{"content_customizations":null,"shortcut_customizations":[{"id":3543,"created_at":"2022-11-14T13:28:16.908225Z","updated_at":"2022-11-14T13:28:16.914937Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/343f325f75a44949b2e4893816976ca3/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea/original_file.pdf"},"content":4247}],"content_thumbnail":{"original":"/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea/thumbnails/1.jpg","high_quality":{"small":"/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea/thumbnails_high_quality/1.jpg","medium":"/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea/thumbnails_high_quality/1_medium.jpg","large":"/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"ca6ef7c4-7ecc-4f7a-8e3a-356eddc7ec6b","name":"Luminar 2021 Annual Threat Landscape Report","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[1]},"is_active":true,"type":"DESKTOP","version":"ca6ef7c4-7ecc-4f7a-8e3a-356eddc7ec6b","content_uuid":"ca6ef7c4-7ecc-4f7a-8e3a-356eddc7ec6b","version_id":"ca6ef7c4-7ecc-4f7a-8e3a-356eddc7ec6b"},"custom_events":[],"content_action":null,"content_stats":{"version":"ca6ef7c4-7ecc-4f7a-8e3a-356eddc7ec6b","visitors_count":1,"lifetime_visitors_count":null,"last_seen":"2026-01-18T00:00:00Z","last_updated":"2026-04-17T04:25:41Z","account":"bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"},"content_meta_tags":null,"keywords":[],"seo_content_version_name":"luminar-2021-annual-threat-landscape-report","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/3f515b0c/luminar-2021-annual-threat-landscape-report/","base_url":"/users/557/content/c1ef1115b3cb43f5b0211ada503a1c66/_POvH3ea","config":{"pagecount":23,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":3,"annotations":[{"type":"TextLink","bounds":[142,1193,362,12],"action":{"type":"URI","uri":"https://www.verizon.com/business/resources/reports/dbir/"}},{"type":"Link","bounds":[141,1190,402,17],"objref":"9","action":{"type":"URI","uri":"https://www.verizon.com/business/resources/reports/dbir/ "}}]},{"page":4,"annotations":[{"type":"TextLink","bounds":[141,1175,478,12],"action":{"type":"URI","uri":"https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/"}},{"type":"TextLink","bounds":[141,1141,711,12],"action":{"type":"URI","uri":"https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/"}},{"type":"TextLink","bounds":[141,1157,112,12],"action":{"type":"URI","uri":"https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/"}},{"type":"TextLink","bounds":[141,1196,686,12],"action":{"type":"URI","uri":"https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter"}},{"type":"Link","bounds":[139,1172,642,19],"objref":"21","action":{"type":"URI","uri":"https://www.cbsnews.com/news/genesis-cybercriminal-market-ransomware/ "}},{"type":"Link","bounds":[139,1138,727,38],"objref":"22","action":{"type":"URI","uri":"https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-cyber-defenses-were-compromised-ahead-hack-2021-06-08/ "}},{"type":"Link","bounds":[139,1193,727,17],"objref":"23","action":{"type":"URI","uri":"https://www.vice.com/en/article/n7b3jm/genesis-market-buy-cookies-slack?utm_source=motherboard_twitter "}}]},{"page":6,"annotations":[{"type":"TextLink","bounds":[142,1180,417,11],"action":{"type":"URI","uri":"https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer"}},{"type":"TextLink","bounds":[142,1143,637,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"}},{"type":"TextLink","bounds":[142,1158,87,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"}},{"type":"TextLink","bounds":[142,1198,217,12],"action":{"type":"URI","uri":"https://asec.ahnlab.com/en/26584/"}},{"type":"Link","bounds":[141,1175,642,17],"objref":"150","action":{"type":"URI","uri":"https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer "}},{"type":"Link","bounds":[141,1140,727,38],"objref":"151","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/vidar-stealer-abuses-mastodon-to-silently-get-c2-configuration/"}},{"type":"Link","bounds":[141,1195,727,17],"objref":"152","action":{"type":"URI","uri":"https://asec.ahnlab.com/en/26584/"}}]},{"page":7,"annotations":[{"type":"TextLink","bounds":[147,1169,659,12],"action":{"type":"URI","uri":"https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM"}},{"type":"TextLink","bounds":[147,1149,634,12],"action":{"type":"URI","uri":"https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer"}},{"type":"TextLink","bounds":[147,1190,552,12],"action":{"type":"URI","uri":"https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/"}},{"type":"Link","bounds":[144,1166,727,19],"objref":"176","action":{"type":"URI","uri":"https://success.trendmicro.com/solution/000146108-azorult-malware-information-kAJ4P000000kEK2WAM "}},{"type":"Link","bounds":[144,1146,727,22],"objref":"177","action":{"type":"URI","uri":"https://www.cyberark.com/resources/threat-research-blog/raccoon-the-story-of-a-typical-infostealer "}},{"type":"Link","bounds":[144,1187,727,17],"objref":"178","action":{"type":"URI","uri":"https://securityboulevard.com/2021/05/an-in-depth-analysis-of-the-new-taurus-stealer/ "}}]},{"page":15,"annotations":[{"type":"TextLink","bounds":[144,1203,327,12],"action":{"type":"URI","uri":"https://www.cognyte.com/blog/telecom-cyber-attack"}},{"type":"Link","bounds":[141,1199,727,19],"objref":"406","action":{"type":"URI","uri":"https://www.cognyte.com/blog/telecom-cyber-attack"}}]}]},"created_at":"2022-11-14T13:28:16.685595Z","updated_at":"2026-04-17T04:52:41.597603Z","original_name":"Luminar-2021-Annual-Threat-Landscape-Report.pdf","uuid":"ca6ef7c4-7ecc-4f7a-8e3a-356eddc7ec6b","description":"The Rise of Dark Web Botnet Marketplaces Annual Cyber Threat Intelligence Report 2021 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}