{"id":47638,"date":"2013-04-01T15:37:39","date_gmt":"2013-04-01T13:37:39","guid":{"rendered":"https:\/\/cyberant.com\/kennisbank\/"},"modified":"2024-08-16T13:12:57","modified_gmt":"2024-08-16T11:12:57","slug":"knowledge-base","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/knowledge-base\/","title":{"rendered":"Knowledge base"},"content":{"rendered":"<div id='av_section_1'  class='avia-section av-gnyk3-73d4af1f035337ddfef0fca9d002a05b main_color avia-section-default avia-no-border-styling  avia-builder-el-0  avia-builder-el-no-sibling  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47638'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-8nrk3-92bc7f7549e36590a750a153e022bc62 av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div  '     ><section  class='av_textblock_section av-lhkk5vv9-6a9eb08a71f96818aee616cf25ab8a5f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Knowledge base<\/h2>\n<\/div><\/section><br \/>\n<div  class='hr av-av_hr-91d7ccd583a503147498e120fee2ff9b hr-default  avia-builder-el-3  el_after_av_textblock  el_before_av_masonry_entries  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div id='av-masonry-1' class='av-masonry av-l80l7jkv-bad02f989ddd405ae18f5b9bc1624d35 noHover av-fixed-size av-large-gap av-hover-overlay-active av-masonry-animation-active av-masonry-col-4 av-caption-always av-caption-style- av-masonry-entries ' data-post_id=\"47638\"><div class='av-masonry-sort main_color av-sort-yes-tax' data-masonry-id='1' ><div class='av-current-sort-title'><span class=\"inner_sort_button\"><span>All<\/span><small class=\"avia-term-count\"> 26 <\/small><\/span><\/div><div class='av-sort-by-term  ' data-av-allowed-sort='[\"cyber-security_sort\",\"hacken_sort\",\"product-information_sort\",\"risk-management_sort\"]' ><a href=\"#\" data-filter=\"all_sort\" class=\"all_sort_button active_sort\"><span class=\"inner_sort_button\"><span>All<\/span><small class=\"avia-term-count\"> 26 <\/small><\/span><\/a><span class='text-sep cyber-security_sort_sep avia_show_sort'>\/<\/span><a href=\"#\" data-filter=\"cyber-security_sort\" class=\"cyber-security_sort_button avia_show_sort\" ><span class=\"inner_sort_button\"><span>Cyber Security<\/span><small class='avia-term-count'> 10 <\/small><\/span><\/a><span class='text-sep hacken_sort_sep avia_show_sort'>\/<\/span><a href=\"#\" data-filter=\"hacken_sort\" class=\"hacken_sort_button avia_show_sort\" ><span class=\"inner_sort_button\"><span>Hacken<\/span><small class='avia-term-count'> 13 <\/small><\/span><\/a><span class='text-sep knowledge-base_sort_sep avia_hide_sort'>\/<\/span><a href=\"#\" data-filter=\"knowledge-base_sort\" class=\"knowledge-base_sort_button avia_hide_sort\" ><span class=\"inner_sort_button\"><span>Knowledge base<\/span><small class='avia-term-count'> 0 <\/small><\/span><\/a><span class='text-sep news-en_sort_sep avia_hide_sort'>\/<\/span><a href=\"#\" data-filter=\"news-en_sort\" class=\"news-en_sort_button avia_hide_sort\" ><span class=\"inner_sort_button\"><span>News<\/span><small class='avia-term-count'> 0 <\/small><\/span><\/a><span class='text-sep news-en-2_sort_sep avia_hide_sort'>\/<\/span><a href=\"#\" data-filter=\"news-en-2_sort\" class=\"news-en-2_sort_button avia_hide_sort\" ><span class=\"inner_sort_button\"><span>News<\/span><small class='avia-term-count'> 0 <\/small><\/span><\/a><span class='text-sep not-part-of-a-category_sort_sep avia_hide_sort'>\/<\/span><a href=\"#\" data-filter=\"not-part-of-a-category_sort\" class=\"not-part-of-a-category_sort_button avia_hide_sort\" ><span class=\"inner_sort_button\"><span>Not part of a category<\/span><small class='avia-term-count'> 0 <\/small><\/span><\/a><span class='text-sep product-information_sort_sep avia_show_sort'>\/<\/span><a href=\"#\" data-filter=\"product-information_sort\" class=\"product-information_sort_button avia_show_sort\" ><span class=\"inner_sort_button\"><span>Product information<\/span><small class='avia-term-count'> 5 <\/small><\/span><\/a><span class='text-sep risk-management_sort_sep avia_show_sort'>\/<\/span><a href=\"#\" data-filter=\"risk-management_sort\" class=\"risk-management_sort_button avia_show_sort\" ><span class=\"inner_sort_button\"><span>Risk management<\/span><small class='avia-term-count'> 8 <\/small><\/span><\/a><\/div><\/div><div class=\"av-masonry-container isotope av-js-disabled\"><div class='av-masonry-entry isotope-item av-masonry-item-no-image all_sort cyber-security_sort  hacken_sort  news-en-2_sort  risk-management_sort  knowledge-base_sort  news-en_sort  product-information_sort '><\/div><a href=\"https:\/\/cyberant.com\/en\/help-i-have-been-hacked\/\"  id='av-masonry-1-item-50639' data-av-masonry-item='50639' class='av-masonry-entry isotope-item post-50639 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-hacken all_sort cyber-security_sort  hacken_sort  av-masonry-item-with-image' title=\"tired woman sitting at a table in front of a laptop work dissatisfaction\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/05\/HACKED_help_ik_ben_gehackt-705x470.jpg);\"  title=\"tired woman sitting at a