{"id":47603,"date":"2022-10-21T09:29:43","date_gmt":"2022-10-21T07:29:43","guid":{"rendered":"https:\/\/cyberant.com\/nieuws\/"},"modified":"2024-08-16T14:53:12","modified_gmt":"2024-08-16T12:53:12","slug":"news","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/news\/","title":{"rendered":"News"},"content":{"rendered":"<div id='av_section_1'  class='avia-section av-1gme0s0-4091a011e5ab2322ba0f8ee6a8cb01ce main_color avia-section-default avia-no-border-styling  avia-builder-el-0  avia-builder-el-no-sibling  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47603'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-14gq9zk-00c6e05710cf9ca42ea784cd133809cd av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div  '     ><section  class='av_textblock_section av-lhkl7y74-eb96aaf99932033f92bcba50c0ab3dd1 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">News articles<\/h2>\n<\/div><\/section><br \/>\n<div  class='hr av-l32jbk-f8248be27f769f6e9878ef423b98d37e hr-default  avia-builder-el-3  el_after_av_textblock  el_before_av_masonry_entries  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div id='av-masonry-1' class='av-masonry av-llaz1n61-8c7725abaf7f3b06ae721d679de5390c noHover av-fixed-size av-large-gap av-hover-overlay-active av-masonry-animation- av-masonry-col-4 av-caption-always av-caption-style- av-masonry-entries ' data-post_id=\"47603\"><div class=\"av-masonry-container isotope av-js-disabled\"><div class='av-masonry-entry isotope-item av-masonry-item-no-image all_sort news-en_sort  knowledge-base_sort  risk-management_sort  not-part-of-a-category_sort  cyber-security_sort '><\/div><a href=\"https:\/\/cyberant.com\/en\/once-again-malware-found-in-us-code-extensions\/\"  id='av-masonry-1-item-54484' data-av-masonry-item='54484' class='av-masonry-entry isotope-item post-54484 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cybercrime-en tag-malware tag-secure-coding all_sort news-en_sort  av-masonry-item-with-image' title=\"vscode\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2025\/11\/vscode-705x369.webp);\"  title=\"vscode\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Once again malware found in US Code Extensions<\/h3><span class='av-masonry-date meta-color updated'>14 January 2026<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/large-scale-attack-on-popular-npm-packages-millions-of-websites-and-apps-potentially-affected\/\"  id='av-masonry-1-item-54483' data-av-masonry-item='54483' class='av-masonry-entry isotope-item post-54483 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cyberaanval-en tag-datalekken-en tag-supply-chain-attack tag-vulnerability-management-en all_sort news-en_sort  av-masonry-item-with-image' title=\"npm logo\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2025\/09\/npm-2048-582778654-705x705.png);\"  title=\"npm logo\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Large-scale attack on popular npm packages: millions of websites and apps potentially affected<\/h3><span class='av-masonry-date meta-color updated'>14 January 2026<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/age-verification-on-the-internet-what-about-privacy\/\"  id='av-masonry-1-item-54482' data-av-masonry-item='54482' class='av-masonry-entry isotope-item post-54482 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-privacy all_sort news-en_sort  av-masonry-item-with-image' title=\"Age verification\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2025\/07\/Leeftijdsverificatie.png);\"  title=\"Age verification\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Age verification on the Internet: what about privacy?<\/h3><span class='av-masonry-date meta-color updated'>14 January 2026<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/magecart-attack-claims-8-8-million-victims-worldwide\/\"  id='av-masonry-1-item-54481' data-av-masonry-item='54481' class='av-masonry-entry isotope-item post-54481 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cybercrime-en tag-malware tag-secure-webshop all_sort news-en_sort  av-masonry-item-with-image' title=\"payment\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2026\/01\/payment-705x369.webp);\"  title=\"payment\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Magecart attack claims 8.8 million victims worldwide<\/h3><span class='av-masonry-date meta-color updated'>14 January 2026<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/49529\/\"  id='av-masonry-1-item-49529' data-av-masonry-item='49529' class='av-masonry-entry isotope-item post-49529 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cyberant-en tag-cyberant-headquarters all_sort news-en_sort  av-masonry-item-with-image' title=\"Relocation\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/11\/Verhuizing-529x705.jpeg);\"  title=\"Relocation\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >CyberAnt