{"id":14354,"date":"2020-10-09T08:43:43","date_gmt":"2020-10-09T07:43:43","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=14354"},"modified":"2020-10-09T08:40:08","modified_gmt":"2020-10-09T07:40:08","slug":"review-of-the-current-news-by-cert-w-september-2020","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/","title":{"rendered":"Review of the current news by CERT-W &#8211; September 2020"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12838\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1.png\" alt=\"\" width=\"1021\" height=\"295\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1.png 1021w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1-437x126.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1-71x21.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-1-768x222.png 768w\" sizes=\"auto, (max-width: 1021px) 100vw, 1021px\" \/><\/p>\n<h2>Indicators of the month<\/h2>\n<h3>Top attack &#8211; <a href=\"https:\/\/www.porttechnology.org\/news\/cma-cgm-emerges-from-cyber-attack\/\">French shipping giant CMA CGM hit by ransomware cyber attack<\/a><\/h3>\n<p>CMA CGM announces that it has been affected by a ransomware attack, which <strong>disabled its reservation system<\/strong> and affected some of its <strong>Chinese offices. The RagnarLocker gang<\/strong> reportedly asked the company to contact them within two days &#8220;via a live chat and pay for a special decryption key&#8221;. In a statement, the company said it had shut all external accesses to their network and computer applications as a precautionary measure and that <strong>the group\u2019s information system was gradually resuming.<\/strong><\/p>\n<h3>Top exploit &#8211; <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/09\/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched\/\">Microsoft warns of attackers now exploiting \u201cZerologon\u201d<\/a><a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/09\/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched\/\"> flaw<\/a><\/h3>\n<p>Microsoft&#8217;s Security Intelligence team says it&#8217;s monitoring new attacks that employ public exploits of the recently patched CVE-2020-1472 Netlogon EoP vulnerability, aka Zerologon. The vulnerability carries a <strong>critical severity rating<\/strong> from Microsoft as well as a maximum of 10 under the Common Vulnerability Scoring System as it lets anyone with a network toehold obtain domain-controller password.<\/p>\n<h3>Top leak &#8211; <a href=\"https:\/\/www.theregister.com\/2020\/09\/23\/microsoft_leaks_over_65tb_bing\/\">Microsoft leaks 6.5TB in Bing search data via unsecured elastic server<\/a><\/h3>\n<p>Microsoft earlier this month exposed a 6.5TB Elastic server to the world <strong>that included search terms, location coordinates, device ID data, and a partial list of which URLs were visited.<\/strong> According to a report from cyber-security outfit WizCase, the server was password-protected until around 10 September, when \u201cthe authentication was removed\u201d.<\/p>\n<p>&nbsp;<\/p>\n<h2>Cybercrime watch<\/h2>\n<h3><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar20-259a\">US CISA report shares details on web shells used by iranian<\/a><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar20-259a\"> hackers<\/a><\/h3>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a malware analysis report (MAR) that includes technical details about web shells employed by Iranian hackers. According to the CISA\u2019s report, Iranian hackers from an unnamed APT group are employing several known web shells, in <strong>attacks on IT, government, healthcare, financial, and insurance organizations<\/strong> across the United States. The malware used by the threat actors includes the <strong>ChunkyTuna, Tiny, and China Chopper<\/strong> web shells.<\/p>\n<h3><a href=\"https:\/\/krebsonsecurity.com\/2020\/09\/two-russians-charged-in-17m-cryptocurrency-phishing-spree\/\">Two Russians charged in $17m cryptocurrency phishing<\/a><a href=\"https:\/\/krebsonsecurity.com\/2020\/09\/two-russians-charged-in-17m-cryptocurrency-phishing-spree\/\"> spree<\/a><\/h3>\n<p>U.S. authorities today announced criminal charges and financial sanctions against two Russian men <strong>accused of stealing nearly $17 million worth of virtual currencies<\/strong> in a series of phishing attacks throughout 2017 and 2018 that spoofed websites for some of the most popular cryptocurrency exchanges.<\/p>\n<h3><a href=\"https:\/\/threatpost.com\/google-chrome-attack\/159466\/\">Google Chrome bugs open browsers to attack<\/a><\/h3>\n<p>Google\u2019s release of Chrome 85.0.4183.121 for Windows, Mac and Linux fixed <strong>10 vulnerabilities<\/strong>. The successful exploitation of the most severe of these could <strong>allow an attacker to execute arbitrary code<\/strong> in the context of the browser, according to Google. Google Chrome versions prior to 85.0.4183.121 are affected.<\/p>\n<p>&nbsp;<\/p>\n<h2>Vulnerabilities watch<\/h2>\n<h3><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472\">CVE-2020-1472 \u2013 Netlogon Elevation of Privilege Vulnerability<\/a><\/h3>\n<p><strong>CVSS score: 10.0 CRITICAL<\/strong><\/p>\n<p>An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.<\/p>\n<h3><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0922\">CVE-2020-0922 \u2013 Microsoft COM* for Windows Remote Code Execution Vulnerability<\/a><\/h3>\n<p><strong>CVSS score: 8.8 HIGH<\/strong><\/p>\n<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.<\/p>\n<p><em>*The Microsoft Component Object Model (COM) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM is the foundation technology for Microsoft&#8217;s OLE (compound documents), ActiveX (Internet-enabled components), as well as others.<\/em><\/p>\n<h3><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1380\">CVE-2020-1380 \u2013 Scripting Engine Memory Corruption Vulnerability<\/a><\/h3>\n<p><strong>CVSS score: 7.5 HIGH<\/strong><\/p>\n<p>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Indicators of the month Top attack &#8211; French shipping giant CMA CGM hit by ransomware cyber attack CMA CGM announces that it has been affected by a ransomware attack, which disabled its reservation system and affected some of its Chinese&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":14350,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[3487,3387,3405,2944,2878],"coauthors":[3488],"class_list":["post-14354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-cert-w-en","tag-cybercriminality","tag-incident-response-cert-w-en","tag-newsletter","tag-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Review of the current news by CERT-W - September 2020 - Risk Insight<\/title>\n<meta name=\"description\" content=\"September 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review of the current news by CERT-W - September 2020 - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"September 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-09T07:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"Review of the current news by CERT-W &#8211; September 2020\",\"datePublished\":\"2020-10-09T07:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"CERT-W\",\"cybercriminality\",\"incident response CERT-W\",\"Newsletter\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\",\"name\":\"Review of the current news by CERT-W - September 2020 - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-10-09T07:43:43+00:00\",\"description\":\"September 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Review of the current news by CERT-W &#8211; September 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review of the current news by CERT-W - September 2020 - Risk Insight","description":"September 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/","og_locale":"en_US","og_type":"article","og_title":"Review of the current news by CERT-W - September 2020 - Risk Insight","og_description":"September 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/","og_site_name":"RiskInsight","article_published_time":"2020-10-09T07:43:43+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"Review of the current news by CERT-W &#8211; September 2020","datePublished":"2020-10-09T07:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/"},"wordCount":625,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["CERT-W","cybercriminality","incident response CERT-W","Newsletter","Vulnerabilities"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/","name":"Review of the current news by CERT-W - September 2020 - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2020-10-09T07:43:43+00:00","description":"September 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/10\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/10\/review-of-the-current-news-by-cert-w-september-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Review of the current news by CERT-W &#8211; September 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=14354"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14354\/revisions"}],"predecessor-version":[{"id":14359,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14354\/revisions\/14359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/14350"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=14354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=14354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=14354"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=14354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}