{"id":1455,"date":"2022-07-02T07:13:00","date_gmt":"2022-07-02T05:13:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=1455"},"modified":"2022-08-01T08:01:53","modified_gmt":"2022-08-01T06:01:53","slug":"derstandard-at-30-07-2022","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/derstandard-at-30-07-2022\/","title":{"rendered":"DerStandard.at &#8211; 30.07.2022"},"content":{"rendered":"\n<p>Nach Robo-Anrufen eines vermeintlichen &#8220;Austrian Policy Departmens&#8221; versuchen Betr\u00fcger ihr Gl\u00fcck mit gut getarnten Phishing-Mails. Giulian Guran, IT-Security Experte bei Certitude Consulting, gibt in einer <a rel=\"noreferrer noopener\" href=\"https:\/\/www.derstandard.at\/story\/2000137901324\/sie-haben-ein-neues-fax-warnung-vor-neuer-phishing-welle\" data-type=\"URL\" data-id=\"https:\/\/www.derstandard.at\/story\/2000137901324\/sie-haben-ein-neues-fax-warnung-vor-neuer-phishing-welle\" target=\"_blank\">derstandard.at-Story<\/a> Auskunft \u00fcber eine aktuelle Kampagne.<\/p>\n\n\n\n<p>Die technische Analyse im Zusammenhang mit diesem Artikel ist <a href=\"https:\/\/certitude.consulting\/blog\/de\/bypass-phishing-detections-with-google-translate\/\" data-type=\"post\" data-id=\"1466\" target=\"_blank\" rel=\"noreferrer noopener\">hier<\/a> abrufbar.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"593\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image.png\" alt=\"\" class=\"wp-image-1456\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image.png 697w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-300x255.png 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"680\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-1.png\" alt=\"\" class=\"wp-image-1457\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-1.png 696w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-1-300x293.png 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"582\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-2.png\" alt=\"\" class=\"wp-image-1458\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-2.png 697w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/08\/image-2-300x251.png 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Nach Robo-Anrufen eines vermeintlichen &#8220;Austrian Policy Departmens&#8221; versuchen Betr\u00fcger ihr Gl\u00fcck mit gut getarnten Phishing-Mails. Giulian Guran, IT-Security Experte bei Certitude Consulting, gibt in einer derstandard.at-Story Auskunft \u00fcber eine aktuelle Kampagne. Die technische Analyse im Zusammenhang mit diesem Artikel ist hier abrufbar.<\/p>\n","protected":false},"author":3,"featured_media":463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[234],"class_list":["post-1455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse","tag-phishing"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=1455"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1455\/revisions"}],"predecessor-version":[{"id":1479,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1455\/revisions\/1479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=1455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=1455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=1455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}