{"id":2820,"date":"2024-10-09T23:10:25","date_gmt":"2024-10-09T23:10:25","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2820"},"modified":"2024-10-09T23:18:25","modified_gmt":"2024-10-09T23:18:25","slug":"nguy-co-spam","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/thu-rac\/nguy-co-spam\/","title":{"rendered":"R\u1ee7i ro th\u01b0 r\u00e1c"},"content":{"rendered":"<p>R\u1ee7i ro c\u1ee7a th\u01b0 r\u00e1c l\u00e0 kh\u1ea3 n\u0103ng c\u00f3 email \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 g\u00e2y h\u1ea1i khi m\u1edf, th\u01b0\u1eddng \u0111\u01b0\u1ee3c g\u1eedi qua m\u1ed9t s\u1ed1 h\u00ecnh th\u1ee9c giao ti\u1ebfp. Ch\u00fang \u0111\u01b0\u1ee3c g\u1eedi h\u00e0ng lo\u1ea1t v\u00e0 \u0111\u1ebfn m\u1ed9t ng\u01b0\u1eddi m\u00e0 kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p. Th\u01b0 r\u00e1c c\u00f3 nhi\u1ec1u d\u1ea1ng, trong \u0111\u00f3 th\u01b0 r\u00e1c email l\u00e0 d\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t. N\u00f3 th\u01b0\u1eddng l\u00e0m tr\u00e0n ng\u1eadp h\u1ed9p th\u01b0 \u0111\u1ebfn b\u1eb1ng c\u00e1c tin nh\u1eafn qu\u1ea3ng c\u00e1o s\u1ea3n ph\u1ea9m \u0111\u00e1ng ng\u1edd, l\u1eeba \u0111\u1ea3o ho\u1eb7c c\u00e1c n\u1ed7 l\u1ef1c l\u1eeba \u0111\u1ea3o.<\/p>\n\n\n\n<p>Trong khi th\u01b0 r\u00e1c SMS bao g\u1ed3m c\u00e1c tin nh\u1eafn v\u0103n b\u1ea3n kh\u00f4ng mong mu\u1ed1n, th\u01b0\u1eddng li\u00ean k\u1ebft \u0111\u1ebfn c\u00e1c trang web \u0111\u1ed9c h\u1ea1i ho\u1eb7c c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh gian l\u1eadn, th\u00ec robocall l\u00e0 c\u00e1c cu\u1ed9c g\u1ecdi \u0111i\u1ec7n tho\u1ea1i t\u1ef1 \u0111\u1ed9ng \u0111\u01b0\u1ee3c ghi \u00e2m tr\u01b0\u1edbc nh\u1eb1m m\u1ee5c \u0111\u00edch b\u00e1n s\u1ea3n ph\u1ea9m ho\u1eb7c l\u1eeba \u0111\u1ea3o m\u1ecdi ng\u01b0\u1eddi. R\u1ee7i ro th\u01b0 r\u00e1c kh\u00f4ng ch\u1ec9 li\u00ean quan \u0111\u1ebfn s\u1ef1 phi\u1ec1n to\u00e1i m\u00e0 c\u00f2n c\u00f3 th\u1ec3 d\u1eabn \u0111\u1ebfn c\u00e1c v\u1ea5n \u0111\u1ec1 kh\u00e1c, ch\u1eb3ng h\u1ea1n nh\u01b0 l\u1eeba \u0111\u1ea3o, nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0 gian l\u1eadn.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"types-of-spam-and-the-relative-risks\">C\u00e1c lo\u1ea1i th\u01b0 r\u00e1c v\u00e0 r\u1ee7i ro t\u01b0\u01a1ng \u0111\u1ed1i<\/h3>\n\n\n<p>Th\u01b0 r\u00e1c c\u00f3 nhi\u1ec1u h\u00ecnh th\u1ee9c, m\u1ed7i h\u00ecnh th\u1ee9c \u0111\u1ec1u c\u00f3 r\u1ee7i ro ri\u00eang. C\u00f3 l\u1ebd h\u00ecnh th\u1ee9c l\u00e2u \u0111\u1eddi nh\u1ea5t l\u00e0 qu\u1ea3ng c\u00e1o th\u01b0 r\u00e1c, v\u1edbi c\u00e1c qu\u1ea3ng c\u00e1o kh\u00f4ng \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u qua email, tin nh\u1eafn ho\u1eb7c \u0111i\u1ec7n tho\u1ea1i. Trong khi m\u1ed9t s\u1ed1 l\u00e0 doanh nghi\u1ec7p h\u1ee3p ph\u00e1p, nh\u1eefng doanh nghi\u1ec7p kh\u00e1c c\u00f3 th\u1ec3 qu\u1ea3ng b\u00e1 c\u00e1c s\u1ea3n ph\u1ea9m m\u1edd \u00e1m, giao d\u1ecbch gi\u1ea3 m\u1ea1o ho\u1eb7c th\u1eadm ch\u00ed l\u00e0 l\u1eeba \u0111\u1ea3o tr\u1eafng tr\u1ee3n c\u00f3 th\u1ec3 t\u1ea1o ra r\u1ee7i ro t\u00e0i ch\u00ednh cho nh\u1eefng ng\u01b0\u1eddi tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a c\u00e1c th\u1ee7 \u0111o\u1ea1n c\u1ee7a ch\u00fang \u0111\u1ec3 mua c\u00e1c s\u1ea3n ph\u1ea9m k\u00e9m ch\u1ea5t l\u01b0\u1ee3ng ho\u1eb7c c\u00e1c s\u1ea3n ph\u1ea9m kh\u00f4ng h\u1ec1 t\u1ed3n t\u1ea1i. H\u01a1n n\u1eefa, vi\u1ec7c tr\u1ea3 l\u1eddi c\u00e1c tin nh\u1eafn \u0111\u00f3 c\u00f3 th\u1ec3 gi\u00fap nh\u1eefng k\u1ebb g\u1eedi th\u01b0 r\u00e1c x\u00e1c nh\u1eadn danh b\u1ea1, do \u0111\u00f3 d\u1eabn \u0111\u1ebfn nhi\u1ec1u th\u01b0 r\u00e1c h\u01a1n.<\/p>\n\n\n\n<p>Th\u01b0 r\u00e1c l\u1eeba \u0111\u1ea3o v\u00e0 gian l\u1eadn nh\u1eb1m m\u1ee5c \u0111\u00edch \u0111\u00e1nh l\u1eeba ng\u01b0\u1eddi nh\u1eadn v\u1ec1 m\u1ee9c \u0111\u1ed9 nh\u1ea1y c\u1ea3m c\u1ee7a th\u00f4ng tin \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u\u2014th\u01b0\u1eddng l\u00e0 m\u1eadt kh\u1ea9u ho\u1eb7c s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng. Ch\u00fang th\u01b0\u1eddng tr\u1ea3 l\u1eddi d\u01b0\u1edbi d\u1ea1ng m\u1ed9t s\u1ed1 ng\u00e2n h\u00e0ng ho\u1eb7c c\u01a1 quan ch\u00ednh ph\u1ee7, nh\u01b0ng vi\u1ec7c tr\u1ea3 l\u1eddi ch\u00fang c\u00f3 nguy c\u01a1 b\u1ecb \u0111\u00e1nh c\u1eafp danh t\u00ednh, m\u1ea5t m\u00e1t t\u00e0i ch\u00ednh v\u00e0 truy c\u1eadp tr\u00e1i ph\u00e9p v\u00e0o t\u00e0i kho\u1ea3n c\u00e1 nh\u00e2n, nh\u01b0 \u0111\u00e3 n\u00eau trong <a href=\"https:\/\/www.ic3.gov\/Home\/ComplaintChoice\">C\u1ee5c \u0111i\u1ec1u tra li\u00ean bang<\/a> V\u00e0 <a href=\"https:\/\/knowledge.broadcom.com\/external\/article\/162064\/does-endpoint-protection-defend-against.html\">Symantec<\/a>.<\/p>\n\n\n\n<p>Th\u01b0 r\u00e1c ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i bao g\u1ed3m c\u00e1c tin nh\u1eafn c\u00f3 t\u1ec7p \u0111\u00ednh k\u00e8m ho\u1eb7c li\u00ean k\u1ebft \u0111\u1ed9c h\u1ea1i \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m c\u00f3 h\u1ea1i v\u00e0o h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh c\u1ee7a ng\u01b0\u1eddi nh\u1eadn. Ph\u1ea7n m\u1ec1m c\u00f3 th\u1ec3 l\u00e0 b\u1ea5t k\u1ef3 d\u1ea1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0o \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1ea5n c\u00f4ng ng\u01b0\u1eddi nh\u1eadn email \u0111\u00e3 m\u1edf, d\u1eabn \u0111\u1ebfn c\u00e1c r\u1ee7i ro ti\u1ec1m \u1ea9n nh\u01b0 vi ph\u1ea1m d\u1eef li\u1ec7u, m\u1ea5t th\u00f4ng tin c\u00e1 nh\u00e2n ho\u1eb7c truy c\u1eadp tr\u00e1i ph\u00e9p v\u00e0o h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh, nh\u01b0 \u0111\u01b0\u1ee3c m\u00f4 t\u1ea3 b\u1edfi <a href=\"https:\/\/us.norton.com\/blog\/emerging-threats\/malware\">Norton<\/a> V\u00e0 <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/malware-classifications\">Kaspersky<\/a>.<\/p>\n\n\n\n<p>Th\u01b0 r\u00e1c l\u1eeba \u0111\u1ea3o th\u01b0\u1eddng ch\u1ee9a c\u00e1c \u01b0u \u0111\u00e3i nghe c\u00f3 v\u1ebb qu\u00e1 t\u1ed1t \u0111\u1ec3 c\u00f3 th\u1ec3 l\u00e0 s\u1ef1 th\u1eadt: tr\u00fang s\u1ed1, vay ti\u1ec1n kh\u00f4ng c\u1ea7n t\u00edn d\u1ee5ng v\u00e0 s\u1ed1 ti\u1ec1n l\u1edbn t\u1eeb c\u00e1c nh\u00e0 t\u00e0i tr\u1ee3 kh\u00f4ng x\u00e1c \u0111\u1ecbnh, c\u00f9ng nhi\u1ec1u h\u00ecnh th\u1ee9c kh\u00e1c. M\u1ed9t s\u1ed1 c\u00e1 nh\u00e2n v\u00f4 t\u00ecnh tham gia v\u00e0o c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh r\u1eeda ti\u1ec1n m\u00e0 kh\u00f4ng nh\u1eadn ra. M\u1ed9t c\u00e1 nh\u00e2n theo d\u00f5i c\u00e1c v\u1ee5 l\u1eeba \u0111\u1ea3o n\u00e0y r\u1ea5t c\u00f3 th\u1ec3 s\u1ebd ph\u1ea3i ch\u1ecbu t\u1ed5n th\u1ea5t v\u1ec1 ti\u1ec1n b\u1ea1c, c\u00e1c v\u1ea5n \u0111\u1ec1 ph\u00e1p l\u00fd v\u00e0 r\u00f2 r\u1ec9 quy\u1ec1n ri\u00eang t\u01b0, nh\u01b0 \u0111\u00e3 th\u1ea3o lu\u1eadn trong <a href=\"https:\/\/www.bbb.org\/scamtracker\">V\u0103n ph\u00f2ng Kinh doanh T\u1ed1t h\u01a1n<\/a> v\u00e0 FTC.<\/p>\n\n\n\n<p>Bot spam l\u00e0 c\u00e1c \u1ee9ng d\u1ee5ng t\u1ef1 \u0111\u1ed9ng ph\u00e2n ph\u1ed1i th\u01b0 r\u00e1c tr\u00ean c\u00e1c ph\u1ea7n b\u00ecnh lu\u1eadn, n\u1ec1n t\u1ea3ng truy\u1ec1n th\u00f4ng x\u00e3 h\u1ed9i v\u00e0 di\u1ec5n \u0111\u00e0n th\u1ea3o lu\u1eadn tr\u00ean internet. C\u00e1c bot nh\u01b0 v\u1eady th\u01b0\u1eddng ph\u00e1 h\u1ecfng c\u1ed9ng \u0111\u1ed3ng tr\u1ef1c tuy\u1ebfn, ph\u00e1t t\u00e1n ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i, l\u00e0m gi\u1ea3m tr\u1ea3i nghi\u1ec7m c\u1ee7a ng\u01b0\u1eddi d\u00f9ng tr\u00ean nhi\u1ec1u n\u1ec1n t\u1ea3ng, l\u00e0m r\u1ed1i lo\u1ea1n ph\u00e2n t\u00edch d\u1eef li\u1ec7u v\u00e0 l\u00e0m gi\u1ea3m uy t\u00edn c\u1ee7a c\u00e1c d\u1ecbch v\u1ee5 tr\u1ef1c tuy\u1ebfn.