table in front of a laptop work dissatisfaction\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Help! I have been hacked<\/h3><span class='av-masonry-date meta-color updated'>23 May 2024<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/tens-of-thousands-of-computer-systems-vulnerable-to-break-in\/\"  id='av-masonry-1-item-50176' data-av-masonry-item='50176' class='av-masonry-entry isotope-item post-50176 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-news-en-2 category-risk-management all_sort cyber-security_sort  news-en-2_sort  risk-management_sort  av-masonry-item-with-image' title=\"Empty office with several computer screens announcing critical error\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2024\/02\/Critical-systems-error-705x471.jpg);\"  title=\"Empty office with several computer screens announcing critical error\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Tens of thousands of computer systems vulnerable to break-in<\/h3><span class='av-masonry-date meta-color updated'>4 March 2024<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/nis2-guidelines-what-companies-need-to-know-and-how-to-comply\/\"  id='av-masonry-1-item-49473' data-av-masonry-item='49473' class='av-masonry-entry isotope-item post-49473 post type-post status-publish format-standard has-post-thumbnail hentry category-knowledge-base category-news-en category-risk-management tag-cyber-security-en tag-guidelines-nis2 tag-it-infrastructuur-beschermen-en tag-netcaptain-en tag-nis2-en tag-vulnerability-management-en all_sort knowledge-base_sort  news-en_sort  risk-management_sort  av-masonry-item-with-image' title=\"NIS2 guidelines\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/11\/NIS2-Richtlijnen-cybersecurity-705x472.jpg);\"  title=\"NIS2 guidelines\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >NIS2 Guidelines: What companies need to know and how to comply<\/h3><span class='av-masonry-date meta-color updated'>3 November 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-cross-site-scripting-xxs\/\"  id='av-masonry-1-item-49173' data-av-masonry-item='49173' class='av-masonry-entry isotope-item post-49173 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cross-site-scripting-en tag-xxs-en tag-xxs-attacks all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"cross-site scripting\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/10\/cross-site-scripting-705x519.jpg);\"  title=\"cross-site scripting\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is cross-site scripting (XXS)?<\/h3><span class='av-masonry-date meta-color updated'>12 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-cross-site-request-forgery-csrf\/\"  id='av-masonry-1-item-49167' data-av-masonry-item='49167' class='av-masonry-entry isotope-item post-49167 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-csrf-attacks tag-cyberaanval-en tag-cyberrisk-en tag-datalekken-en tag-it-infrastructuur-beschermen-en tag-pentest-en tag-security-breach tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"CSRF knowledge base\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/10\/Cross-site-request-forgery-kennisbank-artikel-705x479.jpg);\"  title=\"CSRF knowledge base\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is cross-site request forgery (CSRF)?<\/h3><span class='av-masonry-date meta-color updated'>12 October 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/user-settings-for-aws-security-audits\/\"  id='av-masonry-1-item-48900' data-av-masonry-item='48900' class='av-masonry-entry isotope-item post-48900 post type-post status-publish format-standard has-post-thumbnail hentry category-knowledge-base category-product-information tag-aws-en tag-penetration-test-en tag-pentest-en tag-security-audits-en tag-settings-aws all_sort knowledge-base_sort  product-information_sort  av-masonry-item-with-image' title=\"512px-Amazon_Web_Services_Logo.svg\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/09\/512px-Amazon_Web_Services_Logo.svg.png);\"  title=\"512px-Amazon_Web_Services_Logo.svg\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >User settings for AWS security audits<\/h3><span class='av-masonry-date meta-color updated'>27 September 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/social-engineering\/\"  id='av-masonry-1-item-48893' data-av-masonry-item='48893' class='av-masonry-entry isotope-item post-48893 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base tag-cybercriminelen-en tag-etisch-hacker-en tag-hacker-en tag-penetration-test-en tag-pentest-en tag-social-engineering-en all_sort cyber-security_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"anonymous-mask-data-thief-in-2023\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/09\/anonymous-mask-data-thief-in-2023-705x469.png);\"  title=\"anonymous-mask-data-thief-in-2023\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Social Engineering<\/h3><span class='av-masonry-date meta-color updated'>27 September 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/preventing-phishing-attacks\/\"  