Content Retrieve Update Api
GET /api/content/ef977b92-fac9-4fae-ac56-6322745f91ed/
{ "id": 4267, "content_customizations": null, "shortcut_customizations": [ { "id": 3563, "created_at": "2022-11-14T15:21:24.168240Z", "updated_at": "2022-11-14T15:21:24.173905Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/97453c4844a041fba02a62f3871f5b69/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/original_file.pdf" }, "content": 4267 } ], "content_thumbnail": { "original": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails/1.jpg", "high_quality": { "small": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/1.jpg", "medium": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/1_medium.jpg", "large": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/preview.jpg" } }, "edited_pages_metadata_count": { "all_pages_count": 12, "edited_pages_count": 0 }, "version": { "id": 4265, "version_number": 1, "version_details": { "uuid": "ef977b92-fac9-4fae-ac56-6322745f91ed", "created_at": "2022-11-14T15:21:24.305885Z", "updated_at": "2025-03-23T10:59:19.861395Z", "name": "cognyte-cve-report-6-2021", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "tags": [ 1 ] }, "created_at": "2022-11-14T15:21:24.320983Z", "updated_at": "2022-11-14T15:21:24.321040Z", "content_version_name": "cognyte-cve-report-6-2021", "is_active": true, "type": "DESKTOP", "content": 4267, "version": "ef977b92-fac9-4fae-ac56-6322745f91ed", "content_uuid": "ef977b92-fac9-4fae-ac56-6322745f91ed", "version_id": "ef977b92-fac9-4fae-ac56-6322745f91ed" }, "custom_events": [], "content_action": null, "content_stats": { "version": "ef977b92-fac9-4fae-ac56-6322745f91ed", "visitors_count": 0, "lifetime_visitors_count": 3, "last_seen": "2025-03-15T21:59:45Z", "last_updated": "2025-05-15T12:22:05Z", "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82" }, "content_meta_tags": null, "keywords": [], "seo_content_version_name": "cognyte-cve-report-6-2021", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/8e471525/cognyte-cve-report-6-2021/", "base_url": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE", "fonts": [ "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/AdobeHebrew-Regular_28.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/Calibri-Bold_2e.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/Calibri-Bold_2g.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/Calibri_2d.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/Oswald-Bold_aw.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/Oswald-Medium_20.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/Oswald-Medium_n.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Bold_22.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Bold_25.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Medium_4.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Medium_6.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Regular_1t.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Regular_23.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-Regular_av.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-SemiBold_2q.woff", "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/fonts/WorkSans-SemiBold_au.woff" ], "source_url": "/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE", "content_type": [], "created_at": "2022-11-14T15:21:23.897205Z", "updated_at": "2025-05-16T00:03:29.367679Z", "original_name": "cognyte-cve-report-6-2021.pdf", "original_content_type": "application/pdf", "original_file_extension": "pdf", "original_file_size": 1899386.0, "content_key": "users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE", "annotations": { "pages": [ { "page": 4, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1148, 287, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/cve-2020-0796" } }, { "type": "TextLink", "bounds": [ 80, 1164, 290, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-19781" } }, { "type": "TextLink", "bounds": [ 732, 1180, 154, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-0688" } }, { "type": "TextLink", "bounds": [ 80, 1192, 136, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-0688" } }, { "type": "TextLink", "bounds": [ 257, 1206, 289, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-6340" } }, { "type": "Link", "bounds": [ 