{"id":1822,"date":"2022-06-16T23:09:00","date_gmt":"2022-06-16T23:09:00","guid":{"rendered":"http:\/\/tdi_184_439"},"modified":"2022-06-16T23:09:00","modified_gmt":"2022-06-16T23:09:00","slug":"cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung\/","title":{"rendered":"C\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t \u0111\u1ed1i v\u1edbi doanh nghi\u1ec7p v\u00e0 c\u00e1ch tr\u00e1nh ch\u00fang"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">T\u1ed9i ph\u1ea1m m\u1ea1ng \u0111ang gia t\u0103ng v\u00e0 c\u00e1c doanh nghi\u1ec7p \u0111ang m\u1ea5t h\u00e0ng t\u1ef7 \u0111\u00f4 la. \u0110\u1ec3 chi\u1ebfn th\u1eafng trong cu\u1ed9c chi\u1ebfn ch\u1ed1ng l\u1ea1i t\u1ed9i ph\u1ea1m m\u1ea1ng, c\u00e1c c\u00f4ng ty ph\u1ea3i hi\u1ec3u c\u00e1ch h\u1ecd b\u1ecb t\u1ea5n c\u00f4ng. Sau \u0111\u00e2y l\u00e0 s\u00e1u lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng g\u00e2y thi\u1ec7t h\u1ea1i nh\u1ea5t v\u00e0 c\u00e1ch ng\u0103n ch\u1eb7n ch\u00fang.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">C\u00e1c l\u1ed7 h\u1ed5ng l\u00e0 m\u1ea1ch m\u00e1u c\u1ee7a t\u1ed9i ph\u1ea1m m\u1ea1ng. Vi\u1ec7c khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng l\u00e0 r\u1ea5t quan tr\u1ecdng \u0111\u1ed1i v\u1edbi an ninh m\u1ea1ng. V\u00ec c\u00e1c nh\u00f3m b\u1ea3o m\u1eadt ph\u1ea3i b\u1ea3o v\u1ec7 t\u1ea5t c\u1ea3 c\u00e1c \u0111i\u1ec3m v\u00e0o c\u00f3 th\u1ec3 t\u01b0\u1edfng t\u01b0\u1ee3ng \u0111\u01b0\u1ee3c trong khi k\u1ebb t\u1ea5n c\u00f4ng ch\u1ec9 c\u1ea7n t\u00ecm v\u00e0 khai th\u00e1c m\u1ed9t l\u1ed7 h\u1ed5ng ho\u1eb7c l\u1ed7 h\u1ed5ng, n\u00ean c\u00e1c nh\u00f3m b\u1ea3o m\u1eadt ph\u1ea3i \u0111\u1ea5u tranh h\u00e0ng ng\u00e0y. S\u1ef1 b\u1ea5t \u0111\u1ed1i x\u1ee9ng n\u00e0y mang l\u1ea1i cho k\u1ebb t\u1ea5n c\u00f4ng m\u1ed9t l\u1ee3i th\u1ebf \u0111\u00e1ng k\u1ec3, khi\u1ebfn ngay c\u1ea3 c\u00e1c t\u1ed5 ch\u1ee9c l\u1edbn c\u0169ng kh\u00f4ng th\u1ec3 ng\u0103n ch\u1eb7n tin t\u1eb7c l\u1ee3i d\u1ee5ng m\u1ea1ng c\u1ee7a h\u1ecd. Vi\u1ec7c ngay c\u1ea3 c\u00e1c doanh nghi\u1ec7p l\u1edbn c\u0169ng kh\u00f4ng th\u1ec3 ng\u0103n ch\u1eb7n t\u1ed9i ph\u1ea1m m\u1ea1ng t\u1ea5n c\u00f4ng m\u1ea1ng c\u1ee7a h\u1ecd m\u1ed9t ph\u1ea7n l\u00e0 do s\u1ef1 m\u1ea5t c\u00e2n b\u1eb1ng n\u00e0y. C\u00e2u h\u1ecfi \u0111\u1eb7t ra l\u00e0: l\u00e0m th\u1ebf n\u00e0o \u0111\u1ec3 duy tr\u00ec k\u1ebft n\u1ed1i c\u00f4ng khai v\u00e0 m\u1edf trong khi v\u1eabn b\u1ea3o v\u1ec7 \u0111\u01b0\u1ee3c t\u00e0i s\u1ea3n c\u1ee7a c\u00f4ng ty?<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o l\u00e0 m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng d\u1ef1a v\u00e0o y\u1ebfu t\u1ed1 con ng\u01b0\u1eddi \u0111\u1ec3 th\u00e0nh c\u00f4ng. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o th\u01b0\u1eddng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n qua email. Ch\u00fang th\u01b0\u1eddng li\u00ean quan \u0111\u1ebfn vi\u1ec7c k\u1ebb t\u1ea5n c\u00f4ng \u0111\u00f3ng gi\u1ea3 l\u00e0 m\u1ed9t th\u1ef1c th\u1ec3 \u0111\u00e1ng tin c\u1eady \u0111\u1ec3 l\u1eeba n\u1ea1n nh\u00e2n nh\u1ea5p v\u00e0o li\u00ean k\u1ebft ho\u1eb7c t\u1ec7p \u0111\u00ednh k\u00e8m \u0111\u1ed9c h\u1ea1i. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o c\u0169ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n th\u00f4ng qua ph\u01b0\u01a1ng ti\u1ec7n truy\u1ec1n th\u00f4ng x\u00e3 h\u1ed9i v\u00e0 tin nh\u1eafn SMS.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o, c\u00e1 nh\u00e2n v\u00e0 nh\u00e2n vi\u00ean ph\u1ea3i \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o \u0111\u1ec3 ph\u00e1t hi\u1ec7n ra ch\u00fang. C\u00e1c c\u00f4ng ty c\u0169ng ph\u1ea3i c\u00f3 b\u1ed9 l\u1ecdc ch\u1ed1ng th\u01b0 r\u00e1c v\u1eefng ch\u1eafc v\u00e0 theo d\u00f5i ho\u1ea1t \u0111\u1ed9ng c\u1ee7a nh\u00e2n vi\u00ean \u0111\u1ec3 ph\u00e1t hi\u1ec7n h\u00e0nh vi \u0111\u00e1ng ng\u1edd.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng SQL Injection<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">SQL injection l\u00e0 m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng nh\u1eafm v\u00e0o c\u01a1 s\u1edf d\u1eef li\u1ec7u. M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng SQL injection nh\u1eb1m m\u1ee5c \u0111\u00edch ch\u00e8n m\u00e3 \u0111\u1ed9c v\u00e0o tr\u01b0\u1eddng nh\u1eadp \u0111\u1ec3 th\u1ef1c hi\u1ec7n truy v\u1ea5n s\u1ebd tr\u00edch xu\u1ea5t d\u1eef li\u1ec7u t\u1eeb c\u01a1 s\u1edf d\u1eef li\u1ec7u.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">C\u00e1c c\u00f4ng ty ph\u1ea3i nh\u1eadp d\u1eef li\u1ec7u x\u00e1c th\u1ef1c v\u00e0 s\u1eed d\u1ee5ng c\u00e1c truy v\u1ea5n tham s\u1ed1 \u0111\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng SQL injection. H\u1ecd c\u0169ng n\u00ean theo d\u00f5i ho\u1ea1t \u0111\u1ed9ng c\u1ee7a c\u01a1 s\u1edf d\u1eef li\u1ec7u \u0111\u1ec3 ph\u00e1t hi\u1ec7n h\u00e0nh vi \u0111\u00e1ng ng\u1edd.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng DDoS l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 \u0111\u00e1nh s\u1eadp m\u1ed9t trang web ho\u1eb7c m\u00e1y ch\u1ee7 b\u1eb1ng c\u00e1ch l\u00e0m ng\u1eadp n\u00f3 b\u1eb1ng l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp t\u1eeb nhi\u1ec1u m\u00e1y t\u00ednh. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS th\u01b0\u1eddng \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n b\u1edfi botnet, l\u00e0 m\u1ea1ng l\u01b0\u1edbi c\u00e1c m\u00e1y t\u00ednh b\u1ecb nhi\u1ec5m m\u00e0 k\u1ebb t\u1ea5n c\u00f4ng ki\u1ec3m so\u00e1t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng DDoS, c\u00e1c c\u00f4ng ty ph\u1ea3i c\u00f3 bi\u1ec7n ph\u00e1p ph\u00f2ng th\u1ee7 an ninh m\u1ea1ng m\u1ea1nh m\u1ebd. H\u1ecd c\u0169ng n\u00ean theo d\u00f5i m\u1ea1ng c\u1ee7a m\u00ecnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd v\u00e0 c\u00f3 k\u1ebf ho\u1ea1ch \u1ee9ng ph\u00f3 v\u1edbi cu\u1ed9c t\u1ea5n c\u00f4ng DDoS.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng b\u1eb1ng ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Ransomware l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng li\u00ean quan \u0111\u1ebfn vi\u1ec7c k\u1ebb t\u1ea5n c\u00f4ng m\u00e3 h\u00f3a c\u00e1c t\u1ec7p c\u1ee7a n\u1ea1n nh\u00e2n v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 gi\u1ea3i m\u00e3 ch\u00fang. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware c\u00f3 th\u1ec3 g\u00e2y thi\u1ec7t h\u1ea1i nghi\u00eam tr\u1ecdng cho doanh nghi\u1ec7p v\u00ec ch\u00fang c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn m\u1ea5t d\u1eef li\u1ec7u quan tr\u1ecdng.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware, c\u00e1c c\u00f4ng ty ph\u1ea3i c\u00f3 bi\u1ec7n ph\u00e1p ph\u00f2ng th\u1ee7 an ninh m\u1ea1ng m\u1ea1nh m\u1ebd. H\u1ecd c\u0169ng n\u00ean sao l\u01b0u d\u1eef li\u1ec7u th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 c\u00f3 th\u1ec3 kh\u00f4i ph\u1ee5c n\u1ebfu d\u1eef li\u1ec7u b\u1ecb ransomware m\u00e3 h\u00f3a.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng li\u00ean quan \u0111\u1ebfn vi\u1ec7c k\u1ebb t\u1ea5n c\u00f4ng c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0o m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u00e1nh c\u1eafp th\u00f4ng tin, l\u00e0m h\u1ecfng t\u1ec7p ho\u1eb7c ki\u1ec3m so\u00e1t m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">C\u00f3 m\u1ed9t s\u1ed1 lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, nh\u01b0ng ph\u1ed5 bi\u1ebfn nh\u1ea5t l\u00e0:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Virus: ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i t\u1ef1 sao ch\u00e9p v\u00e0 l\u00e2y lan sang c\u00e1c m\u00e1y t\u00ednh kh\u00e1c.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">S\u00e2u: ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e2y lan qua m\u1ea1ng.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p: Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i thu th\u1eadp th\u00f4ng tin v\u1ec1 n\u1ea1n nh\u00e2n m\u00e0 h\u1ecd kh\u00f4ng h\u1ec1 hay bi\u1ebft.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m qu\u1ea3ng c\u00e1o: ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i hi\u1ec3n th\u1ecb qu\u1ea3ng c\u00e1o tr\u00ean m\u00e1y t\u00ednh c\u1ee7a n\u1ea1n nh\u00e2n.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n: ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i m\u00e3 h\u00f3a c\u00e1c t\u1eadp tin c\u1ee7a n\u1ea1n nh\u00e2n v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 gi\u1ea3i m\u00e3.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, c\u00e1c c\u00f4ng ty ph\u1ea3i c\u00f3 bi\u1ec7n ph\u00e1p ph\u00f2ng th\u1ee7 an ninh m\u1ea1ng m\u1ea1nh m\u1ebd. H\u1ecd c\u0169ng n\u00ean th\u01b0\u1eddng xuy\u00ean qu\u00e9t m\u1ea1ng c\u1ee7a m\u00ecnh \u0111\u1ec3 t\u00ecm ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 x\u00f3a ph\u1ea7n m\u1ec1m \u0111\u00f3 n\u1ebfu t\u00ecm th\u1ea5y.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng ki\u1ec3u trung gian<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">T\u1ea5n c\u00f4ng man-in-the-middle l\u00e0 m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng trong \u0111\u00f3 k\u1ebb t\u1ea5n c\u00f4ng ch\u1eb7n giao ti\u1ebfp gi\u1eefa hai b\u00ean. K\u1ebb t\u1ea5n c\u00f4ng sau \u0111\u00f3 c\u00f3 th\u1ec3 nghe l\u00e9n cu\u1ed9c tr\u00f2 chuy\u1ec7n ho\u1eb7c s\u1eeda \u0111\u1ed5i tin nh\u1eafn \u0111\u00e3 g\u1eedi.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng trung gian, c\u00e1c c\u00f4ng ty ph\u1ea3i s\u1eed d\u1ee5ng m\u00e3 h\u00f3a khi giao ti\u1ebfp. H\u1ecd c\u0169ng n\u00ean x\u00e1c minh danh t\u00ednh c\u1ee7a ng\u01b0\u1eddi m\u00e0 h\u1ecd \u0111ang giao ti\u1ebfp v\u00e0 nghi ng\u1edd nh\u1eefng thay \u0111\u1ed5i b\u1ea5t ng\u1edd trong giao ti\u1ebfp.