moved to Zeewolde<\/h3><span class='av-masonry-date meta-color updated'>7 November 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/cyberant-iso-27001-and-9001-certified\/\"  id='av-masonry-1-item-49512' data-av-masonry-item='49512' class='av-masonry-entry isotope-item post-49512 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-certifications tag-cyberant-en tag-information-security tag-iso-27001-en tag-iso-9001-en all_sort news-en_sort  av-masonry-item-with-image' title=\"ISO Certification CyberAnt\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/11\/ISO-Certificering-2022-705x429.jpeg);\"  title=\"ISO Certification CyberAnt\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >CyberAnt ISO 27001 and 9001 certified<\/h3><span class='av-masonry-date meta-color updated'>7 November 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/nis2-guidelines-what-companies-need-to-know-and-how-to-comply\/\"  id='av-masonry-1-item-49473' data-av-masonry-item='49473' class='av-masonry-entry isotope-item post-49473 post type-post status-publish format-standard has-post-thumbnail hentry category-knowledge-base category-news-en category-risk-management tag-cyber-security-en tag-guidelines-nis2 tag-it-infrastructuur-beschermen-en tag-netcaptain-en tag-nis2-en tag-vulnerability-management-en all_sort knowledge-base_sort  news-en_sort  risk-management_sort  av-masonry-item-with-image' title=\"NIS2 guidelines\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/11\/NIS2-Richtlijnen-cybersecurity-705x472.jpg);\"  title=\"NIS2 guidelines\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >NIS2 Guidelines: What companies need to know and how to comply<\/h3><span class='av-masonry-date meta-color updated'>3 November 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/subsidy-for-web-shops\/\"  id='av-masonry-1-item-49387' data-av-masonry-item='49387' class='av-masonry-entry isotope-item post-49387 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cyber-resilience tag-cyber-security-en tag-secure-webshop all_sort news-en_sort  av-masonry-item-with-image' title=\"Jolijn Knikman CEO CyberAnt\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/10\/Jolijn-Knikman-Managing-Director-CyberAnt-705x508.jpg);\"  title=\"Jolijn Knikman CEO CyberAnt\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Subsidy for web shops<\/h3><span class='av-masonry-date meta-color updated'>31 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/how-secure-is-your-network\/\"  id='av-masonry-1-item-49296' data-av-masonry-item='49296' class='av-masonry-entry isotope-item post-49296 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-datalekken-en tag-it-infrastructuur-beschermen-en tag-netcaptain-en tag-vulnerability-management-en all_sort news-en_sort  av-masonry-item-with-image' title=\"Cybersecurity Network\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cybersecurity-5-705x469.jpeg);\"  title=\"Cybersecurity Network\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >How secure is your network?<\/h3><span class='av-masonry-date meta-color updated'>26 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/vulnerability-management-protect-your-network-from-hackers\/\"  id='av-masonry-1-item-49148' data-av-masonry-item='49148' class='av-masonry-entry isotope-item post-49148 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-etisch-hacker-en tag-it-infrastructuur-beschermen-en tag-ransomeware-aanval-en tag-vulnerability-management-en all_sort news-en_sort  av-masonry-item-with-image' title=\"Cybersecurity 9\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cybersecurity-9-705x471.jpeg);\"  title=\"Cybersecurity 9\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Vulnerability Management protect your network from hackers<\/h3><span class='av-masonry-date meta-color updated'>11 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/preventing-a-data-breach\/\"  id='av-masonry-1-item-49137' data-av-masonry-item='49137' class='av-masonry-entry isotope-item post-49137 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cyberaanval-en tag-datalekken-en tag-it-infrastructuur-beschermen-en tag-netcaptain-en tag-vulnerability-management-en all_sort news-en_sort  av-masonry-item-with-image' title=\"Prevent a data breach\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/10\/Voorkom-een-datalek.png);\"  title=\"Prevent a data breach\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Preventing a data breach<\/h3><span class='av-masonry-date meta-color updated'>11 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/strengthen-your-business-security-with-a-thorough-network-security-check-and-vulnerability-management\/\"  id='av-masonry-1-item-49127' data-av-masonry-item='49127' class='av-masonry-entry isotope-item post-49127 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en