61, 616, 151, 51 ], "objref": "138", "action": { "type": "GoTo", "page": 8, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 220, 616, 151, 57 ], "objref": "139", "action": { "type": "GoTo", "page": 8, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 379, 616, 151, 51 ], "objref": "140", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 536, 616, 153, 51 ], "objref": "141", "action": { "type": "GoTo", "page": 7, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 695, 616, 153, 51 ], "objref": "142", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 261, 555, 69, 46 ], "objref": "143", "action": { "type": "GoTo", "page": 7, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 587, 552, 52, 52 ], "objref": "144", "action": { "type": "GoTo", "page": 7, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 743, 549, 58, 60 ], "objref": "145", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 77, 1144, 295, 19 ], "objref": "146", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/cve-2020-0796" } }, { "type": "Link", "bounds": [ 77, 1161, 307, 17 ], "objref": "147", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-19781" } }, { "type": "Link", "bounds": [ 77, 1177, 830, 38 ], "objref": "148", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-0688" } }, { "type": "Link", "bounds": [ 77, 1203, 475, 19 ], "objref": "149", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-6340" } } ] }, { "page": 5, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1148, 290, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882" } }, { "type": "TextLink", "bounds": [ 80, 1164, 289, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-0708" } }, { "type": "TextLink", "bounds": [ 80, 1180, 287, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-1472" } }, { "type": "TextLink", "bounds": [ 80, 1195, 286, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-0199" } }, { "type": "Link", "bounds": [ 271, 844, 104, 23 ], "objref": "169", "action": { "type": "GoTo", "page": 7, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 271, 885, 104, 23 ], "objref": "170", "action": { "type": "GoTo", "page": 8, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 271, 926, 113, 23 ], "objref": "171", "action": { "type": "GoTo", "page": 8, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 271, 967, 104, 23 ], "objref": "172", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 271, 1009, 113, 23 ], "objref": "173", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 271, 1050, 104, 23 ], "objref": "174", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 77, 1144, 298, 19 ], "objref": "175", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882" } }, { "type": "Link", "bounds": [ 77, 1161, 307, 17 ], "objref": "176", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-0708" } }, { "type": "Link", "bounds": [ 77, 1177, 295, 17 ], "objref": "177", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-1472" } }, { "type": "Link", "bounds": [ 77, 1192, 475, 17 ], "objref": "178", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-0199" } }, { "type": "Link", "bounds": [ 220, 385, 46, 44 ], "objref": "179", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Link", "bounds": [ 220, 999, 41, 41 ], "objref": "180", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } } ] }, { "page": 6, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1131, 729, 12 ], "action": { "type": "URI", "uri": "https://www.cognyte.com/blog/what-you-need-to-know-about-the-top-4-global-ransomware-vulnerabilities-and-how-" } }, { "type": "TextLink", "bounds": [ 80, 1186, 277, 11 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437" } }, { "type": "TextLink", "bounds": [ 80, 1164, 281, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2018-13379" } }, { "type": "TextLink", "bounds": [ 535, 1164, 278, 12 ], "action": { "type": "URI", "uri": "https://www.fortiguard.com/psirt/FG-IR-18-384" } }, { "type": "Link", "bounds": [ 77, 1128, 735, 34 ], "objref": "194", "action": { "type": "URI", "uri": "https://www.cognyte.com/blog/what-you-need-to-know-about-the-top-4-global-ransomware-vulnerabilities-and-how-to-stay-protected/ " } }, { "type": "Link", "bounds": [ 77, 1181, 436, 19 ], "objref": "195", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437" } }, { "type": "Link", "bounds": [ 77, 1161, 457, 19 ], "objref": "196", "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2018-13379" } }, { "type": "Link", "bounds": [ 532, 1161, 287, 19 ], "objref": "197", "action": { "type": "URI", "uri": "https://www.fortiguard.com/psirt/FG-IR-18-384 " } }, { "type": "Link", "bounds": [ 481, 712, 44, 43 ], "objref": "198", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } } ] }, { "page": 7, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1131, 764, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/cicada-hacking-group-exploits-zerologon-launches-new-backdoor-in-automotive-industry-attack-" } }, { "type": "TextLink", "bounds": [ 80, 1186, 492, 11 ], "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/109323/hacking/ta505-zerologon-attacks.html" } }, { "type": "TextLink", "bounds": [ 80, 1164, 275, 12 ], "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/alerts/aa20-283a" } }, { "type": "Link", "bounds": [ 77, 1128, 772, 40 ], "objref": "205", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/cicada-hacking-group-exploits-zerologon-launches-new-backdoor-in-automotive-industry-attack-wave/#ftag=RSSbaffb68" } }, { "type": "Link", "bounds": [ 77, 1181, 500, 19 ], "objref": "206", "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/109323/hacking/ta505-zerologon-attacks.html " } }, { "type": "Link", "bounds": [ 77, 1161, 283, 19 ], "objref": "207", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/alerts/aa20-283a " } } ] }, { "page": 8, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1044, 682, 12 ], "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "TextLink", "bounds": [ 80, 1093, 714, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/" } }, { "type": "TextLink", "bounds": [ 80, 1108, 677, 12 ], "action": { "type": "URI", "uri": "http://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/" } }, { "type": "TextLink", "bounds": [ 466, 1123, 376, 12 ], "action": { "type": "URI", "uri": "https://www.bankinfosecurity.com/nephilim-ransomware-gangtied-" } }, { "type": "TextLink", "bounds": [ 283, 1138, 558, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp" } }, { "type": "TextLink", "bounds": [ 80, 1157, 759, 12 ], "action": { "type": "URI", "uri": "https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html" } }, { "type": "TextLink", "bounds": [ 80, 1172, 223, 12 ], "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0096/" } }, { "type": "TextLink", "bounds": [ 310, 1172, 530, 12 ], "action": { "type": "URI", "uri": "https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1" } }, { "type": "TextLink", "bounds": [ 107, 1187, 228, 12 ], "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0016/" } }, { "type": "Link", "bounds": [ 77, 1041, 772, 48 ], "objref": "212", "action": { "type": "URI", "uri": "http://http//" } }, { "type": "Link", "bounds": [ 80, 1042, 683, 17 ], "objref": "213", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 770, 1042, 75, 17 ], "objref": "214", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 80, 1057, 714, 17 ], "objref": "215", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 801, 1057, 44, 17 ], "objref": "216", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 80, 1073, 381, 17 ], "objref": "217", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 77, 1089, 772, 78 ], "objref": "218", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp" } }, { "type": "Link", "bounds": [ 80, 1091, 715, 17 ], "objref": "219", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 802, 1091, 43, 17 ], "objref": "220", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 80, 1106, 679, 17 ], "objref": "221", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 767, 1106, 78, 17 ], "objref": "222", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 80, 1122, 381, 17 ], "objref": "223", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 466, 1122, 379, 17 ], "objref": "224", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 80, 1137, 197, 17 ], "objref": "225", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 284, 1137, 556, 17 ], "objref": "226", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 77, 