id='av-masonry-1-item-48888' data-av-masonry-item='48888' class='av-masonry-entry isotope-item post-48888 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base tag-awareness-en tag-cyber-security-en tag-phishing-en tag-phishing-campaign tag-social-engineering-en all_sort cyber-security_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"Phishing attacks\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/09\/Phishing-aanvallen-705x470.jpg);\"  title=\"Phishing attacks\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Preventing phishing attacks<\/h3><span class='av-masonry-date meta-color updated'>27 September 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/network-security-check\/\"  id='av-masonry-1-item-48882' data-av-masonry-item='48882' class='av-masonry-entry isotope-item post-48882 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base category-product-information tag-netcaptain-en tag-network-assessment tag-network-security-check tag-vulnerability-management-en all_sort cyber-security_sort  knowledge-base_sort  product-information_sort  av-masonry-item-with-image' title=\"network-security-check-cyberant\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/09\/netwerk-security-check-cyberant-705x470.png);\"  title=\"network-security-check-cyberant\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >The Network Security Check<\/h3><span class='av-masonry-date meta-color updated'>27 September 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/user-settings-for-gcp-security-audits\/\"  id='av-masonry-1-item-48864' data-av-masonry-item='48864' class='av-masonry-entry isotope-item post-48864 post type-post status-publish format-standard has-post-thumbnail hentry category-knowledge-base category-product-information tag-gcp-security-audits-en tag-pentest-en tag-security-audit-en tag-security-audits-en all_sort knowledge-base_sort  product-information_sort  av-masonry-item-with-image' title=\"Knowledge base AWS\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/09\/Kennisbank-AWS-705x470.jpg);\"  title=\"Knowledge base AWS\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >User settings for GCP security audits<\/h3><span class='av-masonry-date meta-color updated'>25 September 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/wannacry-anti-virus-is-not-enough\/\"  id='av-masonry-1-item-48677' data-av-masonry-item='48677' class='av-masonry-entry isotope-item post-48677 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base category-risk-management tag-anti-virus-en tag-cyberaanval-en tag-cyberrisk-en tag-hacker-en tag-it-infrastructuur-beschermen-en tag-wannacry-en all_sort cyber-security_sort  knowledge-base_sort  risk-management_sort  av-masonry-item-with-image' title=\"wannacry-five-years-on-what-have-we-learned-v2\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2017\/05\/wannacry-five-years-on-what-have-we-learned-v2-705x470.png);\"  title=\"wannacry-five-years-on-what-have-we-learned-v2\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >WannaCry: Anti-virus is not enough<\/h3><span class='av-masonry-date meta-color updated'>15 May 2023<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by cyberant<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-web-application-scanning\/\"  id='av-masonry-1-item-47606' data-av-masonry-item='47606' class='av-masonry-entry isotope-item post-47606 post type-post status-publish format-standard has-post-thumbnail hentry category-knowledge-base category-product-information category-risk-management tag-cyber-security-en tag-cyberaanval-en tag-cyberrisk-en tag-hacker-en tag-it-infrastructuur-beschermen-en tag-netcaptain-en tag-vulnerability-management-en tag-web-applicatie-scanning-en all_sort knowledge-base_sort  product-information_sort  risk-management_sort  av-masonry-item-with-image' title=\"laptop-2838918_1920\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920.jpg);\"  title=\"laptop-2838918_1920\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is web application scanning?<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/how-does-the-cyberrisk-work\/\"  id='av-masonry-1-item-47607' data-av-masonry-item='47607' class='av-masonry-entry isotope-item post-47607 post type-post status-publish format-standard has-post-thumbnail hentry category-knowledge-base category-product-information category-risk-management tag-cyber-security-en tag-cyberaanval-en tag-cyberrisk-en tag-datalekken-en tag-etisch-hacker-en tag-hacker-en tag-owasp-en tag-penetration-test-en tag-pentest-en tag-vulnerability-management-en all_sort knowledge-base_sort  product-information_sort  risk-management_sort  av-masonry-item-with-image' title=\"CyberRisk\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/chart-down-4.png);\"  title=\"CyberRisk\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >How does the CyberRisk work?