{"id":300,"date":"2022-06-28T22:07:12","date_gmt":"2022-06-28T22:07:12","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=300"},"modified":"2022-06-28T22:07:12","modified_gmt":"2022-06-28T22:07:12","slug":"gta-gruppen-publicerar-resultat-om-hermit-malware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cyberattacker\/gta-gruppen-publicerar-resultat-om-hermit-malware\/","title":{"rendered":"GTA Group publicerar resultat om Hermit Malware"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Googles Threat Analysis Group (TAG) har nyligen publicerat resultat om ett mycket sofistikerat spionprogram som kallas Hermit. RCS Laboratories, en italiensk leverant\u00f6r av spionprogram, distribuerade den skadliga programvaran med hj\u00e4lp av flera internetleverant\u00f6rer (ISP:er) och riktade sig fr\u00e4mst till iOS- och Android-smartphones i Kazakstan och Italien.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Vad \u00e4r Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit Malware \u00e4r en sofistikerad form av skadlig kod som ger angripare fullst\u00e4ndig kontroll \u00f6ver offrets enhet. N\u00e4r den \u00e4r installerad kan den stj\u00e4la k\u00e4nslig information, avlyssna konversationer och sp\u00e5ra offrets plats.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hur fungerar Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Bedr\u00e4gliga webbplatser sprider skadlig kod som utnyttjar brister i webbl\u00e4saren p\u00e5 mobila iOS- och Android-enheter. Angriparen omdirigerar anv\u00e4ndare till en kontrollerad server, d\u00e4r de laddar ner skadlig kod till offrets enhet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">N\u00e4r Hermit malware har infekterats uppr\u00e4ttar den en fj\u00e4rranslutning till angriparens server, d\u00e4r den kan ta emot kommandon fr\u00e5n sin operat\u00f6r. Dessa kommandon g\u00f6r det m\u00f6jligt f\u00f6r angriparen att f\u00e5 fj\u00e4rr\u00e5tkomst till all data som lagras p\u00e5 offrets enhet, inklusive textmeddelanden, e-postmeddelanden, foton och videor.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Vem p\u00e5verkas av Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hackare anv\u00e4nde den skadliga programvaran Hermit fr\u00e4mst f\u00f6r att rikta in sig p\u00e5 personer i Kazakstan och Italien. Men p\u00e5 grund av den sofistikerade karakt\u00e4ren hos skadlig programvara kan angripare ha anv\u00e4nt den f\u00f6r att rikta in sig p\u00e5 andra individer i andra l\u00e4nder.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Vilka var resultaten av Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Resultaten som publicerades av Google TAG ger en detaljerad analys av Hermit malware och dess kapacitet. Rapporten inneh\u00e5ller ocks\u00e5 information om hur den skadliga koden distribueras och hur den p\u00e5verkar offren.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Google TAG: s resultat om Hermit Malware<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">TAG:s slutsatser om Hermit malware baseras p\u00e5 en unders\u00f6kning som genomf\u00f6rts i samarbete med flera s\u00e4kerhetsf\u00f6retag, inklusive Lookout, Zimperium, ESET och Kaspersky.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Hermit malware \u00e4r en avancerad skadlig kod som ger inkr\u00e4ktaren fullst\u00e4ndig kontroll \u00f6ver systemet. Det kan tjuvlyssna p\u00e5 konversationer och observera offrets aktiviteter efter installationen.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Varf\u00f6r var dessa resultat viktiga?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Resultaten fr\u00e5n Google TAG \u00e4r viktiga eftersom de ger insikt i kapaciteten hos Hermit malware och hur hackare anv\u00e4nder den f\u00f6r att rikta in sig p\u00e5 individer. Resultaten fr\u00e5n Google TAG kan anv\u00e4ndas f\u00f6r att skydda potentiella offer och f\u00f6r att hj\u00e4lpa till att utveckla mot\u00e5tg\u00e4rder mot denna typ av skadlig kod.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Hur kan jag skydda mig mot Hermit Malware?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Det finns n\u00e5gra saker du kan g\u00f6ra f\u00f6r att skydda dig mot Hermit malware:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-H\u00e5ll operativsystemet och programvaran uppdaterade: Angripare utnyttjar ofta s\u00e5rbarheter som redan har \u00e5tg\u00e4rdats f\u00f6r att infektera enheter med skadlig kod. Om du h\u00e5ller din enhet uppdaterad kan du minska risken f\u00f6r att drabbas av s\u00e5dana attacker.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Undvik bes\u00f6k\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.webtitan.com\/blog\/how-to-identify-a-malicious-website\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">skadliga webbplatser<\/span><\/a><span data-preserver-spaces=\"true\">: Hackare anv\u00e4nder ofta skadliga webbplatser f\u00f6r att distribuera skadlig kod. Om du undviker dessa webbplatser kan du minska risken f\u00f6r infektion i din enhet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Installera v\u00e4lrenommerad s\u00e4kerhetsprogramvara: S\u00e4kerhetsprogram kan hj\u00e4lpa till att skydda din enhet fr\u00e5n skadlig kod. Se till att installera en v\u00e4lrenommerad s\u00e4kerhetsl\u00f6sning och h\u00e5ll den uppdaterad.