{"id":1606,"date":"2020-04-29T21:59:21","date_gmt":"2020-04-29T21:59:21","guid":{"rendered":"https:\/\/cisobyte.com\/?page_id=1606"},"modified":"2021-11-03T15:33:27","modified_gmt":"2021-11-03T15:33:27","slug":"blog","status":"publish","type":"page","link":"https:\/\/cisobyte.com\/index.php\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"\n<div class=\"wp-block-cover has-background-dim\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"800\" class=\"wp-block-cover__image-background wp-image-1419\" alt=\"\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/about05-free-img.jpg\" style=\"object-position:44% 53%\" data-object-fit=\"cover\" data-object-position=\"44% 53%\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/about05-free-img.jpg 500w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/about05-free-img-188x300.jpg 188w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-very-light-gray-color has-text-color\" style=\"font-size:50px\"><strong>SECURITY HEADLINES<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">The CISObyte Blog<\/p>\n<\/div><\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2021\/11\/03\/data-and-privacy-regulations-may-redistribute-capital-to-the-people-of-china-but-they-further-centralize-control-of-wealth-data-and-power-in-xis-communist-party\/\" class=\"vlp-link\" title=\"Data and privacy regulations may redistribute capital to the people of China, but they further centralize control of wealth, data, and power in Xi\u2019s communist party. \u2013 cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/cdn.cnn.com\/cnnnext\/dam\/assets\/211028213516-02-ant-group-anniversary-xi-jinping-intl-hnk-super-tease.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tData and privacy regulations may redistribute capital to the people of China, but they further centralize control of wealth, data, and power in Xi\u2019s communist party. \u2013 cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t\u201cAlibaba (BABA), meanwhile, was hit earlier this year with a record $2.8 billion fine for behaving like a monopoly.\u201d\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2021\/10\/26\/unhappy-halloween-ransomware-attackers-target-candy-manufacturer\/\" class=\"vlp-link\" title=\"Unhappy Halloween: Ransomware attackers target candy manufacturer. \u2013 cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/584468588f9384fcf52dff92bdb8a09475b05654\/2021\/10\/22\/e73fa29d-85a5-4a5f-9ab7-968e6d455722\/candy-factory.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tUnhappy Halloween: Ransomware attackers target candy manufacturer. \u2013 cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tMake sure you have good backups ready. Hackers will attack the backups, to, so ensure that offline backups are stored and available, and verify that restored data is intact and not infected.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2021\/10\/25\/california-sb-41-privacy-genetic-testing-companies\/\" class=\"vlp-link\" title=\"California SB-41 Privacy: genetic testing companies. \u2013 cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/leginfo.legislature.ca.gov\/resources\/images\/header_img.png\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tCalifornia SB-41 Privacy: genetic testing companies. \u2013 cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tThe Legislature finds and declares all of the following: \u201cThere is growing concern in the scientific community that outside parties are exploiting the use of genetic data for questionable purposes, including mass surveillance and the ability to track individuals without their authorization.\u201d\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/05\/21\/public-networks-public-traffic-public-behavior-internet-privacy-and-the-4th-amendment\/\" class=\"vlp-link\" title=\"Public Networks, Public Traffic, Public Behavior: Internet Privacy and the 4th Amendment. \u2013 cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/media2.s-nbcnews.com\/j\/newscms\/2020_20\/3351961\/200515-personal-data-al-1501_cdc0050849f7ddea4de951a95dd846d0.nbcnews-fp-1200-630.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tPublic Networks, Public Traffic, Public Behavior: Internet Privacy and the 4th Amendment. \u2013 cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t05\/21\/2020 | The Fourth Amendment to the United States Constitution states, \u201c[The] right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmat\u2026\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/05\/12\/thunderspy-intel-thunderbot-ports-vulnerable-to-hands-on-hacking\/\" class=\"vlp-link\" title=\"Thunderspy: Intel Thunderbot ports vulnerable to hands-on hacking. | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"313\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-11-thunderbolt-intel.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-11-thunderbolt-intel.jpg 728w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-11-thunderbolt-intel-300x157.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tThunderspy: Intel Thunderbot ports vulnerable to hands-on hacking. | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t05\/12\/2020 | Any device left unattended with a hacker should be considered compromised. Learn what steps you can take to mitigate a few, but not all of the vulnerabilities.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/05\/09\/maze-ransomware-attack-to-cost-cognizant-50m\/\" class=\"vlp-link\" title=\"Maze Ransomware attack to cost Cognizant $50m+ | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"297\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-09-cognizant.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-09-cognizant.jpg 1000w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-09-cognizant-300x149.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-09-cognizant-768x380.jpg 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tMaze Ransomware attack to cost Cognizant $50m+ | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t05-01-2020 | 50 million is the expected low side for unforeseen costs due to legal and consulting fees, incident investigation, service restoration, and remediation.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/05\/01\/using-employee-risk-scores-to-guide-security-initiatives\/\" class=\"vlp-link\" title=\"Using Employee Risk Scores to Guide Security Initiatives | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"325\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-01-F3-860x466-1.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-01-F3-860x466-1.jpg 860w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-01-F3-860x466-1-300x163.