<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/the-risk-of-ds_store\/\"  id='av-masonry-1-item-47608' data-av-masonry-item='47608' class='av-masonry-entry isotope-item post-47608 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-ds-store-en tag-cyber-security-en tag-cyberaanval-en tag-datalekken-en tag-hacker-en tag-it-infrastructuur-beschermen-en tag-penetration-test-en tag-pentest-en tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"data-1590455_1280\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/data-1590455_1280.jpg);\"  title=\"data-1590455_1280\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >The risk of .DS_Store<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/upgrade-netcat-shell\/\"  id='av-masonry-1-item-47609' data-av-masonry-item='47609' class='av-masonry-entry isotope-item post-47609 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-datalekken-en tag-etisch-hacker-en tag-hacker-en tag-it-infrastructuur-beschermen-en tag-netcat-shell-upgraden-en tag-pentest-en tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"reverse tcp shell\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2021\/02\/ammonit-321695_640.jpg);\"  title=\"reverse tcp shell\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >NetCat shell upgrade<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-clickjacking\/\"  id='av-masonry-1-item-47610' data-av-masonry-item='47610' class='av-masonry-entry isotope-item post-47610 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-clickjacking-en tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-etisch-hacker-en tag-hacker-en tag-owasp-en tag-penetration-test-en tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"clickjacking\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2021\/03\/apple-407133_1280.jpg);\"  title=\"clickjacking\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is clickjacking?<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/entity-injection\/\"  id='av-masonry-1-item-47611' data-av-masonry-item='47611' class='av-masonry-entry isotope-item post-47611 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-datalekken-en tag-entity-injection-en tag-etisch-hacker-en tag-hacker-en tag-it-infrastructuur-beschermen-en tag-owasp-en tag-penetration-test-en tag-pentest-en tag-vulnerability-management-en tag-xxe-entity-injection-attack all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"Entity injection\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2021\/04\/programming_html_code_coding_website_development_website_programming_code_web_development-1295472.jpgd_.jpeg);\"  title=\"Entity injection\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Entity injection<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/cve-2016-7941-xss-in-netgear-prosafe-switches\/\"  id='av-masonry-1-item-47612' data-av-masonry-item='47612' class='av-masonry-entry isotope-item post-47612 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-etisch-hacker-en tag-hacker-en tag-netgear-prosafe-switches-en tag-owasp-en tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"Netgear prosafe\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/09\/Netgear-prosafe-705x432.webp);\"  title=\"Netgear prosafe\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >CVE-2016-7941 &#8211; XSS in Netgear ProSAFE switches<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-server-side-request-forgery-ssrf\/\"  id='av-masonry-1-item-47614' data-av-masonry-item='47614' class='av-masonry-entry isotope-item post-47614 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-datalekken-en tag-etisch-hacker-en tag-hacker-en tag-pentest-en tag-server-side-request-forgery-ssrf-en tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"Server-side request forgery (SSRF)\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2021\/09\/ssrf2.png);\"  title=\"Server-side request forgery (SSRF)\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is Server-side request forgery (SSRF)?<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/blind-sql-injection\/\"  id='av-masonry-1-item-47615' data-av-masonry-item='47615' class='av-masonry-entry isotope-item post-47615 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyberaanval-en tag-cybercriminelen-en tag-etisch-hacker-en tag-hacker-en tag-penetration-test-en tag-sql-injection-en tag-vulnerability-management-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"SQL Injection\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/02\/SQL-Injection.jpg);\"  title=\"SQL Injection\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Blind SQL Injection<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-path-traversal\/\"  id='av-masonry-1-item-47616' data-av-masonry-item='47616' class='av-masonry-entry isotope-item post-47616 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-datalekken-en tag-etisch-hacker-en tag-hacker-en tag-owasp-en tag-path-traversal-en tag-pentest-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"vias-gcb5873043_1280\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/08\/vias-gcb5873043_1280.jpg);\"  title=\"vias-gcb5873043_1280\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is path traversal?