{"id":300,"date":"2022-06-28T22:07:12","date_gmt":"2022-06-28T22:07:12","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=300"},"modified":"2022-06-28T22:07:12","modified_gmt":"2022-06-28T22:07:12","slug":"gta-groep-publiceert-bevindingen-over-hermit-malware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/nl\/cyberaanvallen\/gta-groep-publiceert-bevindingen-over-hermit-malware\/","title":{"rendered":"GTA Group publiceert bevindingen over Hermit-malware"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Google Threat Analysis Group (TAG) heeft onlangs bevindingen gepubliceerd over zeer geavanceerde spyware, bekend als Hermit. RCS Laboratories, een Italiaanse spyware-verkoper, verspreidde de malware met de hulp van verschillende internetproviders (ISP's), voornamelijk gericht op iOS- en Android-smartphones in Kazachstan en Itali\u00eb.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Wat is Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit Malware is een geavanceerde vorm van malware die aanvallers volledige controle geeft over het apparaat van het slachtoffer. Eenmaal ge\u00efnstalleerd kan het gevoelige informatie stelen, gesprekken afluisteren en de locatie van het slachtoffer volgen.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hoe werkt Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Frauduleuze websites verspreiden malware die misbruik maakt van webbrowserfouten op mobiele iOS- en Android-apparaten. De aanvaller leidt gebruikers om naar een gecontroleerde server, waar ze de malware downloaden naar het apparaat van het slachtoffer.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Eenmaal ge\u00efnfecteerd maakt de Hermit-malware een verbinding op afstand met de server van de aanvaller, waar het commando's kan ontvangen van de operator. Met deze opdrachten kan de aanvaller op afstand toegang krijgen tot alle gegevens die zijn opgeslagen op het apparaat van het slachtoffer, waaronder sms-berichten, e-mails, foto's en video's.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Wie wordt getroffen door Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hackers gebruikten de Hermit-malware voornamelijk om individuen in Kazachstan en Itali\u00eb aan te vallen. Door de geavanceerde aard van de malware kunnen aanvallers deze echter ook hebben gebruikt om andere personen in andere landen aan te vallen.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Wat waren de bevindingen van de Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">De bevindingen die door Google TAG zijn gepubliceerd, bieden een gedetailleerde analyse van de Hermit-malware en de mogelijkheden ervan. Het rapport bevat ook informatie over hoe de malware wordt verspreid en hoe het slachtoffers be\u00efnvloedt.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Google TAG's bevindingen over Hermit Malware<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">De bevindingen van TAG over de Hermit-malware zijn gebaseerd op een onderzoek dat is uitgevoerd in samenwerking met verschillende beveiligingsbedrijven, waaronder Lookout, Zimperium, ESET en Kaspersky.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Hermit malware is een geavanceerde malware die de indringer volledige controle geeft over het systeem. Het kan gesprekken afluisteren en de activiteiten van het slachtoffer observeren na installatie.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Waarom waren deze bevindingen significant?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">De bevindingen van Google TAG zijn van vitaal belang omdat ze inzicht geven in de mogelijkheden van Hermit-malware en hoe hackers deze gebruiken om individuen aan te vallen. De bevindingen van Google TAG kunnen worden gebruikt om potenti\u00eble slachtoffers te beschermen en te helpen bij de ontwikkeling van tegenmaatregelen tegen dit type malware.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hoe kan ik mezelf beschermen tegen Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Er zijn een paar dingen die je kunt doen om jezelf te beschermen tegen Hermit malware:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Houd je besturingssysteem en software up-to-date: aanvallers maken vaak gebruik van kwetsbaarheden die al zijn gepatcht om apparaten met malware te infecteren. Door je apparaat up-to-date te houden, verklein je de kans dat je door dergelijke aanvallen wordt getroffen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Vermijd bezoek\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.webtitan.com\/blog\/how-to-identify-a-malicious-website\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">schadelijke websites<\/span><\/a><span data-preserver-spaces=\"true\">: Hackers gebruiken vaak schadelijke websites om malware te verspreiden. Als je deze sites vermijdt, verklein je de kans op infectie van je apparaat.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Installeer gerenommeerde beveiligingssoftware: Beveiligingssoftware kan helpen om je apparaat te beschermen tegen malware. Zorg ervoor dat je een goede beveiligingsoplossing installeert en deze up-to-date houdt.