-11 at 8.53.36 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=640\" class=\"aligncenter size-full wp-image-55021\" src=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=640&#038;h=337\" alt=\"\" width=\"640\" height=\"337\" srcset=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=640&amp;h=337 640w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=150&amp;h=79 150w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=300&amp;h=158 300w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=768&amp;h=404 768w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png?w=1024&amp;h=539 1024w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-8-53-36-pm.png 1112w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Neste exemplo, podemos ver a integra\u00e7\u00e3o entre um dispositivo m\u00f3vel e um AP Sophos, mas <a href=\"https:\/\/vimeo.com\/287507478\">tamb\u00e9m pode integrar um terminal (windows)<\/a> com um AP para oferecer o mesmo benef\u00edcio.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Exemplo 3<\/strong>. Quando \u00e9 detectado na organiza\u00e7\u00e3o usu\u00e1rios de &#8220;alto risco&#8221; que est\u00e3o constantemente recebendo spam ou phishing, \u00e9 poss\u00edvel enviar campanhas \u00e9ticas de phishing para avaliar seu n\u00edvel de conscientiza\u00e7\u00e3o de seguran\u00e7a. No final do dia, o elo mais fraco da cadeia \u00e9 o usu\u00e1rio final \ud83d\ude42<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55022\" data-permalink=\"https:\/\/news.sophos.com\/pt-br\/2018\/12\/12\/los-ataques-estan-mas-coordinados-nosotros-tambien\/screen-shot-2018-12-11-at-9-01-29-pm\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png\" data-orig-size=\"1109,510\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-12-11 at 9.01.29 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=640\" class=\"aligncenter size-full wp-image-55022\" src=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=640&#038;h=294\" alt=\"\" width=\"640\" height=\"294\" srcset=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=640&amp;h=294 640w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=150&amp;h=69 150w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=300&amp;h=138 300w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=768&amp;h=353 768w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png?w=1024&amp;h=471 1024w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-01-29-pm.png 1109w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Exemplo 4<\/strong>. Quando um usu\u00e1rio faz o download de malware ou viola pol\u00edticas de DLP ou da Web dentro da organiza\u00e7\u00e3o, ele permanece em uma estrutura de alto risco e est\u00e1 inscrito para receber campanhas \u00e9ticas de phishing, nas quais o n\u00edvel de conhecimento dos problemas \u00e9 avaliado. de seguran\u00e7a.<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55023\" data-permalink=\"https:\/\/news.sophos.com\/pt-br\/2018\/12\/12\/los-ataques-estan-mas-coordinados-nosotros-tambien\/screen-shot-2018-12-11-at-9-04-23-pm\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png\" data-orig-size=\"1105,475\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-12-11 at 9.04.23 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=640\" class=\"aligncenter size-full wp-image-55023\" src=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=640&#038;h=275\" alt=\"\" width=\"640\" height=\"275\" srcset=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=640&amp;h=275 640w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=150&amp;h=64 150w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=300&amp;h=129 300w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=768&amp;h=330 768w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png?w=1024&amp;h=440 1024w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-04-23-pm.png 1105w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Exemplo 5<\/strong>. Integra\u00e7\u00e3o entre o Endpoint e a Criptografia.<\/p>\n<p>Nesta oportunidade, vemos como uma m\u00e1quina que est\u00e1 comprometida ter\u00e1 suas chaves de criptografia revogadas, impedindo o roubo de informa\u00e7\u00f5es confidenciais da organiza\u00e7\u00e3o.<\/p>\n<p><a href=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55024\" data-permalink=\"https:\/\/news.sophos.com\/pt-br\/2018\/12\/12\/los-ataques-estan-mas-coordinados-nosotros-tambien\/screen-shot-2018-12-11-at-9-13-09-pm\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png\" data-orig-size=\"1104,583\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2018-12-11 at 9.13.09 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=640\" class=\"aligncenter size-full wp-image-55024\" src=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=640&#038;h=338\" alt=\"\" width=\"640\" height=\"338\" srcset=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=640&amp;h=338 640w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=150&amp;h=79 150w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=300&amp;h=158 300w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=768&amp;h=406 768w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png?w=1024&amp;h=541 1024w, https:\/\/sophos.files.wordpress.com\/2018\/12\/screen-shot-2018-12-11-at-9-13-09-pm.png 1104w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Ent\u00e3o, quando a amea\u00e7a \u00e9 removida da m\u00e1quina, o Safeguard restaura as chaves de criptografia e o usu\u00e1rio retorna o acesso normal \u00e0s informa\u00e7\u00f5es.<\/p>\n<p>Deixo um v\u00eddeo onde o processo t\u00e9cnico de integra\u00e7\u00e3o entre as duas solu\u00e7\u00f5es \u00e9 explicado: <a href=\"https:\/\/www.youtube.com\/watch?v=GHkwHDxkX2Y\">https:\/\/www.youtube.com\/watch?v=GHkwHDxkX2Y<\/a><\/p>\n<p>H\u00e1 v\u00e1rios exemplos em que podemos falar sobre nossos recursos de seguran\u00e7a sincronizados entre as diferentes solu\u00e7\u00f5es, como o reconhecimento de aplicativos (controle de aplicativos de sincroniza\u00e7\u00e3o) ou a integra\u00e7\u00e3o entre nossa solu\u00e7\u00e3o de prote\u00e7\u00e3o de email e prote\u00e7\u00e3o de endpoint. Mas eu vou deixar aqui para n\u00e3o aborrecer voc\u00ea.<\/p>\n<h2><\/h2>\n<h4><\/h4>\n<h2><strong>Conclus\u00e3o<\/strong><\/h2>\n<h4><\/h4>\n<h5>Podemos ver como as amea\u00e7as evolu\u00edram para aumentar a superf\u00edcie de ataque, mas se tivermos uma \u00fanica plataforma de gerenciamento que fa\u00e7a com que todas as solu\u00e7\u00f5es se comuniquem, tornaremos a vida mais dif\u00edcil para os cibercriminosos;)<\/h5>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/1m2v7Ip1tZk\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2018\/12\/largest_sync-loop-core-graphic.png\"\/><\/p>\n<p><strong>Credit to Author: Leonardo Granda| Date: Wed, 12 Dec 2018 12:16:54 +0000<\/strong><\/p>\n<p>Hoje tive uma conversa muito interessante com um cliente. Falamos sobre a complexidade que vem com a interrup\u00e7\u00e3o das amea\u00e7as atuais e como os atacantes cibern\u00e9ticos est\u00e3o se tornando mais sofisticados quando se trata de perpetrar um ataque. Contei sobre as t\u00e9cnicas que os cibercriminosos est\u00e3o usando e sobre as tend\u00eancias de seguran\u00e7a cibern\u00e9tica que [&amp;#8230;]&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/1m2v7Ip1tZk&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379],"class_list":["post-16103","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16103"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16103\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}