<\/h3><span class='av-masonry-date meta-color updated'>26 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/what-is-a-mass-assignment-attack\/\"  id='av-masonry-1-item-47617' data-av-masonry-item='47617' class='av-masonry-entry isotope-item post-47617 post type-post status-publish format-standard has-post-thumbnail hentry category-hacken category-knowledge-base tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-etisch-hacker-en tag-hacker-en tag-mass-assignment-aanval-en all_sort hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"Mass assignment aanval\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/09\/Mass-assignment-aanval-705x529.jpeg);\"  title=\"Mass assignment aanval\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >What is a mass-assignment attack?<\/h3><span class='av-masonry-date meta-color updated'>23 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/ransomware-anti-virus-alone-is-not-enough\/\"  id='av-masonry-1-item-47619' data-av-masonry-item='47619' class='av-masonry-entry isotope-item post-47619 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base category-risk-management tag-anti-virus-en tag-cyber-security-en tag-cyberaanval-en tag-cybercriminelen-en tag-it-infrastructuur-beschermen-en tag-netcaptain-en tag-ransomeware-aanval-en tag-ransomware-en all_sort cyber-security_sort  knowledge-base_sort  risk-management_sort  av-masonry-item-with-image' title=\"ransomeware aanval\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920.jpg);\"  title=\"ransomeware aanval\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Ransomware: Anti-virus alone is not enough<\/h3><span class='av-masonry-date meta-color updated'>23 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/pentest-vs-vulnerability-management\/\"  id='av-masonry-1-item-47623' data-av-masonry-item='47623' class='av-masonry-entry isotope-item post-47623 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base category-risk-management tag-cyber-security-en tag-netcaptain-en tag-penetration-test-en tag-pentest-en tag-security-audit-en tag-vulnerability-management-en all_sort cyber-security_sort  knowledge-base_sort  risk-management_sort  av-masonry-item-with-image' title=\"artikel-2-lg\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/artikel-2-lg.jpg);\"  title=\"artikel-2-lg\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >Pentest vs Vulnerability Management<\/h3><span class='av-masonry-date meta-color updated'>20 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/owasp-top-10\/\"  id='av-masonry-1-item-47624' data-av-masonry-item='47624' class='av-masonry-entry isotope-item post-47624 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-hacken category-knowledge-base tag-broken-access-control-en tag-cryptographic-failures-en tag-cyber-security-en tag-insecure-design-en tag-open-web-application-security-project-en tag-owasp-en tag-security-misconfiguration-en all_sort cyber-security_sort  hacken_sort  knowledge-base_sort  av-masonry-item-with-image' title=\"owasp top 10\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/owasp.png);\"  title=\"owasp top 10\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >The Owasp Top 10<\/h3><span class='av-masonry-date meta-color updated'>20 September 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><a href=\"https:\/\/cyberant.com\/en\/de-vattenfall-case-responsible-disclosure\/\"  id='av-masonry-1-item-47626' data-av-masonry-item='47626' class='av-masonry-entry isotope-item post-47626 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security category-knowledge-base category-news-en category-risk-management tag-cyber-security-en tag-datalekken-en tag-etisch-hacker-en tag-responsible-disclosure-en all_sort cyber-security_sort  knowledge-base_sort  news-en_sort  risk-management_sort  av-masonry-item-with-image' title=\"Responsibility disclosure\"   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='av-inner-masonry-sizer'><\/div><figure class='av-inner-masonry main_color'><div class=\"av-masonry-outerimage-container\"><div class='av-masonry-image-container' style=\"background-image: url(https:\/\/cyberant.com\/wp-content\/uploads\/2022\/03\/Responsibility-disclosure.jpg);\"  title=\"Responsibility disclosure\" ><\/div><\/div><figcaption class='av-inner-masonry-content site-background'><div class='av-inner-masonry-content-pos'><div class='av-inner-masonry-content-pos-content'><div class='avia-arrow'><\/div><h3 class='av-masonry-entry-title entry-title '  itemprop=\"headline\" >De Vattenfall case \u2013 Responsible Disclosure<\/h3><span class='av-masonry-date meta-color updated'>16 August 2022<\/span><span class=\"av-masonry-text-sep text-sep-author\">\/<\/span><span class='av-masonry-author meta-color author'><span class='fn'>by John de Kroon<\/span><\/span><\/div><\/div><\/figcaption><\/figure><\/a><!--end av-masonry entry--><\/div><\/div><\/p><\/div><\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47638'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-47638","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47638"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47638\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}