{"id":2215,"date":"2023-08-31T16:45:09","date_gmt":"2023-08-31T14:45:09","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2215"},"modified":"2023-08-31T17:23:47","modified_gmt":"2023-08-31T15:23:47","slug":"securityweek-august-31st-2023","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/securityweek-august-31st-2023\/","title":{"rendered":"SECURITYWEEK &#8211; August 31st 2023"},"content":{"rendered":"\n<p>US-based cybersecurity news magazine SECURITYWEEK reports about Certitude&#8217;s recent <a href=\"https:\/\/certitude.consulting\/blog\/en\/subdomain-hijacking\/\" data-type=\"post\" data-id=\"2151\">publication<\/a> in regards to dangling DNS records and subdomain hijacking. Available online <a rel=\"noreferrer noopener\" href=\"https:\/\/www.securityweek.com\/dangling-dns-used-to-hijack-subdomains-of-major-organizations\/\" data-type=\"link\" data-id=\"https:\/\/www.securityweek.com\/dangling-dns-used-to-hijack-subdomains-of-major-organizations\/\" target=\"_blank\">here<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"692\" height=\"1024\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-692x1024.png\" alt=\"\" class=\"wp-image-2217\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-692x1024.png 692w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-203x300.png 203w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1.png 754w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"790\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek2.png\" alt=\"\" class=\"wp-image-2218\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek2.png 754w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek2-286x300.png 286w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"708\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek3.png\" alt=\"\" class=\"wp-image-2219\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek3.png 754w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek3-300x282.png 300w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>US-based cybersecurity news magazine SECURITYWEEK reports about Certitude&#8217;s recent publication in regards to dangling DNS records and subdomain hijacking. Available online here.<\/p>\n","protected":false},"author":12,"featured_media":464,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128],"tags":[],"class_list":["post-2215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2215"}],"version-history":[{"count":3,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2215\/revisions"}],"predecessor-version":[{"id":2258,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2215\/revisions\/2258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/464"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}