1154, 772, 48 ], "objref": "227", "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0016/ " } }, { "type": "Link", "bounds": [ 80, 1154, 761, 19 ], "objref": "228", "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "Link", "bounds": [ 80, 1169, 225, 19 ], "objref": "229", "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0096/" } }, { "type": "Link", "bounds": [ 312, 1169, 533, 19 ], "objref": "230", "action": { "type": "URI", "uri": "https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf" } }, { "type": "Link", "bounds": [ 80, 1184, 22, 19 ], "objref": "231", "action": { "type": "URI", "uri": "https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf" } }, { "type": "Link", "bounds": [ 109, 1184, 232, 19 ], "objref": "232", "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0016/ " } } ] }, { "page": 9, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1028, 737, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/" } }, { "type": "TextLink", "bounds": [ 80, 1047, 397, 12 ], "action": { "type": "URI", "uri": "https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html" } }, { "type": "TextLink", "bounds": [ 486, 1047, 358, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/windows-" } }, { "type": "TextLink", "bounds": [ 80, 1083, 439, 11 ], "action": { "type": "URI", "uri": "https://www.helpnetsecurity.com/2019/06/10/office-equation-editor-exploit/" } }, { "type": "TextLink", "bounds": [ 526, 1083, 318, 11 ], "action": { "type": "URI", "uri": "https://www.fireeye.com/blog/threat-research/2019/06/" } }, { "type": "TextLink", "bounds": [ 80, 1114, 451, 12 ], "action": { "type": "URI", "uri": "https://www.infosecurity-magazine.com/news-features/exploited-state-fix/" } }, { "type": "TextLink", "bounds": [ 80, 1132, 607, 12 ], "action": { "type": "URI", "uri": "https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.html" } }, { "type": "TextLink", "bounds": [ 80, 1149, 448, 12 ], "action": { "type": "URI", "uri": "https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/" } }, { "type": "TextLink", "bounds": [ 80, 1196, 764, 12 ], "action": { "type": "URI", "uri": "https://www.darkreading.com/endpoint/carbanak-cobalt-fin7-group-targets-russian-romanian-banks-in-new-attacks/d/d-id/1332707" } }, { "type": "TextLink", "bounds": [ 80, 1166, 567, 12 ], "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/" } }, { "type": "TextLink", "bounds": [ 659, 1166, 185, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/" } }, { "type": "Link", "bounds": [ 77, 1025, 744, 19 ], "objref": "255", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/ " } }, { "type": "Link", "bounds": [ 77, 1044, 772, 32 ], "objref": "256", "action": { "type": "URI", "uri": "https://" } }, { "type": "Link", "bounds": [ 80, 1044, 402, 19 ], "objref": "257", "action": { "type": "URI", "uri": "https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html;" } }, { "type": "Link", "bounds": [ 486, 1044, 359, 19 ], "objref": "258", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/windows-bluekeep-rdp-attacks-are-here-infecting-with-miners/ " } }, { "type": "Link", "bounds": [ 80, 1059, 323, 19 ], "objref": "259", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/windows-bluekeep-rdp-attacks-are-here-infecting-with-miners/ " } }, { "type": "Link", "bounds": [ 77, 1079, 772, 32 ], "objref": "260", "action": { "type": "URI", "uri": "https://" } }, { "type": "Link", "bounds": [ 80, 1079, 440, 19 ], "objref": "261", "action": { "type": "URI", "uri": "https://www.helpnetsecurity.com/2019/06/10/office-equation-editor-exploit/" } }, { "type": "Link", "bounds": [ 526, 1079, 319, 19 ], "objref": "262", "action": { "type": "URI", "uri": "https://www.fireeye.com/blog/threat-research/2019/06/government-in-central-asia-targeted-with-hawkball-backdoor.html " } }, { "type": "Link", "bounds": [ 80, 1094, 413, 19 ], "objref": "263", "action": { "type": "URI", "uri": "https://www.fireeye.com/blog/threat-research/2019/06/government-in-central-asia-targeted-with-hawkball-backdoor.html " } }, { "type": "Link", "bounds": [ 77, 1111, 459, 19 ], "objref": "264", "action": { "type": "URI", "uri": "https://www.infosecurity-magazine.com/news-features/exploited-state-fix/ " } }, { "type": "Link", "bounds": [ 77, 1129, 