{"id":17622,"date":"2022-02-28T10:00:00","date_gmt":"2022-02-28T09:00:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=17622"},"modified":"2022-04-25T13:59:31","modified_gmt":"2022-04-25T12:59:31","slug":"cdt-watch-february-2022","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/","title":{"rendered":"CDT Watch \u2013 February 2022"},"content":{"rendered":"\n<h1 style=\"text-align: center;\"><strong>DECRYPTION<\/strong><\/h1>\n<h2 style=\"text-align: center;\"><span class=\"TextRun BCX9 SCXW140991250\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX9 SCXW140991250\">T<\/span><\/span><span class=\"TextRun BCX9 SCXW140991250\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun BCX9 SCXW140991250\">HE RISE OF INITIAL ACCESS BROKERS<\/span><\/span><\/h2>\n<p>As seen in the underground economy edition, the cybercriminal economy relies on the professionalization and specialization of its system. Among the main actors of this ecosystem, such as the Bullet Proof Hoster or the RaaS, the Initial Access Brokers (IAB) have become more and more crucial these last years.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><strong>What is the IAB\u2019s role in the underground economy?\u00a0<\/strong>\u00a0<\/p>\n<p>They are providers of victims\u2019 access. They scan the web for vulnerabilities, send phishing e-mails or try to use brute force to get hold of the passwords of company employees, or even create persistent access in the victim\u2019s network. Those ready-made &#8216;access&#8217; are sold on the dark market: depending on its level of quality, prices can range from $1K to $100K. <a href=\"https:\/\/www.borderelliptic.com\/Documents\/white_papers\/initial-access-brokers-report.pdf\">The average selling price of initial access to a network is $7,100.<\/a> Price is based on the organization\u2019s revenue, type of access sold, and number of devices accessible. For example, Access to <u>an <\/u><a href=\"https:\/\/ke-la.com\/all-access-pass-five-trends-with-initial-access-brokers\/\">Australian company with 500 million USD in revenue<\/a> that enables an attacker with \u201cadmin\u201d level of privileges has been offered for 12 BTC, and access to a <a href=\"https:\/\/ke-la.com\/all-access-pass-five-trends-with-initial-access-brokers\/\">Mexican government body for 100,000 USD.<\/a>\u00a0<\/p>\n<p>The market of corporate initial access grew by almost 16% in H2 2020\u2013H1 2021, from $6,189,388 to $7,165,387<u>. <\/u><a href=\"https:\/\/securitydelta.nl\/images\/Group_IB_presents_report_on_trending_crimes_Europe_PR1.pdf\">The number of offers to sell access to companies almost tripled over the review period: from 362 to 1,099.\u00a0<\/a> The geography of initial access brokers\u2019 operations has also expanded: if the US-based companies are <u>the most popular victims (<\/u><a href=\"https:\/\/securitydelta.nl\/images\/Group_IB_presents_report_on_trending_crimes_Europe_PR1.pdf\">30% in 2021), the European companies access sold was multiplied by three between 2019 and 2021. <\/a>French companies were the most popular lot for sellers of <a href=\"https:\/\/securitydelta.nl\/images\/Group_IB_presents_report_on_trending_crimes_Europe_PR1.pdf\">access to compromised networks \u2013 they accounted for 20% of all victim companies in 2021 in Europe, followed by the UK (18%).<\/a>\u00a0<\/p>\n<p>Finding and selecting access opportunities represent an essential but very time-consuming piece of the current \u201cransomware business model\u201d. By monetizing this activity, the IABs are offering a huge advantage of time and energy for the buyers, who can select from a menu of options, picking victims based on their revenue, country, and sector, as well as the type of remote access being offered.\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><strong>What kind of access are we talking about?<\/strong>\u00a0<\/p>\n<p>One of the main trends of the IAB market is the diversification of access Grows. If RDP and VPN are still the most common offer, new attack vectors such as access to VMWare\u2019s ESXi servers have become quite popular.\u00a0<\/p>\n<p>According to <a href=\"https:\/\/www.techrepublic.com\/article\/initial-access-brokers-how-are-iabs-related-to-the-rise-in-ransomware-attacks\/#:~:text=Initial%20access%20brokers%20are%20cybercriminals,protect%20your%20business%20from%20IABs.&amp;text=Ransomware%20attacks%20have%20increased%20seriously,vertical%20of%20the%20corporate%20world\">several types of research<\/a>, the kind of access mostly sold are\u00a0\u00a0\u00a0<\/p>\n<ul>\n<li><strong>Active Directory credentials<\/strong>: domain administrator access is one of the most valuable access since it allows the attacker to distribute malware all over the network immediately.\u00a0\u00a0<\/li>\n<li><strong>Initial Network Access (RDP, VPN, SSH)<\/strong>: <strong>:<\/strong> is one the most common access sold since it is a very popular protocol among remote workers to access their corporate resources. One of the methods used by the IAB is to launch massive scans for RDP servers all around the internet and try to brute force it.