Content Retrieve Update Api
GET /api/content/7f0afa20-9303-448c-a21b-2c8a313a2dbb/
{ "id": 4248, "content_customizations": null, "shortcut_customizations": [ { "id": 3544, "created_at": "2022-11-14T13:31:19.277281Z", "updated_at": "2022-11-14T13:31:19.283826Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/143cd23b47cf49cc952dd249528e8ee1/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/original_file.pdf" }, "content": 4248 } ], "content_thumbnail": { "original": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails/1.jpg", "high_quality": { "small": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1.jpg", "medium": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1_medium.jpg", "large": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/preview.jpg" } }, "edited_pages_metadata_count": { "all_pages_count": 23, "edited_pages_count": 0 }, "version": { "id": 4246, "version_number": 1, "version_details": { "uuid": "7f0afa20-9303-448c-a21b-2c8a313a2dbb", "created_at": "2022-11-14T13:31:19.557784Z", "updated_at": "2025-03-23T10:59:15.125816Z", "name": "Cyber_Botnet_Marketplaces_RP", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "tags": [] }, "created_at": "2022-11-14T13:31:19.570268Z", "updated_at": "2022-11-14T13:31:19.570309Z", "content_version_name": "Luminar-2022-Annual-Threat-Landscape-Report", "is_active": true, "type": "DESKTOP", "content": 4248, "version": "7f0afa20-9303-448c-a21b-2c8a313a2dbb", "content_uuid": "7f0afa20-9303-448c-a21b-2c8a313a2dbb", "version_id": "7f0afa20-9303-448c-a21b-2c8a313a2dbb" }, "custom_events": [], "content_action": null, "content_stats": { "version": "7f0afa20-9303-448c-a21b-2c8a313a2dbb", "visitors_count": 5, "lifetime_visitors_count": 140, "last_seen": "2025-05-14T14:13:17Z", "last_updated": "2025-05-15T12:22:05Z", "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82" }, "content_meta_tags": { "url_title": "cyber-botnet-marketplaces-rp", "title": "The Rise of Dark Web Botnet Marketplaces", "description": "The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ", "og_enabled": true, "seo_enabled": true, "version": "7f0afa20-9303-448c-a21b-2c8a313a2dbb" }, "keywords": [], "seo_content_version_name": "cyber-botnet-marketplaces-rp", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/b8bea5ad/cyber-botnet-marketplaces-rp/", "base_url": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC", "fonts": [ "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/AdobeHebrew-Regular_b.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_14.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_1a.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_5u.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_7-.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_8s.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_9m.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_cm.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_du.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_ey.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_gi.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_gu.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_hv.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_iw.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_j3.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_j6.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_ja.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_jd.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_je.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_jg.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_jj.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_jq.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_jw.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_jx.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_k4.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_k6.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_k9.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_kb.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_lv.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_t.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/Oswald-Regular_z.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_fo.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_hj.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_hp.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_i5.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_i9.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_ib.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_ie.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_is.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_iy.