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">-Installera s\u00e4kerhetsplugins eller till\u00e4gg som k\u00f6r st\u00e4ndiga skanningar f\u00f6r att f\u00f6rhindra attacker fr\u00e5n skadlig kod p\u00e5 din dator.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Genom att f\u00f6lja dessa tips kan du hj\u00e4lpa till att skydda dig mot Hermit malware och andra liknande hot. Det \u00e4r dock viktigt att komma ih\u00e5g att ingen enskild \u00e5tg\u00e4rd \u00e4r 100% effektiv, och att det alltid rekommenderas att ha flera lager av s\u00e4kerhet.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">Sammanfattningsvis<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Hermit \u00e4r en sofistikerad typ av skadlig kod som ger angripare fullst\u00e4ndig kontroll \u00f6ver offrets enhet. Angripare kan anv\u00e4nda den f\u00f6r att stj\u00e4la k\u00e4nsliga data, lyssna p\u00e5 konversationer och sp\u00e5ra offrets r\u00f6relser. Du kan hj\u00e4lpa till att skydda dig mot denna fara genom att anv\u00e4nda n\u00e5gra enkla strategier. Det \u00e4r dock viktigt att komma ih\u00e5g att ingen enskild \u00e5tg\u00e4rd \u00e4r perfekt och att experter alltid rekommenderar att du har flera s\u00e4kerhetslager i dina enheter.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Googles Threat Analysis Group (TAG) har nyligen publicerat resultat om ett mycket sofistikerat spionprogram som kallas Hermit. RCS Laboratories, en italiensk leverant\u00f6r av spionprogram, distribuerade den skadliga programvaran med hj\u00e4lp av flera... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/gta-gruppen-publicerar-resultat-om-hermit-malware\/\">Continue reading <span class=\"screen-reader-text\">GTA Group publicerar resultat om Hermit Malware<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GTA Group Publishes Findings on Hermit Malware | Security Briefing<\/title>\n<meta name=\"description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/gta-gruppen-publicerar-resultat-om-hermit-malware\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cyberattacker\/gta-gruppen-publicerar-resultat-om-hermit-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T22:07:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"795\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\"},\"headline\":\"GTA Group Publishes Findings on Hermit Malware\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\",\"name\":\"GTA Group Publishes Findings on Hermit Malware | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"datePublished\":\"2022-06-28T22:07:12+00:00\",\"description\":\"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg\",\"width\":1000,\"height\":795,\"caption\":\"GTA-Group-Publishes-Findings-on-Hermit-Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GTA Group Publishes Findings on Hermit Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GTA Group publicerar resultat om Hermit Malware | S\u00e4kerhetsbriefing","description":"De senaste r\u00f6nen om det sofistikerade skadliga programmet Hermit, som uppt\u00e4cktes ha distribuerats av RCS Laboratories.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cyberattacker\/gta-gruppen-publicerar-resultat-om-hermit-malware\/","og_locale":"sv_SE","og_type":"article","og_title":"GTA Group Publishes Findings on Hermit Malware | Security Briefing","og_description":"The latest findings on the sophisticated Hermit malware, which was discovered to have been distributed by RCS Laboratories.","og_url":"https:\/\/securitybriefing.net\/sv\/cyberattacker\/gta-gruppen-publicerar-resultat-om-hermit-malware\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T22:07:12+00:00","og_image":[{"width":1000,"height":795,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44"},"headline":"GTA Group Publishes Findings on Hermit Malware","datePublished":"2022-06-28T22:07:12+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"},"wordCount":610,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/","name":"GTA Group publicerar resultat om Hermit Malware | S\u00e4kerhetsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","datePublished":"2022-06-28T22:07:12+00:00","description":"De senaste r\u00f6nen om det sofistikerade skadliga programmet Hermit, som uppt\u00e4cktes ha distribuerats av RCS Laboratories.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_114503010_S-2.jpg","width":1000,"height":795,"caption":"GTA-Group-Publishes-Findings-on-Hermit-Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/gta-group-publishes-findings-on-hermit-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"GTA Group Publishes Findings on Hermit Malware"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/301"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}