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Installeer beveiligingsplugins of extensies die constante scans uitvoeren om malware-aanvallen op uw computer te voorkomen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Door deze tips te volgen, kun je jezelf helpen beschermen tegen Hermit malware en andere soortgelijke bedreigingen. Het is echter essentieel om te onthouden dat geen enkele maatregel 100% effectief is en dat het altijd aan te raden is om meerdere beveiligingslagen te hebben.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Conclusie<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit is een geavanceerd type malware dat aanvallers volledige controle geeft over het apparaat van het slachtoffer. Aanvallers kunnen het gebruiken om gevoelige gegevens te stelen, gesprekken af te luisteren en de bewegingen van het slachtoffer te volgen. Je kunt jezelf tegen dit gevaar beschermen door een aantal eenvoudige strategie\u00ebn toe te passen. Het is echter cruciaal om te onthouden dat geen enkele maatregel perfect is en dat experts altijd adviseren om meerdere beveiligingslagen in je apparaten te hebben.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Google Threat Analysis Group (TAG) heeft onlangs bevindingen gepubliceerd over zeer geavanceerde spyware die bekend staat als Hermit. RCS Laboratories, een Italiaanse spywareleverancier, verspreidde de malware met behulp van verschillende... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/nl\/cyberaanvallen\/gta-groep-publiceert-bevindingen-over-hermit-malware\/\">Lees meer verder <span class=\"screen-reader-text\">GTA Group publiceert bevindingen over Hermit-malware<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GTA Group Publishes Findings on Hermit Malware | Security Briefing<\/title>\n<meta name=\"description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/nl\/cyberaanvallen\/gta-groep-publiceert-bevindingen-over-hermit-malware\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/nl\/cyberaanvallen\/gta-groep-publiceert-bevindingen-over-hermit-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T22:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"GTA Group Publishes Findings on Hermit Malware\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"name\":\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"description\":\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"width\":1000,\"height\":795,\"caption\":\"GTA-Group-Publishes-Findings-on-Hermit-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GTA Group Publishes Findings on Hermit Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/nl\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GTA Group publiceert bevindingen over Hermit-malware | Veiligheidsbriefing","description":"De laatste bevindingen over de geraffineerde Hermit-malware, waarvan werd ontdekt dat deze werd verspreid door RCS Laboratories.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/nl\/cyberaanvallen\/gta-groep-publiceert-bevindingen-over-hermit-malware\/","og_locale":"nl_NL","og_type":"article","og_title":"GTA Group Publishes Findings on Hermit Malware | Security Briefing","og_description":"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.","og_url":"https:\/\/securitybriefing.net\/nl\/cyberaanvallen\/gta-groep-publiceert-bevindingen-over-hermit-malware\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T22:07:12+00:00","og_image":[{"width":1000,"height":795,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"C\u00e9sar Daniel Barreto","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"GTA Group Publishes Findings on Hermit Malware","datePublished":"2022-06-28T22:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"wordCount":610,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","name":"GTA Group publiceert bevindingen over Hermit-malware | Veiligheidsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","datePublished":"2022-06-28T22:07:12+00:00","description":"De laatste bevindingen over de geraffineerde Hermit-malware, waarvan werd ontdekt dat deze werd verspreid door RCS Laboratories.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","width":1000,"height":795,"caption":"GTA-Group-Publishes-Findings-on-Hermit-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"GTA Group Publishes Findings on Hermit Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Beveiligingsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Beveiligingsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto is een gewaardeerd schrijver en expert op het gebied van cyberbeveiliging, die bekend staat om zijn diepgaande kennis en vermogen om complexe onderwerpen op het gebied van cyberbeveiliging te vereenvoudigen. Met zijn uitgebreide ervaring in netwerkbeveiliging en gegevensbescherming schrijft hij regelmatig inzichtelijke artikelen en analyses over de nieuwste trends op het gebied van cyberbeveiliging, waarmee hij zowel professionals als het publiek voorlicht.","url":"https:\/\/securitybriefing.net\/nl\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}