{"id":12914,"date":"2020-04-07T10:30:22","date_gmt":"2020-04-07T09:30:22","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12914"},"modified":"2020-04-06T17:23:59","modified_gmt":"2020-04-06T16:23:59","slug":"review-of-the-current-news-by-cert-w-march-2020","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/","title":{"rendered":"Review of the current news by CERT-W &#8211; March 2020"},"content":{"rendered":"<figure id=\"post-12838 media-12838\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12838\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1.png\" alt=\"\" width=\"1021\" height=\"295\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1.png 1021w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1-437x126.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1-71x21.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1-768x222.png 768w\" sizes=\"auto, (max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<h2>Cybercrime watch<\/h2>\n<h3><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities\/\">The most consequent Patch Tuesday in the history of Patch Tuesday<\/a><\/h3>\n<p style=\"font-weight: 400;\">On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are considered &#8220;critical&#8221;, which is the highest level of severity. The exploit of some of them allow remote code execution and takeover of vulnerable assets without user interaction.<\/p>\n<h3><a href=\"https:\/\/threatpost.com\/new-mirai-variant-mukashi-targets-zyxel-nas-devices\/153982\/\">Mukashi: the new variant of the famous Mirai botnet is targeting Zyxel NAS<\/a><\/h3>\n<p>The Mukashi botnet has been found performing bruteforce attacks on random hosts. The botnet is using various combinations of credentials in an attemps to log in and seize control of the asset. It is now targeting the Network Access Storage (NAS) from the Zyxel brand by using the recent CVE-2020-9054, which allows for remote code execution on the 5.21 version of the firmware.<\/p>\n<h3><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/fbi-warns-of-fake-cdc-emails-in-covid-19-phishing-alert\/d\/d-id\/1337381\">Coronavirus is now the most used decoy of all times<\/a><\/h3>\n<p>During the sanitary crisis linked to COVID-19, the coronavirus has become the most used decoy of all times in phishing attacks. The FBI Internet Crime Complaint Center (IC3) mentions that it can either be email pretending to offer information on the virus itself, test kits, vaccines. Attackers even go to such length like posing as charities asking for donations.<\/p>\n<p>&nbsp;<\/p>\n<h2>Vulnerability watch<\/h2>\n<h3><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-0684\">CVE-2020-0684 &#8211; Remote code execution in Microsoft Windows<\/a><\/h3>\n<p>A new remote code execution vulnerability has been found in the Windows operating system that is triggered when a .LNK file is processed (analyzed or executed). An attacker could gain the same privileges as the local user by exploiting this vulnerability.<\/p>\n<h3><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-3947\">CVE-2020-3946 &#8211; Denial of Service in Vmware Workstation<\/a><\/h3>\n<p>Some versions of Vmware Workstation and Fusion are exposed to a &#8220;use-after-free&#8221; vulnerability in the vmnetdhcp service. The successful exploit of this vulnerability currently leads to denial of service but could be used in theory to execute arbitrary code.<\/p>\n<h3><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-10887\">CVE-2020-10887 &#8211; Firewall bypass in TP-Link routers<\/a><\/h3>\n<p>A version of the TP-Link firmware is exposed to firewall bypass. This vulnerability originates from an insufficiant filtering when handling IPv6 SSH connections. It can be exploited without authentication and can even be used to peform privilege escalation and code execution, up to root.<\/p>\n<p>&nbsp;<\/p>\n<h2>Weekly top<\/h2>\n<h3>The top leak &#8211; <a href=\"https:\/\/threatpost.com\/millions-guests-marriott-data-breach-again\/154300\/\">A 5-million record leak of Mariott&#8217;s clients<\/a><\/h3>\n<p>Cybercriminals have succeeded in obtaining the credentials of two employees on a third-party piece of software used in Mariott resort to provide clients with various services. They used them to access numerous information on Mariott&#8217;s clients, including names, email addresses, phone numbers, etc.<br \/>\nIt is the second data leak in 24 months for the brand!<\/p>\n<h3>The top exploit &#8211; <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-0796\">CVE-2020-0796 &#8211; Remote code execution vulnerability in the SMB protocol<\/a><\/h3>\n<p>SMB is a network protocol used for file sharing, printers, and for other network purposes. The Microsoft SMB 3.1.1 (SMBv3) is suject to a vulnerability in the way it handles some requests. Unauthenticated attackers can use this vulnerability to remotely execute code on SMB servers as well as clients.