\u00a0<\/li>\n<li><strong>Web shell access:<\/strong> some IABs set up web shells on compromised web servers and sell access to it.\u00a0<\/li>\n<li><strong>Admin account on CMS (WordPress, PHP)<\/strong><strong>: <\/strong>they provide access to web hosting content (including payment solutions and credit card details)\u00a0\u00a0<\/li>\n<li><strong>Admin account on virtualization machines and root access on Linux servers<\/strong>: the sale of root access to VMware ESXi increased significantly and some attacker\u2019s group contains code that specifically targets those systems.\u00a0<\/li>\n<li><strong>Remote Monitoring and Management access<\/strong>: offer elevated permissions into several machines of the network, making it interesting data for IABs to sell.\u00a0<\/li>\n<\/ul>\n<p>According to the IAB, the services can include more stolen data, such as information on the financial health of the targeted victim, to help the attacker set the highest realistic price for the ransom.\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17630\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/premiere-image.png\" alt=\"\" width=\"627\" height=\"423\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/premiere-image.png 627w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/premiere-image-283x191.png 283w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/premiere-image-58x39.png 58w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/p>\n<p>\u00a0<\/p>\n<p><strong>What does that mean for me?<\/strong>\u00a0<\/p>\n<p>The rise of the IABs activity is, among other things, a direct consequence of the mass shift to remote work and an increase of exposed remote services, (RDP, SSH\u2026) and of the adoption of cloud applications increase. As seen; the main kinds of access sold relies on several vulnerabilities that can be corrected with standard cybersecurity measures: utilize strong passwords, enable 2FA when possible, admins and user awareness, frequent account review\u2026\u00a0<\/p>\n<p>Besides, the IABs have become a keystone of the current cybercriminal system. Which means they are an interesting indicator to look at to monitor the criminal activity and the risk to become a target. Especially in the case of a mature actor, setting up <a href=\"https:\/\/www.borderelliptic.com\/Documents\/white_papers\/initial-access-brokers-report.pdf\">monitoring programs across surface-, deep-, and dark-web forums and marketplaces, to detect IABs offering can provide relevant information to prioritize defense actions and prepare against potential attacks.<\/a><\/p>\n<p>\u00a0<\/p>\n<figure id=\"post-16217 media-16217\" class=\"align-center\"><\/figure>\n<figure id=\"post-16210 media-16210\" class=\"align-center\">\n<figure id=\"post-16367 media-16367\" class=\"align-center\"><\/figure>\n<\/figure>\n<h1 style=\"text-align: center;\"><strong>CERT-W: FROM THE FRONT LINE<\/strong><\/h1>\n<h2 style=\"text-align: center;\">The First Responder Word<\/h2>\n<figure id=\"post-16221 media-16221\" class=\"align-center\">\n<figure id=\"post-16228 media-16228\" class=\"align-center\"><\/figure>\n<\/figure>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17844\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/02\/Image1.png\" alt=\"\" width=\"627\" height=\"401\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/02\/Image1.png 627w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/02\/Image1-299x191.png 299w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/02\/Image1-61x39.png 61w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/p>\n<p>\u00a0<\/p>\n<h1 style=\"text-align: center;\"><strong>READING OF THE MONTH<\/strong><\/h1>\n<p style=\"text-align: center;\">We recommend the Cisco Almanac for 2022:\u00a0\u00a0<\/p>\n<p style=\"text-align: center;\">\u201c2022 Cybersecurity Almanac: 100 Facts, Figures, Predictions and Statistics\u201d\u00a0<\/p>\n<figure id=\"post-16219 media-16219\" class=\"align-center\">\n<figure id=\"post-16387 media-16387\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-17634\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/trois.png\" alt=\"\" width=\"627\" height=\"421\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/trois.png 627w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/trois-284x191.png 284w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/03\/trois-58x39.png 58w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/><\/figure>\n<p style=\"text-align: center;\"><a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2022\/\">2022 Cybersecurity Almanac<\/a>\u00a0<\/p>\n<p>\u00a0<\/p>\n<\/figure>\n<h1 style=\"text-align: center;\"><strong>UPDATE ON THE UK NATIONAL CYBER STRATEGY<\/strong><\/h1>\n<p>The UK\u2019s National Cyber Strategy transmits a more \u2018proactive\u2019 stance to cyber power with a commitment to a \u2018whole of society\u2019 approach. The new strategy is supported by \u00a32.6 billion investment seeing a 26.9% percent increase in comparison to previous strategy.