category-not-part-of-a-category tag-cyber-security-en tag-it-infrastructuur-beschermen-en tag-monitoring-vulnerabilities tag-pentest-en tag-vulnerability-management-en all_sort news-en_sort  not-part-of-a-category_sort  av-masonry-item-with-image' title=\"Cybersecurity 7\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cybersecurity-7-705x470.jpeg);\"  title=\"Cybersecurity 7\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Strengthen your corporate security with a thorough Network Security Check<\/h3><span class='av-masonry-date meta-color updated'>11 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/pentest-for-iso-27001-certification\/\"  id='av-masonry-1-item-48676' data-av-masonry-item='48676' class='av-masonry-entry isotope-item post-48676 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-datalekken-en tag-iso-27001-en tag-iso-9001-en tag-it-infrastructuur-beschermen-en tag-penetration-test-en tag-pentest-en tag-pentest-company all_sort news-en_sort  av-masonry-item-with-image' title=\"Check mark and rubber stamp over white background.\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/12\/check-mark-green-image-certificate-ISO-705x436.jpg);\"  title=\"Check mark and rubber stamp over white background.\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Pentest for ISO 27001 certification<\/h3><span class='av-masonry-date meta-color updated'>21 December 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/the-rise-of-cybercrime\/\"  id='av-masonry-1-item-48673' data-av-masonry-item='48673' class='av-masonry-entry isotope-item post-48673 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-cyber-security-en tag-cyberaanval-en tag-cybercrime-en tag-cybercriminelen-en tag-cyberrisk-en tag-hacker-en all_sort news-en_sort  av-masonry-item-with-image' title=\"Cybersecurity 8\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/08\/Cybersecurity-8-705x431.jpeg);\"  title=\"Cybersecurity 8\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >The Rise of Cybercrime<\/h3><span class='av-masonry-date meta-color updated'>30 November 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/de-vattenfall-case-responsible-disclosure\/\"  id='av-masonry-1-item-47626' data-av-masonry-item='47626' class='av-masonry-entry isotope-item post-47626 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base category-news-en category-risk-management tag-cyber-security-en tag-datalekken-en tag-etisch-hacker-en tag-responsible-disclosure-en all_sort cyber-security_sort  knowledge-base_sort  news-en_sort  risk-management_sort  av-masonry-item-with-image' title=\"Responsibility disclosure\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/03\/Responsibility-disclosure.jpg);\"  title=\"Responsibility disclosure\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >De Vattenfall case \u2013 Responsible Disclosure<\/h3><span class='av-masonry-date meta-color updated'>16 August 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/why-a-pen-test-is-important-even-for-small-businesses\/\"  id='av-masonry-1-item-48657' data-av-masonry-item='48657' class='av-masonry-entry isotope-item post-48657 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en all_sort news-en_sort  av-masonry-item-with-image' title=\"Small office\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/07\/notebook-and-laptop-in-home-office-with-soft-light-2022-02-02-05-05-26-utc-705x470.jpg);\"  title=\"Small office\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Why a pen test is important even for small businesses<\/h3><span class='av-masonry-date meta-color updated'>23 July 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/cyberant-nominated-best-ict-start-up-of-the-year-2018\/\"  id='av-masonry-1-item-48675' data-av-masonry-item='48675' class='av-masonry-entry isotope-item post-48675 post type-post status-publish format-standard has-post-thumbnail hentry category-news-en tag-award-en tag-cyber-security-en tag-hacker-en tag-ict-en tag-it-infrastructuur-beschermen-en tag-nominated tag-start-up-of-the-year-en all_sort news-en_sort  av-masonry-item-with-image' title=\"Foodvalley ICT Awards 2018 v2\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2018\/05\/Foodvalley-ICT-Awards-2018-v2-705x439.png);\"  title=\"Foodvalley ICT Awards 2018 v2\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >CyberAnt nominated: Best ICT Start Up of the Year 2018<\/h3><span class='av-masonry-date meta-color updated'>7 May 2018<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><\/div><\/div><\/p><\/div><\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47603'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-47603","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47603"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47603\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}