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/05\/2020-05-01-F3-860x466-1-768x416.jpg 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tUsing Employee Risk Scores to Guide Security Initiatives | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t05-01-2020 | CISOs are developing and using employee risk scores to determine where more user training and better automated defense is needed.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/04\/30\/labcorp-sued-by-investors-for-deficient-cybersecurity-measures\/\" class=\"vlp-link\" title=\"LabCorp Sued by Investors for Deficient Cybersecurity Measures | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"337\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-30-Capture.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-30-Capture.jpg 767w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-30-Capture-300x169.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tLabCorp Sued by Investors for Deficient Cybersecurity Measures | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t04-30-2020 | An effective 3rd-party risk management program can protect your company from possible reputational, operational, and litigation damages.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/04\/29\/update-teams-today-to-avoid-malicious-gifs\/\" class=\"vlp-link\" title=\"Update Teams Today to Avoid Malicious GIFs | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"399\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-29-Capture.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-29-Capture.jpg 841w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-29-Capture-300x199.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-29-Capture-768x510.jpg 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tUpdate Teams Today to Avoid Malicious GIFs | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t04-29-2020 | A vulnerability involving compromised subdomain hosting malicious GIFs has been patched in Microsoft Teams.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/04\/28\/patching-wordpress-plugin-vulnerabilities-or-how-i-learned-to-love-update-all\/\" class=\"vlp-link\" title=\"Patching WordPress Plugin Vulnerabilities; or, how I learned to love \u201cupdate all\u201d | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"300\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-28-Screen-Shot-2020-04-27-at-10.27.48-AM-1536x769-1.png\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-28-Screen-Shot-2020-04-27-at-10.27.48-AM-1536x769-1.png 1536w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-28-Screen-Shot-2020-04-27-at-10.27.48-AM-1536x769-1-300x150.png 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-28-Screen-Shot-2020-04-27-at-10.27.48-AM-1536x769-1-1024x513.png 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-28-Screen-Shot-2020-04-27-at-10.27.48-AM-1536x769-1-768x385.png 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tPatching WordPress Plugin Vulnerabilities; or, how I learned to love \u201cupdate all\u201d | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t04-28-2020 | A cross-site request forgery attack is used to send malicious requests from a valid user to an application.\u00a0Vulnerability in Real-Time Find and Replace WordPress plugin.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/04\/27\/i-still-get-the-patch-tuesday-emails\/\" class=\"vlp-link\" title=\"I still get the Patch Tuesday emails | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"400\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-27-960x0-1.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-27-960x0-1.jpg 960w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-27-960x0-1-300x200.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-27-960x0-1-768x512.jpg 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tI still get the Patch Tuesday emails | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t04-27-2020 | Be aware of your software vulnerabilities and have regularly scheduled patching and maintenance to mitigate them.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/04\/26\/eliminating-vulnerabilities-by-design\/\" class=\"vlp-link\" title=\"Eliminating Vulnerabilities by Design | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"300\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-26-Probing-tech-underbelly-fu-feat-4-20.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-26-Probing-tech-underbelly-fu-feat-4-20.jpg 1000w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-26-Probing-tech-underbelly-fu-feat-4-20-300x150.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-26-Probing-tech-underbelly-fu-feat-4-20-768x384.jpg 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tEliminating Vulnerabilities by Design | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t04-26-2020 | Always great to combine two passions: cutting-edge cybersecurity research from the University of Michigan. \t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<div class=\"vlp-link-container vlp-template-default \">\n\t<a href=\"https:\/\/cisobyte.com\/index.php\/2020\/04\/25\/160000-nintendo-network-id-accounts-hacked\/\" class=\"vlp-link\" title=\"160,000 Nintendo Network ID accounts hacked | cisobyte.com\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"max-width: 600px;\" width=\"600\" height=\"400\" src=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2.jpg\" class=\"attachment-600x600 size-600x600\" alt=\"\" srcset=\"https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2.jpg 2400w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2-300x200.jpg 300w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2-1024x683.jpg 1024w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2-768x512.jpg 768w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2-1536x1024.jpg 1536w, https:\/\/cisobyte.com\/wp-content\/uploads\/2020\/04\/2020-04-25-Cul-nintendoswitch-LZBOTW_TVC_2-2048x1365.jpg 2048w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\t160,000 Nintendo Network ID accounts hacked | cisobyte.com\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\t04-25-2020 | You should expect that you will get hacked, and be prepared for when you do.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1606","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages\/1606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1606"}],"version-history":[{"count":16,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages\/1606\/revisions"}],"predecessor-version":[{"id":1728,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/pages\/1606\/revisions\/1728"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}