{"id":2221,"date":"2023-08-31T16:47:27","date_gmt":"2023-08-31T14:47:27","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2221"},"modified":"2023-08-31T17:23:34","modified_gmt":"2023-08-31T15:23:34","slug":"securityweek-31-august-2023","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/securityweek-31-august-2023\/","title":{"rendered":"SECURITYWEEK &#8211; 31. August 2023"},"content":{"rendered":"\n<p>Das in den USA ans\u00e4ssige Nachrichtenmagazin f\u00fcr Cybersicherheit SECURITYWEEK berichtet \u00fcber die j\u00fcngste <a href=\"https:\/\/certitude.consulting\/blog\/de\/subdomain-hijacking-2\/\" data-type=\"post\" data-id=\"2177\">Ver\u00f6ffentlichung<\/a> von Certitude in Bezug auf dangling DNS-Eintr\u00e4ge und Subdomain-Hijacking. Online abrufbar <a rel=\"noreferrer noopener\" href=\"https:\/\/www.securityweek.com\/dangling-dns-used-to-hijack-subdomains-of-major-organizations\/\" data-type=\"link\" data-id=\"https:\/\/www.securityweek.com\/dangling-dns-used-to-hijack-subdomains-of-major-organizations\/\" target=\"_blank\">hier<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"692\" height=\"1024\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-1-692x1024.png\" alt=\"\" class=\"wp-image-2222\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-1-692x1024.png 692w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-1-203x300.png 203w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek1-1.png 754w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"790\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek2-1.png\" alt=\"\" class=\"wp-image-2223\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek2-1.png 754w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek2-1-286x300.png 286w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"708\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek3-1.png\" alt=\"\" class=\"wp-image-2224\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek3-1.png 754w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2023\/08\/securityweek3-1-300x282.png 300w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Das in den USA ans\u00e4ssige Nachrichtenmagazin f\u00fcr Cybersicherheit SECURITYWEEK berichtet \u00fcber die j\u00fcngste Ver\u00f6ffentlichung von Certitude in Bezug auf dangling DNS-Eintr\u00e4ge und Subdomain-Hijacking. Online abrufbar hier.<\/p>\n","protected":false},"author":12,"featured_media":464,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[],"class_list":["post-2221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2221"}],"version-history":[{"count":2,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2221\/revisions"}],"predecessor-version":[{"id":2257,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2221\/revisions\/2257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/464"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}