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_ju.woff", "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/fonts/WorkSans-Regular_lu.woff" ], "source_url": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC", "content_type": [], "created_at": "2022-11-14T13:31:19.066659Z", "updated_at": "2025-05-16T00:02:54.097419Z", "original_name": "Luminar-2022-Annual-Threat-Landscape-Report.pdf", "original_content_type": "application/pdf", "original_file_extension": "pdf", "original_file_size": 2397142.0, "content_key": "users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC", "annotations": { "pages": [ { "page": 3, "annotations": [ { "type": "TextLink", "bounds": [ 142, 1193, 362, 12 ], "action": { "type": "URI", "uri": "https://www.verizon.com/business/resources/reports/dbir/" } }, { "type": "Link", "bounds": [ 141, 1190, 402, 17 ], "objref": "9", "action": { "type": "URI", "uri": "https://www.verizon.com/business/resources/reports/dbir/ " } } ] }, { "page": 4, "annotations": [ { "type": "TextLink", "bounds": [ 141, 1175, 478, 12 ], "action": { "type": "URI", "uri": "https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/" } }, { "type": "TextLink", "bounds": [ 141, 1141, 711, 12 ], "action": { "type": "URI", "uri": "https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/" } }, { "type": "TextLink", "bounds": [ 141, 1157, 112, 12 ], "action": { "type": "URI", "uri": "https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/" } }, { "type": "TextLink", "bounds": [ 141, 1196, 686, 12 ], "action": { "type": "URI", "uri": "https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter" } }, { "type": "Link", "bounds": [ 139, 1172, 642, 19 ], "objref": "21", "action": { "type": "URI", "uri": "https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/ " } }, { "type": "Link", "bounds": [ 139, 1138, 727, 38 ], "objref": "22", "action": { "type": "URI", "uri": "https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/ " } }, { "type": "Link", "bounds": [ 139, 1193, 727, 17 ], "objref": "23", "action": { "type": "URI", "uri": "https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter " } } ] }, { "page": 6, "annotations": [ { "type": "TextLink", "bounds": [ 142, 1180, 417, 11 ], "action": { "type": "URI", "uri": "https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer" } }, { "type": "TextLink", "bounds": [ 142, 1143, 637, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/" } }, { "type": "TextLink", "bounds": [ 142, 1158, 87, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/" } }, { "type": "TextLink", "bounds": [ 142, 1198, 217, 12 ], "action": { "type": "URI", "uri": "https://asec.ahnlab.com/en/26584/" } }, { "type": "Link", "bounds": [ 141, 1175, 642, 17 ], "objref": "152", "action": { "type": "URI", "uri": "https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer " } }, { "type": "Link", "bounds": [ 141, 1140, 727, 38 ], "objref": "153", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/" } }, { "type": "Link", "bounds": [ 141, 1195, 727, 17 ], "objref": "154", "action": { "type": "URI", "uri": "https://asec.ahnlab.com/en/26584/" } } ] }, { "page": 7, "annotations": [ { "type": "TextLink", "bounds": [ 147, 1169, 659, 12 ], "action": { "type": "URI", "uri": "https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM" } }, { "type": "TextLink", "bounds": [ 147, 1149, 634, 12 ], "action": { "type": "URI", "uri": "https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer" } }, { "type": "TextLink", "bounds": [ 147, 1190, 552, 12 ], "action": { "type": "URI", "uri": "https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/" } }, { "type": "Link", "bounds": [ 144, 1166, 727, 19 ], "objref": "178", "action": { "type": "URI", "uri": "https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM " } }, { "type": "Link", "bounds": [ 144, 1146, 727, 22 ], "objref": "179", "action": { "type": "URI", "uri": "https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer " } }, { "type": "Link", "bounds": [ 144, 1187, 727, 17 ], "objref": "180", "action": { "type": "URI", "uri": "https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/ " } } ] }, { "page": 15, "annotations": [ { "type": "TextLink", "bounds": [ 144, 1203, 327, 12 ], "action": { "type": "URI", "uri": "https://www.cognyte.com/blog/telecom-cyber-attack" } }, { "type": "Link", "bounds": [ 141, 1199, 727, 19 ], "objref": "404", "action": { "type": "URI", "uri": "https://www.cognyte.com/blog/telecom-cyber-attack" } } ] } ] }, "config": { "pagecount": 23, "title": "", "author": "", "subject": "", "keywords": "", "creator": "Adobe InDesign 17.2 (Windows)", "producer": "Adobe PDF Library 16.0.7", "creationdate": "D:20220510113654+03'00'", "moddate": "D:20220510113810+03'00'", "trapped": "False", "fileName": "_I8W2NLC.pdf", "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ], "bookmarks": [], "thumbnailType": "jpg", "pageType": "html", "pageLabels": [] }, "uuid": "7f0afa20-9303-448c-a21b-2c8a313a2dbb", "is_public": true, "description": "The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ", "views_count": 817, "is_high_quality_thumbnails_available": true, "is_archived": false, "conversion_type": "DOCUMENT", "user": 557 }