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Vi ph\u1ea1m d\u1eef li\u1ec7u<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Vi ph\u1ea1m d\u1eef li\u1ec7u l\u00e0 m\u1ed9t lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng li\u00ean quan \u0111\u1ebfn vi\u1ec7c truy c\u1eadp d\u1eef li\u1ec7u tr\u00e1i ph\u00e9p. Vi ph\u1ea1m d\u1eef li\u1ec7u c\u00f3 th\u1ec3 x\u1ea3y ra khi tin t\u1eb7c truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a c\u00f4ng ty ho\u1eb7c nh\u00e2n vi\u00ean v\u00f4 t\u00ecnh l\u00e0m l\u1ed9 d\u1eef li\u1ec7u.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 ng\u0103n ch\u1eb7n vi ph\u1ea1m d\u1eef li\u1ec7u, c\u00e1c c\u00f4ng ty ph\u1ea3i c\u00f3 bi\u1ec7n ph\u00e1p ph\u00f2ng th\u1ee7 an ninh m\u1ea1ng m\u1ea1nh m\u1ebd. H\u1ecd c\u0169ng n\u00ean gi\u00e1m s\u00e1t h\u1ec7 th\u1ed1ng c\u1ee7a m\u00ecnh \u0111\u1ec3 ph\u00e1t hi\u1ec7n ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd v\u00e0 c\u00f3 k\u1ebf ho\u1ea1ch \u1ee9ng ph\u00f3 v\u1edbi vi ph\u1ea1m d\u1eef li\u1ec7u.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111ang ng\u00e0y c\u00e0ng tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n. C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng s\u1ebd tr\u1edf n\u00ean tinh vi v\u00e0 mang t\u00ednh ph\u00e1 ho\u1ea1i h\u01a1n khi th\u1ebf gi\u1edbi ng\u00e0y c\u00e0ng k\u1ebft n\u1ed1i h\u01a1n. \u0110i\u1ec1u c\u1ea7n thi\u1ebft l\u00e0 c\u00e1c c\u00f4ng ty ph\u1ea3i hi\u1ec3u c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng kh\u00e1c nhau v\u00e0 c\u00e1ch ng\u0103n ch\u1eb7n ch\u00fang. B\u1eb1ng c\u00e1ch hi\u1ec3u c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t, c\u00e1c c\u00f4ng ty c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda n\u00e0y.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>T\u1ed9i ph\u1ea1m m\u1ea1ng \u0111ang gia t\u0103ng v\u00e0 c\u00e1c doanh nghi\u1ec7p \u0111ang m\u1ea5t h\u00e0ng t\u1ef7 \u0111\u00f4 la. \u0110\u1ec3 chi\u1ebfn th\u1eafng trong cu\u1ed9c chi\u1ebfn ch\u1ed1ng l\u1ea1i t\u1ed9i ph\u1ea1m m\u1ea1ng, c\u00e1c c\u00f4ng ty ph\u1ea3i hi\u1ec3u c\u00e1ch h\u1ecd b\u1ecb t\u1ea5n c\u00f4ng. Sau \u0111\u00e2y l\u00e0\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">C\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t \u0111\u1ed1i v\u1edbi doanh nghi\u1ec7p v\u00e0 c\u00e1ch tr\u00e1nh ch\u00fang<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":165,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them | Security Briefing<\/title>\n<meta name=\"description\" content=\"Learn about the most common types of cyber attacks and how you can protect yourself or your business from them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Learn about the most common types of cyber attacks and how you can protect yourself or your business from them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-16T23:09:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"396\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them\",\"datePublished\":\"2022-06-16T23:09:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/\"},\"wordCount\":772,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/\",\"name\":\"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg\",\"datePublished\":\"2022-06-16T23:09:00+00:00\",\"description\":\"Learn about the most common types of cyber attacks and how you can protect yourself or your business from them.