<\/p>\n<p>It is structured in five pillars: UK Cyber Ecosystem, Cyber Resilience, Technology advantage, Global leadership and finally Countering threats with 53 action plans. The plans aim to improve intel sharing platforms to truly &#8216;defend as one&#8217; with a new Govt Cyber Coordination Centre (GCCC). Supporting industrial partners and strengthening business regulations through govt levers and enhance the nation&#8217;s cyber structure and skills.<\/p>\n<p style=\"text-align: center;\"><strong>Access the summary from the UK office <\/strong><a href=\"https:\/\/digiplace.sharepoint.com\/:p:\/s\/WOP-CDT-DEVELOPMENT\/Eb1agzbiwRdGsmfxEGoRL1EB0N2VvP0qNbL2U7CQfK_z6A?e=LtzU2U\"><strong>here<\/strong><\/a><strong>!<\/strong><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\">SEE YOU NEXT MONTH!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DECRYPTION THE RISE OF INITIAL ACCESS BROKERS As seen in the underground economy edition, the cybercriminal economy relies on the professionalization and specialization of its system. Among the main actors of this ecosystem, such as the Bullet Proof Hoster or&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":16207,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3973,2777],"tags":[3480,4043,2772,3932],"coauthors":[3488],"class_list":["post-17622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cert-newsletter","category-cybersecurity-digital-trust","tag-cert-en","tag-cyber-strategy","tag-cybersecurity","tag-front"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CDT Watch \u2013 February 2022 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CDT Watch \u2013 February 2022 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"DECRYPTION THE RISE OF INITIAL ACCESS BROKERS As seen in the underground economy edition, the cybercriminal economy relies on the professionalization and specialization of its system. Among the main actors of this ecosystem, such as the Bullet Proof Hoster or...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-25T12:59:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1621\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"CDT Watch \u2013 February 2022\",\"datePublished\":\"2022-02-28T09:00:00+00:00\",\"dateModified\":\"2022-04-25T12:59:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\"},\"wordCount\":913,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"keywords\":[\"CERT\",\"cyber strategy\",\"cybersecurity\",\"front\"],\"articleSection\":[\"CERT Newsletter\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\",\"name\":\"CDT Watch \u2013 February 2022 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"datePublished\":\"2022-02-28T09:00:00+00:00\",\"dateModified\":\"2022-04-25T12:59:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png\",\"width\":1621,\"height\":455},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CDT Watch \u2013 February 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CDT Watch \u2013 February 2022 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/","og_locale":"en_US","og_type":"article","og_title":"CDT Watch \u2013 February 2022 - RiskInsight","og_description":"DECRYPTION THE RISE OF INITIAL ACCESS BROKERS As seen in the underground economy edition, the cybercriminal economy relies on the professionalization and specialization of its system. Among the main actors of this ecosystem, such as the Bullet Proof Hoster or...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/","og_site_name":"RiskInsight","article_published_time":"2022-02-28T09:00:00+00:00","article_modified_time":"2022-04-25T12:59:31+00:00","og_image":[{"width":1621,"height":455,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","type":"image\/png"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"CDT Watch \u2013 February 2022","datePublished":"2022-02-28T09:00:00+00:00","dateModified":"2022-04-25T12:59:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/"},"wordCount":913,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","keywords":["CERT","cyber strategy","cybersecurity","front"],"articleSection":["CERT Newsletter","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/","name":"CDT Watch \u2013 February 2022 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","datePublished":"2022-02-28T09:00:00+00:00","dateModified":"2022-04-25T12:59:31+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/06\/CDT-WATCH.png","width":1621,"height":455},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/02\/cdt-watch-february-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"CDT Watch \u2013 February 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=17622"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17622\/revisions"}],"predecessor-version":[{"id":17846,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17622\/revisions\/17846"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/16207"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=17622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=17622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=17622"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=17622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}