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"impact-of-risk-for-spam\">T\u00e1c \u0111\u1ed9ng c\u1ee7a r\u1ee7i ro \u0111\u1ed1i v\u1edbi th\u01b0 r\u00e1c<\/h3>\n\n\n<p>R\u1ee7i ro th\u01b0 r\u00e1c khi\u1ebfn m\u1ed9t ng\u01b0\u1eddi ph\u1ea3i ch\u1ecbu r\u1ea5t nhi\u1ec1u r\u1ee7i ro, d\u00f9 l\u00e0 c\u00e1 nh\u00e2n hay t\u1ed5 ch\u1ee9c. V\u1ec1 m\u1eb7t t\u00e0i ch\u00ednh, \u0111i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 l\u00e0 k\u1ebft qu\u1ea3 c\u1ee7a th\u01b0 r\u00e1c, \u0111\u1eb7c bi\u1ec7t l\u00e0 d\u01b0\u1edbi h\u00ecnh th\u1ee9c l\u1eeba \u0111\u1ea3o v\u00e0 gian l\u1eadn. C\u00e1c doanh nghi\u1ec7p \u0111ang m\u1ea5t h\u00e0ng t\u1ef7 \u0111\u00f4 la m\u1ed7i n\u0103m ch\u1ec9 v\u00ec l\u1eeba \u0111\u1ea3o. C\u00e1c tr\u01b0\u1eddng h\u1ee3p gian l\u1eadn gi\u1eefa c\u00e1c c\u00e1 nh\u00e2n c\u00f3 th\u1ec3 ph\u00e1t sinh t\u1eeb vi\u1ec7c mua h\u00e0ng gian l\u1eadn, tr\u1ed9m c\u1eafp danh t\u00ednh v\u00e0 c\u00e1c tr\u00f2 gian l\u1eadn kh\u00e1c. \u0110i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c ch\u1ee9ng minh trong c\u00e1c b\u00e1o c\u00e1o vi ph\u1ea1m d\u1eef li\u1ec7u c\u1ee7a <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon<\/a> V\u00e0 <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">IBM<\/a>.<\/p>\n\n\n\n<p>\u0110\u1ed1i v\u1edbi doanh nghi\u1ec7p, th\u01b0 r\u00e1c c\u00f3 th\u1ec3 g\u00e2y t\u1ed5n h\u1ea1i s\u00e2u s\u1eafc \u0111\u1ebfn n\u0103ng su\u1ea5t. Nh\u00e2n vi\u00ean c\u00f3 xu h\u01b0\u1edbng m\u1ea5t th\u1eddi gian qu\u1ea3n l\u00fd email r\u00e1c, chuy\u1ec3n h\u01b0\u1edbng v\u00e0 l\u1ecdc t\u00e0i nguy\u00ean c\u1ee7a h\u1ecd sang qu\u1ea3n l\u00fd th\u01b0 r\u00e1c, l\u00e0m gi\u1ea3m hi\u1ec7u qu\u1ea3 v\u00e0 t\u1ed1c \u0111\u1ed9 chung c\u1ee7a doanh nghi\u1ec7p. C\u00e1c nghi\u00ean c\u1ee9u c\u1ee7a <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/mckinsey-technology\/overview\/cybersecurity\">McKinsey &amp; C\u00f4ng ty<\/a> V\u00e0 <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/04-12-2023-gartner-identifies-the-top-cybersecurity-trends-for-2023\">Gartner<\/a> \u0111\u00e3 n\u00eau b\u1eadt t\u00ecnh tr\u1ea1ng m\u1ea5t n\u0103ng su\u1ea5t \u0111\u00e1ng k\u1ec3 do c\u00e1c m\u1ed1i \u0111e d\u1ecda an ninh m\u1ea1ng li\u00ean quan \u0111\u1ebfn th\u01b0 r\u00e1c.<\/p>\n\n\n\n<p>\u1ede c\u1ea5p \u0111\u1ed9 c\u00e1 nh\u00e2n h\u01a1n, vi\u1ec7c li\u00ean t\u1ee5c b\u1ecb t\u1ea5n c\u00f4ng b\u1edfi c\u00e1c tin nh\u1eafn r\u00e1c c\u0169ng c\u00f3 th\u1ec3 g\u00e2y ra t\u1ed5n h\u1ea1i v\u1ec1 m\u1eb7t t\u00e2m l\u00fd. Ng\u01b0\u1eddi nh\u1eadn s\u1ebd c\u1ea3m th\u1ea5y cho\u00e1ng ng\u1ee3p, c\u0103ng th\u1eb3ng v\u00e0 v\u00f4 c\u00f9ng lo l\u1eafng khi b\u1ecb ng\u1eadp trong nh\u1eefng email nh\u01b0 th\u1ebf n\u00e0y, \u0111\u00f4i khi l\u1eb7p \u0111i l\u1eb7p l\u1ea1i v\u1edbi m\u1ecdi n\u1ed7 l\u1ef1c l\u1eeba \u0111\u1ea3o ho\u1eb7c cu\u1ed9c g\u1ecdi l\u1eeba \u0111\u1ea3o.