GET /api/content/7f0afa20-9303-448c-a21b-2c8a313a2dbb/?format=api
HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "content_customizations": null,
    "shortcut_customizations": [
        {
            "id": 3544,
            "created_at": "2022-11-14T13:31:19.277281Z",
            "updated_at": "2022-11-14T13:31:19.283826Z",
            "action": "DOWNLOAD",
            "color": "#FFFFFF",
            "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/143cd23b47cf49cc952dd249528e8ee1/download_icon.svg",
            "additional_data": {
                "download_url": "https://media.celero.io/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/original_file.pdf"
            },
            "content": 4248
        }
    ],
    "content_thumbnail": {
        "original": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails/1.jpg",
        "high_quality": {
            "small": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1.jpg",
            "medium": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1_medium.jpg",
            "large": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/1_large.jpg",
            "microsite_preview": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC/thumbnails_high_quality/preview.jpg"
        }
    },
    "version": {
        "version_number": 1,
        "version_details": {
            "uuid": "7f0afa20-9303-448c-a21b-2c8a313a2dbb",
            "name": "Cyber_Botnet_Marketplaces_RP",
            "is_live": true,
            "access_control": {
                "min_stage": "EVERYONE_ALLOWED",
                "stage_options": {
                    "UNVERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE",
                        "form_id": "default"
                    },
                    "VERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE"
                    },
                    "GDPR_CONSENT": {},
                    "PRIVATE": {},
                    "EVERYONE_ALLOWED": {}
                }
            },
            "base_shorten": null,
            "tags": []
        },
        "is_active": true,
        "type": "DESKTOP",
        "version": "7f0afa20-9303-448c-a21b-2c8a313a2dbb",
        "content_uuid": "7f0afa20-9303-448c-a21b-2c8a313a2dbb",
        "version_id": "7f0afa20-9303-448c-a21b-2c8a313a2dbb"
    },
    "custom_events": [],
    "content_action": null,
    "content_stats": {
        "version": "7f0afa20-9303-448c-a21b-2c8a313a2dbb",
        "visitors_count": 7,
        "lifetime_visitors_count": null,
        "last_seen": "2026-02-21T00:00:00Z",
        "last_updated": "2026-02-22T10:15:45Z",
        "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
    },
    "content_meta_tags": {
        "url_title": "cyber-botnet-marketplaces-rp",
        "title": "The Rise of Dark Web Botnet Marketplaces",
        "description": "The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ",
        "og_enabled": true,
        "seo_enabled": true,
        "version": "7f0afa20-9303-448c-a21b-2c8a313a2dbb"
    },
    "keywords": [],
    "seo_content_version_name": "cyber-botnet-marketplaces-rp",
    "html_snippets": null,
    "is_live": true,
    "shorten": "https://engage.cognyte.com/s/b8bea5ad/cyber-botnet-marketplaces-rp/",
    "base_url": "/users/557/content/3e27495e0a6e4874a2f49740d21cbca5/_I8W2NLC",
    "config": {
        "pagecount": 23,
        "bounds": [
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ]
        ]
    },
    "annotations": {
        "pages": [
            {
                "page": 3,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            142,
                            1193,
                            362,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.verizon.com/business/resources/reports/dbir/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            141,
                            1190,
                            402,
                            17
                        ],
                        "objref": "9",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.verizon.com/business/resources/reports/dbir/ "
                        }
                    }
                ]
            },
            {
                "page": 4,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            141,
                            1175,
                            478,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            141,
                            1141,
                            711,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            141,
                            1157,
                            112,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            141,
                            1196,
                            686,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            139,
                            1172,
                            642,
                            19
                        ],
                        "objref": "21",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            139,
                            1138,
                            727,
                            38
                        ],
                        "objref": "22",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            139,
                            1193,
                            727,
                            17
                        ],
                        "objref": "23",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter "
                        }
                    }
                ]
            },
            {
                "page": 6,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            142,
                            1180,
                            417,
                            11
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            142,
                            1143,
                            637,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            142,
                            1158,
                            87,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            142,
                            1198,
                            217,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://asec.ahnlab.com/en/26584/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            141,
                            1175,
                            642,
                            17
                        ],
                        "objref": "152",
                        "action": {
                            "type": "URI",
                            "uri": "https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            141,
                            1140,
                            727,
                            38
                        ],
                        "objref": "153",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            141,
                            1195,
                            727,
                            17
                        ],
                        "objref": "154",
                        "action": {
                            "type": "URI",
                            "uri": "https://asec.ahnlab.com/en/26584/"
                        }
                    }
                ]
            },
            {
                "page": 7,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            147,
                            1169,
                            659,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            147,
                            1149,
                            634,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            147,
                            1190,
                            552,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            144,
                            1166,
                            727,
                            19
                        ],
                        "objref": "178",
                        "action": {
                            "type": "URI",
                            "uri": "https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            144,
                            1146,
                            727,
                            22
                        ],
                        "objref": "179",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            144,
                            1187,
                            727,
                            17
                        ],
                        "objref": "180",
                        "action": {
                            "type": "URI",
                            "uri": "https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/ "
                        }
                    }
                ]
            },
            {
                "page": 15,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            144,
                            1203,
                            327,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/blog/telecom-cyber-attack"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            141,
                            1199,
                            727,
                            19
                        ],
                        "objref": "404",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/blog/telecom-cyber-attack"
                        }
                    }
                ]
            }
        ]
    },
    "created_at": "2022-11-14T13:31:19.066659Z",
    "updated_at": "2026-02-22T10:37:06.395441Z",
    "original_name": "Luminar-2022-Annual-Threat-Landscape-Report.pdf",
    "uuid": "7f0afa20-9303-448c-a21b-2c8a313a2dbb",
    "description": "The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ",
    "is_high_quality_thumbnails_available": true,
    "conversion_type": "DOCUMENT"
}
Shortcut customizations

Lists are not currently supported in HTML input.

Shortcut customizations

Lists are not currently supported in HTML input.