{"id":293,"date":"2022-06-23T15:11:09","date_gmt":"2022-06-23T15:11:09","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=293"},"modified":"2022-06-23T15:11:09","modified_gmt":"2022-06-23T15:11:09","slug":"jacuzzi-app-sicherheitslucke-legt-private-daten-offen","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/de\/cyber-angriffe\/jacuzzi-app-sicherheitslucke-legt-private-daten-offen\/","title":{"rendered":"Jacuzzi-App-Sicherheitsl\u00fccke legt private Daten offen"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Das sollten Sie lesen, wenn Sie zu den Millionen Besitzern eines Jacuzzi-Whirlpools geh\u00f6ren. Forscher haben eine Schwachstelle in der SmartTub-Funktion der Jacuzzi-Marken-App identifiziert, die Ihre privaten Daten f\u00fcr Angreifer zug\u00e4nglich machen kann. Die Schwachstelle befindet sich in der Weboberfl\u00e4che der App und k\u00f6nnte es Angreifern erm\u00f6glichen, auf die pers\u00f6nlichen Daten der Benutzer zuzugreifen, einschlie\u00dflich Name, Adresse, E-Mail-Adresse und Telefonnummer. Wenn Sie also einen Whirlpool der Marke Jacuzzi besitzen, aktualisieren Sie Ihre SmartTub-App so bald wie m\u00f6glich!<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">\u00dcber die SmartTub App<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Die App der Marke Jacuzzi ist eine kostenlose mobile Anwendung, mit der Benutzer ihre Jacuzzi-Whirlpools \u00fcber ihr Smartphone steuern k\u00f6nnen. Die App bietet Funktionen wie die M\u00f6glichkeit, den Whirlpool aus der Ferne ein- und auszuschalten, die Temperatur einzustellen, Heizzeiten zu planen und vieles mehr. Die App bietet auch eine Webschnittstelle, \u00fcber die die Benutzer auf ihre Kontoinformationen zugreifen und den Status ihrer Jacuzzi-Whirlpools einsehen k\u00f6nnen.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Was ist das Problem?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Die Schwachstelle besteht darin, wie die SmartTub-Funktion der Jacuzzi Brand-App Benutzereingaben verarbeitet. Insbesondere werden die vom Benutzer eingegebenen Daten nicht ordnungsgem\u00e4\u00df validiert oder bereinigt, bevor sie dem Benutzer angezeigt werden. Diese Schwachstelle k\u00f6nnte es einem Angreifer erm\u00f6glichen, b\u00f6swillige Eingaben zu machen, die dazu f\u00fchren w\u00fcrden, dass die App sensible Informationen wie den Namen, die Adresse, die E-Mail-Adresse und die Telefonnummer des Benutzers anzeigt.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Angriffsszenario erkl\u00e4rt<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Ein Angreifer muss zuerst Zugriff auf das Jacuzzi-Konto des Benutzers erlangen, um diese Schwachstelle auszunutzen. Der Hacker k\u00f6nnte die Anmeldedaten des Benutzers (Benutzername und Passwort) durch Phishing oder andere Mittel stehlen. Sobald der Angreifer Zugriff auf das Konto des Benutzers hat, kann er b\u00f6sartigen Input in die SmartTub-Funktion der App eingeben, der dazu f\u00fchren w\u00fcrde, dass sensible Informationen angezeigt werden.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Welche Daten wurden offengelegt?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Zu den Daten, die aufgrund dieser Sicherheitsl\u00fccke offengelegt werden k\u00f6nnen, geh\u00f6ren Name, Adresse, E-Mail-Adresse und Telefonnummer des Benutzers.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Wie nutzen die Hacker diese Informationen?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Die sensiblen Informationen, die durch diese Schwachstelle offengelegt werden, k\u00f6nnten von Angreifern f\u00fcr verschiedene Zwecke genutzt werden, z. B. f\u00fcr Identit\u00e4tsdiebstahl, Betrug oder gezielte Phishing-Angriffe.<\/span><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Identit\u00e4tsdiebstahl:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Der Angreifer k\u00f6nnte die offengelegten Informationen nutzen, um sich als das Opfer auszugeben und Betrug oder andere Straftaten zu begehen.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Betrug:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Der Angreifer k\u00f6nnte die offengelegten Informationen nutzen, um neue Konten auf den Namen des Opfers zu er\u00f6ffnen und betr\u00fcgerische Geb\u00fchren zu erheben.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Gezieltes Phishing:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Der Angreifer k\u00f6nnte die offengelegten Daten nutzen, um das Opfer mit einem Phishing-Angriff anzugreifen, der darauf abzielt, seine Anmeldedaten zu stehlen oder sein Ger\u00e4t mit Malware zu infizieren.<\/span><\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">Was k\u00f6nnen Sie tun?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Wenn Sie Besitzer eines Whirlpools der Marke Jacuzzi sind, ist das Beste, was Sie tun k\u00f6nnen, Ihre SmartTub-App auf die neueste Version zu aktualisieren. Die Jacuzzi Brand App ist im App Store und bei Google Play zum Download verf\u00fcgbar.