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"spam-risk-mitigation-strategies\">Chi\u1ebfn l\u01b0\u1ee3c gi\u1ea3m thi\u1ec3u r\u1ee7i ro th\u01b0 r\u00e1c<\/h3>\n\n\n<p>V\u00ec th\u01b0 r\u00e1c r\u1ea5t ph\u1ed5 bi\u1ebfn n\u00ean c\u1ea7n ph\u1ea3i \u00e1p d\u1ee5ng c\u00e1c chi\u1ebfn l\u01b0\u1ee3c hi\u1ec7u qu\u1ea3 \u0111\u1ec3 gi\u1ea3m thi\u1ec3u r\u1ee7i ro do th\u01b0 r\u00e1c g\u00e2y ra. M\u1ed9t s\u1ed1 chi\u1ebfn l\u01b0\u1ee3c v\u00e0 k\u1ef9 thu\u1eadt ch\u00ednh bao g\u1ed3m b\u1ed9 l\u1ecdc th\u01b0 r\u00e1c, c\u00f3 th\u1ec3 gi\u00fap gi\u1ea3m th\u01b0 r\u00e1c. H\u1ea7u h\u1ebft c\u00e1c nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 email \u0111\u1ec1u bao g\u1ed3m ch\u1ee9c n\u0103ng ph\u00e1t hi\u1ec7n v\u00e0 l\u1ecdc t\u1ef1 \u0111\u1ed9ng v\u1edbi c\u00e1c b\u1ed9 l\u1ecdc t\u00edch h\u1ee3p c\u1ee7a h\u1ecd. B\u1ed9 l\u1ecdc c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c \u0111i\u1ec1u ch\u1ec9nh \u0111\u1ec3 \u0111\u00e1p \u1ee9ng nhu c\u1ea7u c\u1ee7a ng\u01b0\u1eddi d\u00f9ng ho\u1eb7c \u0111\u1ec3 ph\u1ea3n \u00e1nh th\u01b0 r\u00e1c \u0111\u01b0\u1ee3c ng\u01b0\u1eddi d\u00f9ng l\u1ecdc nhi\u1ec1u nh\u1ea5t, nh\u01b0 \u0111\u00e3 gi\u1ea3i th\u00edch b\u1edfi <a href=\"https:\/\/support.microsoft.com\/en-au\/office\/filter-junk-email-and-spam-in-outlook-db786e79-54e2-40cc-904f-d89d57b7f41d\">Microsoft<\/a> V\u00e0 <a href=\"https:\/\/support.google.com\/a\/answer\/2368132?hl=en\">Google<\/a>.<\/p>\n\n\n\n<p>M\u1ed9t bi\u1ec7n ph\u00e1p quan tr\u1ecdng kh\u00e1c l\u00e0 gi\u00e1o d\u1ee5c ng\u01b0\u1eddi d\u00f9ng v\u1ec1 c\u00e1c lo\u1ea1i th\u01b0 r\u00e1c kh\u00e1c nhau \u0111ang \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng. V\u1edbi ki\u1ebfn th\u1ee9c n\u00e0y, ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 th\u1eadn tr\u1ecdng h\u01a1n v\u00e0 tr\u00e1nh r\u01a1i v\u00e0o c\u00e1c v\u1ee5 l\u1eeba \u0111\u1ea3o v\u00e0 k\u1ef9 thu\u1eadt l\u1eeba \u0111\u1ea3o ng\u00e0y c\u00e0ng gia t\u0103ng. C\u00e1c t\u1ed5 ch\u1ee9c c\u00f3 th\u1ec3 tri\u1ec3n khai c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh \u0111\u00e0o t\u1ea1o cho nh\u00e2n vi\u00ean v\u1ec1 c\u00e1ch x\u00e1c \u0111\u1ecbnh v\u00e0 \u1ee9ng ph\u00f3 v\u1edbi th\u01b0 r\u00e1c, \u0111i\u1ec1u n\u00e0y s\u1ebd gi\u00fap gi\u1ea3m thi\u1ec3u r\u1ee7i ro. T\u00e0i nguy\u00ean t\u1eeb <a href=\"https:\/\/www.knowbe4.com\/\">Bi\u1ebftBe4<\/a> v\u00e0 <a href=\"https:\/\/staysafeonline.org\/about-us\/\">Li\u00ean minh an ninh m\u1ea1ng qu\u1ed1c gia<\/a> cung c\u1ea5p h\u01b0\u1edbng d\u1eabn c\u00f3 gi\u00e1 tr\u1ecb v\u1ec1 gi\u00e1o d\u1ee5c ng\u01b0\u1eddi d\u00f9ng v\u1ec1 an ninh m\u1ea1ng.