{"id":14145,"date":"2022-08-10T14:32:37","date_gmt":"2022-08-10T12:32:37","guid":{"rendered":"https:\/\/www.show.it\/cyberattack-victims-often-attacked-by-multiple-adversaries-research\/"},"modified":"2022-08-10T14:32:37","modified_gmt":"2022-08-10T12:32:37","slug":"cyberattack-victims-often-attacked-by-multiple-adversaries-research","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/cyberattack-victims-often-attacked-by-multiple-adversaries-research\/","title":{"rendered":"Cyberattack Victims Often Attacked by Multiple Adversaries: Research"},"content":{"rendered":"<p><strong><span>It\u2019s not if, but when and how often you get attacked<\/span><\/strong><\/p>\n<p><span><span>Sophos research for its Active Adversary Playbook 2022 revealed that victims are often attacked by multiple adversaries \u2013 usually, in rapid succession but sometimes simultaneously. Further analysis now suggests the aphorism \u2018it\u2019s not if, but when you are attacked\u2019 should be expanded with the extension, \u2018and how often\u2019.<\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/cyberattack-victims-often-attacked-multiple-adversaries-research\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s not if, but when and how often you get attacked Sophos research for its Active Adversary Playbook 2022 revealed that victims are often attacked by multiple adversaries \u2013 usually, in rapid succession but sometimes simultaneously. Further analysis now suggests the aphorism \u2018it\u2019s not if, but when you are attacked\u2019 should be expanded with the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,34,11,35],"tags":[],"class_list":["post-14145","post","type-post","status-publish","format-standard","hentry","category-incident-response","category-network-security","category-news-industry","category-security-infrastructure"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/14145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=14145"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/14145\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=14145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=14145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=14145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}