<\/p>\n<h3>The top attack &#8211; <a href=\"https:\/\/www.zdnet.com\/article\/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak\/\">One of the largest Czech hospital hit by a cyberattack<\/a><\/h3>\n<p>The Brno university hospital in Czech Republic has been hit by a major cyberattack in the midst of the COVID-19 outbreak. It has been forced to shut down all IT equipment and information system. Consequently, surgical procedures have been rescheduled and newly infected patients transferred to other hospitals.<\/p>\n<p>&nbsp;<\/p>\n<h2>Software version watch<\/h2>\n<table style=\"border-style: solid; border-color: #000000;\" border=\"1\">\n<tbody>\n<tr>\n<td><strong>Software<\/strong><\/td>\n<td><strong>Current version<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/get.adobe.com\/fr\/flashplayer\/\">32.0.0.344<\/a><\/td>\n<\/tr>\n<tr>\n<td>Adobe Acrobat Reader DC<\/td>\n<td><a href=\"https:\/\/get.adobe.com\/fr\/reader\/\">2020.006.20042<\/a><\/td>\n<\/tr>\n<tr>\n<td>Java<\/td>\n<td><a href=\"https:\/\/java.com\/fr\/download\/\">Version 8 Update 241<\/a><\/td>\n<\/tr>\n<tr>\n<td>Mozilla Firefox<\/td>\n<td><a href=\"https:\/\/www.mozilla.org\/fr\/firefox\/new\/\">74.0<\/a><\/td>\n<\/tr>\n<tr>\n<td>Google Chrome<\/td>\n<td><a href=\"https:\/\/www.google.com\/chrome\/browser\/desktop\/index.html\">80.0.3987.163<\/a><\/td>\n<\/tr>\n<tr>\n<td>VirtualBox<\/td>\n<td><a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\">6.1.4<\/a><\/td>\n<\/tr>\n<tr>\n<td>CCleaner<\/td>\n<td><a href=\"https:\/\/www.piriform.com\/ccleaner\/download\/standard\">5.65.7632<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime watch The most consequent Patch Tuesday in the history of Patch Tuesday On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":12825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[3487,3486,3387,3405,3479,2944,2878],"coauthors":[3488],"class_list":["post-12914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-cert-w-en","tag-cybercrime","tag-cybercriminality","tag-incident-response-cert-w-en","tag-indicators","tag-newsletter","tag-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Review of the current news by CERT-W - March 2020 - Risk Insight<\/title>\n<meta name=\"description\" content=\"March 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review of the current news by CERT-W - March 2020 - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"March 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-07T09:30:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"Review of the current news by CERT-W &#8211; March 2020\",\"datePublished\":\"2020-04-07T09:30:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\"},\"wordCount\":591,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"CERT-W\",\"cybercrime\",\"cybercriminality\",\"incident response CERT-W\",\"indicators\",\"Newsletter\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\",\"name\":\"Review of the current news by CERT-W - March 2020 - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-04-07T09:30:22+00:00\",\"description\":\"March 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Review of the current news by CERT-W &#8211; March 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review of the current news by CERT-W - March 2020 - Risk Insight","description":"March 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/","og_locale":"en_US","og_type":"article","og_title":"Review of the current news by CERT-W - March 2020 - Risk Insight","og_description":"March 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/","og_site_name":"RiskInsight","article_published_time":"2020-04-07T09:30:22+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"Review of the current news by CERT-W &#8211; March 2020","datePublished":"2020-04-07T09:30:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/"},"wordCount":591,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["CERT-W","cybercrime","cybercriminality","incident response CERT-W","indicators","Newsletter","Vulnerabilities"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/","name":"Review of the current news by CERT-W - March 2020 - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2020-04-07T09:30:22+00:00","description":"March 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/04\/review-of-the-current-news-by-cert-w-march-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Review of the current news by CERT-W &#8211; March 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12914"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12914\/revisions"}],"predecessor-version":[{"id":12926,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12914\/revisions\/12926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12825"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12914"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}