<\/p>\n\n\n\n<p>X\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 b\u1ed5 sung th\u00eam m\u1ed9t l\u1edbp b\u1ea3o m\u1eadt, gi\u1ea3m thi\u1ec3u kh\u1ea3 n\u0103ng truy c\u1eadp tr\u00e1i ph\u00e9p ngay c\u1ea3 khi m\u1eadt kh\u1ea9u b\u1ecb l\u1ea5y th\u00f4ng qua l\u1eeba \u0111\u1ea3o. NIST v\u00e0 CISA cung c\u1ea5p th\u00eam th\u00f4ng tin chi ti\u1ebft v\u1ec1 x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-future-of-spam-risk-management\">T\u01b0\u01a1ng lai c\u1ee7a Qu\u1ea3n l\u00fd r\u1ee7i ro th\u01b0 r\u00e1c<\/h3>\n\n\n<p>Khi c\u00f4ng ngh\u1ec7 ti\u1ebfn b\u1ed9, c\u00e1c ph\u01b0\u01a1ng ph\u00e1p m\u00e0 nh\u1eefng k\u1ebb g\u1eedi th\u01b0 r\u00e1c s\u1eed d\u1ee5ng c\u0169ng s\u1ebd ti\u1ebfn b\u1ed9. M\u1ed7i ng\u00e0y, tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o v\u00e0 m\u00e1y h\u1ecdc \u0111ang \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u01b0a ra c\u00e1c k\u1ef9 thu\u1eadt l\u1eeba \u0111\u1ea3o tinh vi. \u0110\u1ed3ng th\u1eddi, c\u00e1c c\u00f4ng ngh\u1ec7 n\u00e0y \u0111ang gi\u00fap ph\u00e1t tri\u1ec3n c\u00e1c c\u00f4ng c\u1ee5 hi\u1ec7u qu\u1ea3 \u0111\u1ec3 ph\u00e1t hi\u1ec7n v\u00e0 ng\u0103n ch\u1eb7n th\u01b0 r\u00e1c, nh\u01b0 \u0111\u00e3 th\u1ea3o lu\u1eadn b\u1edfi <a href=\"https:\/\/openai.com\/index\/spam-detection-in-the-physical-world\">IBM<\/a> V\u00e0 <a href=\"https:\/\/answers.microsoft.com\/en-us\/outlook_com\/forum\/all\/unwanted-spam\/d87cd16b-def7-4099-be38-b18266245049\">Microsoft<\/a>.<\/p>\n\n\n\n<p>C\u00f4ng ngh\u1ec7 Blockchain c\u0169ng \u0111\u00f3ng vai tr\u00f2 quan tr\u1ecdng trong vi\u1ec7c gi\u1ea3m thi\u1ec3u r\u1ee7i ro th\u01b0 r\u00e1c nh\u1edd c\u00e1c t\u00ednh n\u0103ng b\u1ea3o m\u1eadt c\u1ee7a n\u00f3. N\u00f3 gi\u00fap duy tr\u00ec t\u00ednh to\u00e0n v\u1eb9n c\u1ee7a tin nh\u1eafn v\u00e0 d\u1eef li\u1ec7u ng\u01b0\u1eddi d\u00f9ng, do \u0111\u00f3 ng\u0103n ch\u1eb7n vi\u1ec7c khai th\u00e1c c\u1ee7a nh\u1eefng k\u1ebb g\u1eedi th\u01b0 r\u00e1c. <a href=\"https:\/\/www.accenture.com\/us-en\/insights\/blockchain-index\">Accenture<\/a> V\u00e0 <a href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/consulting\/topics\/blockchain.html\">Deloitte<\/a> cung c\u1ea5p th\u00f4ng tin chi ti\u1ebft v\u1ec1 c\u00e1ch blockchain c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c t\u1eadn d\u1ee5ng \u0111\u1ec3 n\u00e2ng cao kh\u1ea3 n\u0103ng qu\u1ea3n l\u00fd th\u01b0 r\u00e1c.