{"id":3358,"date":"2023-09-26T14:49:33","date_gmt":"2023-09-26T14:49:33","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=3358"},"modified":"2023-10-03T05:45:31","modified_gmt":"2023-10-03T05:45:31","slug":"high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/","title":{"rendered":"High Tech Industry Most Targeted by Cyber Attackers"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p data-sourcepos=\"3:1-3:278\">The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest <a href=\"https:\/\/secry.me\/explore\/cyber-security\/\">cyberattack <\/a>trends and techniques. It is based on data from <a href=\"https:\/\/www.fastly.com\/products\/web-application-api-protection\">Fastly&#8217;s Next-Generation Web Application Firewall<\/a> (<em>NGWAF<\/em>), which protects millions of websites and applications from attack.<\/p>\n<p data-sourcepos=\"5:1-5:458\">One of the key findings of the report is that the high tech industry is the most targeted industry by cyber attackers. This is likely due to the fact that the high tech industry is a major driver of innovation, and it is often one of the first industries to adopt new technologies. Attackers see the high tech industry as a valuable target because they know that companies in this industry are often willing to pay large ransoms to recover from cyberattacks.<\/p>\n<p data-sourcepos=\"7:1-7:314\">The report also found that the most popular attack technique used by attackers in Q2 2023 was traversal techniques. Traversal techniques allow attackers to move laterally within a network and gain access to sensitive data or systems. Other popular attack techniques included SQL injection and OS command injection.<\/p>\n<p data-sourcepos=\"9:1-9:267\">Another key finding of the report is that attackers are increasingly using automated tools to launch large-scale attacks against a wide range of targets. This suggests that it is more important than ever for organizations to have a layered security approach in place.<\/p>\n<p data-sourcepos=\"11:1-11:148\">The report concludes with a number of recommendations for how organizations can protect themselves from cyberattacks. These recommendations include:<\/p>\n<ul data-sourcepos=\"13:1-16:0\">\n<li data-sourcepos=\"13:1-13:213\"><strong>Implementing a layered security approach.<\/strong>\u00a0This includes using firewalls, intrusion detection systems, and next-generation web application firewalls (NGWAFs) to protect against a wide range of attack vectors.<\/li>\n<li data-sourcepos=\"14:1-14:193\"><strong>Keeping all software up to date.<\/strong>\u00a0This includes operating systems, applications, and security software. Attackers often exploit known vulnerabilities in software to gain access to systems.<\/li>\n<li data-sourcepos=\"15:1-16:0\"><strong>Educating employees about cybersecurity best practices.<\/strong>\u00a0This includes creating strong passwords, being wary of phishing emails, and reporting suspicious activity.<\/li>\n<\/ul>\n<p data-sourcepos=\"17:1-17:91\">In addition to the above recommendations, organizations should also consider the following:<\/p>\n<ul data-sourcepos=\"19:1-21:0\">\n<li data-sourcepos=\"19:1-19:154\"><strong>Conducting regular security assessments.<\/strong>\u00a0This will help to identify and address any security vulnerabilities before they are exploited by attackers.<\/li>\n<li data-sourcepos=\"20:1-21:0\"><strong>Having a plan for responding to cyberattacks.<\/strong>\u00a0This plan should include steps for containing the attack, investigating the incident, and recovering from the attack.<\/li>\n<\/ul>\n<p data-sourcepos=\"22:1-22:122\">By following these recommendations, organizations or can reduce their risk of being successfully attacked by cyber attackers.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from Fastly&#8217;s Next-Generation Web Application Firewall (NGWAF), which protects millions of websites and applications from attack. One of the key findings of the report is that the high tech industry [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[280,192,307,281,279,283,282],"class_list":["post-3358","post","type-post","status-publish","format-standard","has-post-thumbnail","category-cyber-security","category-news","tag-cyber-attacker","tag-cyber-security","tag-cybersecurity","tag-fastly-network","tag-high-tech-industry","tag-ngwaf","tag-waf"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>High Tech Industry Most Targeted by Cyber Attackers | SECRY<\/title>\n<meta name=\"description\" content=\"The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"High Tech Industry Most Targeted by Cyber Attackers | SECRY\" \/>\n<meta property=\"og:description\" content=\"The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T14:49:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-03T05:45:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/09\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"High Tech Industry Most Targeted by Cyber Attackers\",\"datePublished\":\"2023-09-26T14:49:33+00:00\",\"dateModified\":\"2023-10-03T05:45:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/\"},\"wordCount\":385,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png\",\"keywords\":[\"Cyber Attacker\",\"Cyber Security\",\"CyberSecurity\",\"Fastly Network\",\"High Tech Industry\",\"NGWAF\",\"WAF\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/\",\"name\":\"High Tech Industry Most Targeted by Cyber Attackers | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png\",\"datePublished\":\"2023-09-26T14:49:33+00:00\",\"dateModified\":\"2023-10-03T05:45:31+00:00\",\"description\":\"The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png\",\"width\":1280,\"height\":720,\"caption\":\"High Tech Industry Targeted by Cyber Attacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"High Tech Industry Most Targeted by Cyber Attackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"High Tech Industry Most Targeted by Cyber Attackers | SECRY","description":"The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/","og_locale":"en_US","og_type":"article","og_title":"High Tech Industry Most Targeted by Cyber Attackers | SECRY","og_description":"The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from","og_url":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-09-26T14:49:33+00:00","article_modified_time":"2023-10-03T05:45:31+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/09\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"High Tech Industry Most Targeted by Cyber Attackers","datePublished":"2023-09-26T14:49:33+00:00","dateModified":"2023-10-03T05:45:31+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/"},"wordCount":385,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png","keywords":["Cyber Attacker","Cyber Security","CyberSecurity","Fastly Network","High Tech Industry","NGWAF","WAF"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/","url":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/","name":"High Tech Industry Most Targeted by Cyber Attackers | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png","datePublished":"2023-09-26T14:49:33+00:00","dateModified":"2023-10-03T05:45:31+00:00","description":"The Fastly Network Effect Threat Report for Q2 2023 is a comprehensive overview of the latest cyberattack trends and techniques. It is based on data from","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/High-Tech-Industry-Targeted-by-Cyber-Attacker.png","width":1280,"height":720,"caption":"High Tech Industry Targeted by Cyber Attacker"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/high-tech-industry-most-targeted-by-cyber-attackers-according-to-new-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"High Tech Industry Most Targeted by Cyber Attackers"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=3358"}],"version-history":[{"count":8,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3358\/revisions"}],"predecessor-version":[{"id":3433,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3358\/revisions\/3433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/3363"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=3358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=3358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=3358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}