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Neben der Aktualisierung Ihrer SmartTub-App sollten Sie auch Ihre Jacuzzi-Kontodaten (Benutzername und Passwort) sch\u00fctzen. Achten Sie darauf, sichere Passw\u00f6rter zu verwenden, die schwer zu erraten sind, und verwenden Sie niemals Passw\u00f6rter f\u00fcr verschiedene Konten. Sie sollten auch die Zwei-Faktor-Authentifizierung (falls verf\u00fcgbar) f\u00fcr Ihr Jacuzzi-Konto aktivieren, um es noch besser vor unbefugtem Zugriff zu sch\u00fctzen.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Unterm Strich<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Wenn Sie einen Whirlpool von Jacuzzi besitzen, aktualisieren Sie Ihre SmartTub-App so bald wie m\u00f6glich. Das Unternehmen hat ein Update ver\u00f6ffentlicht, das die Schwachstelle behebt. Stellen Sie also sicher, dass Sie es herunterladen und Ihr Passwort f\u00fcr die App \u00e4ndern. Au\u00dferdem sollten Sie die Zwei-Faktor-Authentifizierung aktivieren, sofern diese verf\u00fcgbar ist.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Das sollten Sie lesen, wenn Sie zu den Millionen Besitzern eines Whirlpools der Marke Jacuzzi geh\u00f6ren. Forscher haben eine Sicherheitsl\u00fccke in der SmartTub-Funktion der Marke Jacuzzi gefunden... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/de\/cyber-angriffe\/jacuzzi-app-sicherheitslucke-legt-private-daten-offen\/\"><span class=\"screen-reader-text\">Jacuzzi-App-Sicherheitsl\u00fccke legt private Daten offen<\/span> read more<\/a><\/p>","protected":false},"author":1,"featured_media":296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jacuzzi App Vulnerability Exposes Private Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/de\/cyber-angriffe\/jacuzzi-app-sicherheitslucke-legt-private-daten-offen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jacuzzi App Vulnerability Exposes Private Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/de\/cyber-angriffe\/jacuzzi-app-sicherheitslucke-legt-private-daten-offen\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-23T15:11:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschrieben von\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Jacuzzi App Vulnerability Exposes Private Data\",\"datePublished\":\"2022-06-23T15:11:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\"},\"wordCount\":579,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\",\"name\":\"Jacuzzi App Vulnerability Exposes Private Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"datePublished\":\"2022-06-23T15:11:09+00:00\",\"description\":\"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg\",\"width\":1000,\"height\":668,\"caption\":\"Jacuzzi-App-Vulnerability-Exposes-Private-Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jacuzzi App Vulnerability Exposes Private Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/de\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jacuzzi-App-Schwachstelle legt private Daten offen | Sicherheitsbriefing","description":"Forscher haben eine Schwachstelle in der SmartTub App gefunden, die Ihre privaten Daten f\u00fcr b\u00f6swillige Angreifer zug\u00e4nglich machen kann.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/de\/cyber-angriffe\/jacuzzi-app-sicherheitslucke-legt-private-daten-offen\/","og_locale":"de_DE","og_type":"article","og_title":"Jacuzzi App Vulnerability Exposes Private Data | Security Briefing","og_description":"Researchers have identified a vulnerability in the SmartTub App that can reveal your private data to remote malicious attackers.","og_url":"https:\/\/securitybriefing.net\/de\/cyber-angriffe\/jacuzzi-app-sicherheitslucke-legt-private-daten-offen\/","og_site_name":"Security Briefing","article_published_time":"2022-06-23T15:11:09+00:00","og_image":[{"width":1000,"height":668,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Geschrieben von":"security","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Jacuzzi App Vulnerability Exposes Private Data","datePublished":"2022-06-23T15:11:09+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/"},"wordCount":579,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/","name":"Jacuzzi-App-Schwachstelle legt private Daten offen | Sicherheitsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","datePublished":"2022-06-23T15:11:09+00:00","description":"Forscher haben eine Schwachstelle in der SmartTub App gefunden, die Ihre privaten Daten f\u00fcr b\u00f6swillige Angreifer zug\u00e4nglich machen kann.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_152736786_S-2.jpg","width":1000,"height":668,"caption":"Jacuzzi-App-Vulnerability-Exposes-Private-Data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/jacuzzi-app-vulnerability-exposes-private-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Jacuzzi App Vulnerability Exposes Private Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sicherheitsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sicherheitsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"Sicherheit","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin ist eine leitende Redakteurin f\u00fcr Government Technology. Zuvor schrieb sie f\u00fcr PYMNTS und The Bay State Banner. Sie hat einen B.A. in kreativem Schreiben von Carnegie Mellon. Sie lebt in der N\u00e4he von Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/de\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media\/296"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}