<\/p>\n\n\n\n<p>Cu\u1ed1i c\u00f9ng, r\u1ee7i ro th\u01b0 r\u00e1c v\u1eabn l\u00e0 m\u1ed9t trong nh\u1eefng t\u00e1c \u0111\u1ed9ng l\u1edbn nh\u1ea5t trong th\u1ebf gi\u1edbi k\u1ef9 thu\u1eadt s\u1ed1 c\u1ee7a ch\u00fang ta, \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn c\u1ea3 c\u00e1 nh\u00e2n v\u00e0 t\u1ed5 ch\u1ee9c. B\u1eb1ng c\u00e1ch hi\u1ec3u c\u00e1c h\u00ecnh th\u1ee9c kh\u00e1c nhau v\u00e0 r\u1ee7i ro li\u00ean quan v\u00e0 s\u1eed d\u1ee5ng c\u00e1c chi\u1ebfn l\u01b0\u1ee3c gi\u1ea3m thi\u1ec3u hi\u1ec7u qu\u1ea3, ch\u00fang ta c\u00f3 th\u1ec3 tr\u00e1nh \u0111\u01b0\u1ee3c t\u00e1c h\u1ea1i ti\u1ec1m \u1ea9n t\u1eeb th\u01b0 r\u00e1c. Khi c\u00f4ng ngh\u1ec7 ti\u1ebfp t\u1ee5c ph\u00e1t tri\u1ec3n, nh\u1eefng c\u00e1ch t\u1ed1t h\u01a1n \u0111\u1ec3 ch\u1ed1ng th\u01b0 r\u00e1c s\u1ebd xu\u1ea5t hi\u1ec7n, mang l\u1ea1i hy v\u1ecdng cho m\u1ed9t th\u1ebf gi\u1edbi k\u1ef9 thu\u1eadt s\u1ed1 an to\u00e0n h\u01a1n v\u00e0 \u00edt l\u1ed9n x\u1ed9n h\u01a1n.<\/p>","protected":false},"excerpt":{"rendered":"<p>R\u1ee7i ro c\u1ee7a th\u01b0 r\u00e1c l\u00e0 kh\u1ea3 n\u0103ng c\u00f3 email \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 g\u00e2y h\u1ea1i khi m\u1edf, th\u01b0\u1eddng \u0111\u01b0\u1ee3c g\u1eedi qua m\u1ed9t s\u1ed1 h\u00ecnh th\u1ee9c giao ti\u1ebfp. Ch\u00fang \u0111\u01b0\u1ee3c g\u1eedi h\u00e0ng lo\u1ea1t v\u00e0 ti\u1ebfp c\u1eadn\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/thu-rac\/nguy-co-spam\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">R\u1ee7i ro th\u01b0 r\u00e1c<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2821,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-2820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spam","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spam Risk | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/thu-rac\/nguy-co-spam\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spam Risk | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The risk of spam is the potential for malicious emails that could be harmful when opened, typically sent through some form of communication. They are sent in bulk and reach&hellip; Continue reading Spam Risk\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/thu-rac\/nguy-co-spam\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-09T23:10:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-09T23:18:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"828\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Spam Risk\",\"datePublished\":\"2024-10-09T23:10:25+00:00\",\"dateModified\":\"2024-10-09T23:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/\"},\"wordCount\":940,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg\",\"articleSection\":[\"spam\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/\",\"url\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/\",\"name\":\"Spam