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg\",\"width\":640,\"height\":396,\"caption\":\"The Most Widespread Types of Cyber Attacks and How to Avoid Them\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00e1c Lo\u1ea1i T\u1ea5n C\u00f4ng M\u1ea1ng Ph\u1ed5 Bi\u1ebfn Nh\u1ea5t \u0110\u1ed1i V\u1edbi Doanh Nghi\u1ec7p v\u00e0 C\u00e1ch Tr\u00e1nh Ch\u00fang | B\u00e1o C\u00e1o An Ninh","description":"T\u00ecm hi\u1ec3u v\u1ec1 c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t v\u00e0 c\u00e1ch b\u1ea1n c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n ho\u1eb7c doanh nghi\u1ec7p c\u1ee7a m\u00ecnh kh\u1ecfi ch\u00fang.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung\/","og_locale":"vi_VN","og_type":"article","og_title":"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them | Security Briefing","og_description":"Learn about the most common types of cyber attacks and how you can protect yourself or your business from them.","og_url":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/cac-loai-tan-cong-mang-pho-bien-nhat-doi-voi-doanh-nghiep-va-cach-tranh-chung\/","og_site_name":"Security Briefing","article_published_time":"2022-06-16T23:09:00+00:00","og_image":[{"width":640,"height":396,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"4 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them","datePublished":"2022-06-16T23:09:00+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/"},"wordCount":772,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg","articleSection":["Cyber Attacks"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/","name":"C\u00e1c Lo\u1ea1i T\u1ea5n C\u00f4ng M\u1ea1ng Ph\u1ed5 Bi\u1ebfn Nh\u1ea5t \u0110\u1ed1i V\u1edbi Doanh Nghi\u1ec7p v\u00e0 C\u00e1ch Tr\u00e1nh Ch\u00fang | B\u00e1o C\u00e1o An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg","datePublished":"2022-06-16T23:09:00+00:00","description":"T\u00ecm hi\u1ec3u v\u1ec1 c\u00e1c lo\u1ea1i t\u1ea5n c\u00f4ng m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t v\u00e0 c\u00e1ch b\u1ea1n c\u00f3 th\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n ho\u1eb7c doanh nghi\u1ec7p c\u1ee7a m\u00ecnh kh\u1ecfi ch\u00fang.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/The-Most-Widespread-Types-of-Cyber-Attacks-and-How-to-Avoid-Them-min.jpg","width":640,"height":396,"caption":"The Most Widespread Types of Cyber Attacks and How to Avoid Them"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/the-most-widespread-types-of-cyber-attacks-against-businesses-and-how-to-avoid-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The Most Widespread Types of Cyber Attacks Against Businesses and How to Avoid Them"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1822"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/165"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}