{"id":366,"date":"2019-11-18T18:35:01","date_gmt":"2019-11-18T18:35:01","guid":{"rendered":"https:\/\/increasec.com\/?p=366"},"modified":"2021-02-28T23:49:37","modified_gmt":"2021-03-01T04:49:37","slug":"ransomware-tecnique-comparison","status":"publish","type":"post","link":"https:\/\/increasec.com\/?p=366","title":{"rendered":"Ransomware Tecnique Comparison"},"content":{"rendered":"\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-help-net-security\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"3puSplAf2i\"><a href=\"https:\/\/www.helpnetsecurity.com\/2019\/11\/15\/ransomware-attack-techniques\/\">Attack tools and techniques used by major ransomware families<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Attack tools and techniques used by major ransomware families&#8221; &#8212; Help Net Security\" src=\"https:\/\/www.helpnetsecurity.com\/2019\/11\/15\/ransomware-attack-techniques\/embed\/#?secret=zTAlyEFDjn#?secret=3puSplAf2i\" data-secret=\"3puSplAf2i\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[7],"class_list":["post-366","post","type-post","status-publish","format-standard","hentry","category-uncategorised","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=366"}],"version-history":[{"count":2,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/366\/revisions"}],"predecessor-version":[{"id":1259,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/366\/revisions\/1259"}],"wp:attachment":[{"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}