Risk | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg\",\"datePublished\":\"2024-10-09T23:10:25+00:00\",\"dateModified\":\"2024-10-09T23:18:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/spam\/spam-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg\",\"width\":1600,\"height\":828,\"caption\":\"Spam Risk\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/spam\/spam-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spam Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nguy c\u01a1 Spam | T\u00f3m t\u1eaft An ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/thu-rac\/nguy-co-spam\/","og_locale":"vi_VN","og_type":"article","og_title":"Spam Risk | Security Briefing","og_description":"The risk of spam is the potential for malicious emails that could be harmful when opened, typically sent through some form of communication. They are sent in bulk and reach&hellip; Continue reading Spam Risk","og_url":"https:\/\/securitybriefing.net\/vi\/thu-rac\/nguy-co-spam\/","og_site_name":"Security Briefing","article_published_time":"2024-10-09T23:10:25+00:00","article_modified_time":"2024-10-09T23:18:25+00:00","og_image":[{"width":1600,"height":828,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"5 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Spam Risk","datePublished":"2024-10-09T23:10:25+00:00","dateModified":"2024-10-09T23:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/"},"wordCount":940,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg","articleSection":["spam"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/","url":"https:\/\/securitybriefing.net\/spam\/spam-risk\/","name":"Nguy c\u01a1 Spam | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg","datePublished":"2024-10-09T23:10:25+00:00","dateModified":"2024-10-09T23:18:25+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/spam\/spam-risk\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/10\/Spam-Risk.jpg","width":1600,"height":828,"caption":"Spam Risk"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/spam\/spam-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Spam Risk"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=2820"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2820\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/2821"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=2820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=2820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=2820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}