613, 17 ], "objref": "265", "action": { "type": "URI", "uri": "https://www.infosecurity-magazine.com/news-features/exploited-state-fix/ " } }, { "type": "Link", "bounds": [ 77, 1146, 455, 19 ], "objref": "266", "action": { "type": "URI", "uri": "https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/ " } }, { "type": "Link", "bounds": [ 77, 1193, 772, 29 ], "objref": "267", "action": { "type": "URI", "uri": "https://www.darkreading.com/endpoint/carbanak-cobalt-fin7-group-targets-russian-romanian-banks-in-new-attacks/d/d-id/1332707 " } }, { "type": "Link", "bounds": [ 77, 1163, 772, 32 ], "objref": "268", "action": { "type": "URI", "uri": "https://" } }, { "type": "Link", "bounds": [ 80, 1163, 569, 19 ], "objref": "269", "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/" } }, { "type": "Link", "bounds": [ 659, 1163, 187, 19 ], "objref": "270", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/oceanlotus-revamps-public-exploit-code-to-abuse-microsoft-office-software/ " } }, { "type": "Link", "bounds": [ 80, 1178, 478, 19 ], "objref": "271", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/oceanlotus-revamps-public-exploit-code-to-abuse-microsoft-office-software/ " } }, { "type": "Link", "bounds": [ 72, 471, 49, 51 ], "objref": "272", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } } ] }, { "page": 10, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1105, 579, 12 ], "action": { "type": "URI", "uri": "https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/" } }, { "type": "TextLink", "bounds": [ 80, 1122, 495, 12 ], "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/58692/apt/ta459-apt-targets-financial-firms.html" } }, { "type": "TextLink", "bounds": [ 80, 1141, 408, 12 ], "action": { "type": "URI", "uri": "https://securelist.com/gaza-cybergang-updated-2017-activity/82765/" } }, { "type": "TextLink", "bounds": [ 80, 1160, 541, 12 ], "action": { "type": "URI", "uri": "https://www.securityweek.com/iranian-cyberspies-exploit-recently-patched-office-flaw" } }, { "type": "TextLink", "bounds": [ 80, 1175, 339, 12 ], "action": { "type": "URI", "uri": "https://securelist.com/apt-trends-report-q2-2017/79332/" } }, { "type": "TextLink", "bounds": [ 80, 1193, 695, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/hacking-campaign-uses-old-microsoft-office-flaws-to-create-backdoors-steal-files/" } }, { "type": "Link", "bounds": [ 77, 1102, 744, 17 ], "objref": "292", "action": { "type": "URI", "uri": "https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/ " } }, { "type": "Link", "bounds": [ 77, 1119, 503, 19 ], "objref": "293", "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/58692/apt/ta459-apt-targets-financial-firms.html " } }, { "type": "Link", "bounds": [ 77, 1138, 772, 32 ], "objref": "294", "action": { "type": "URI", "uri": "https://securelist.com/gaza-cybergang-updated-2017-activity/82765/ " } }, { "type": "Link", "bounds": [ 77, 1157, 553, 34 ], "objref": "295", "action": { "type": "URI", "uri": "https://www.securityweek.com/iranian-cyberspies-exploit-recently-patched-office-flaw; https://securelist.com/apt-trends-report-q2-2017/79332/ " } }, { "type": "Link", "bounds": [ 77, 1190, 703, 19 ], "objref": "296", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/hacking-campaign-uses-old-microsoft-office-flaws-to-create-backdoors-steal-files/ " } } ] }, { "page": 11, "annotations": [ { "type": "Link", "bounds": [ 80, 1198, 284, 17 ], "objref": "310", "action": { "type": "URI", "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf " } }, { "type": "Link", "bounds": [ 529, 484, 41, 41 ], "objref": "311", "action": { "type": "GoTo", "page": 9, "zoom": "XYZ null null null" } }, { "type": "Highlight", "bounds": [ 445, 326, 52, 25 ], "objref": "312", "title": "OFrenkel", "appearance": "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADQAAAAYCAYAAAC1Ft6mAAAAd0lEQVR42u3XIQ6AQAwEwKYGR5AEHA4Dov9/WzlxJJgL4G63bbIPmKxoKxJh3H0tsZ7zBzP2jqnZv4IMKMMbZgMDGVM7d7SFUVDQwgayFuhkAxkDSNmOggQlKEEJkjCLlev0AV6uc5z3ge7Bq6CJpp0H6qDBoM8FRYf1Vnvt3kYAAAAASUVORK5CYII=" } ] } ] }, "config": { "pagecount": 12, "title": "", "author": "", "subject": "", "keywords": "", "creator": "Adobe InDesign 16.0 (Windows)", "producer": "Adobe PDF Library 15.0", "creationdate": "D:20210629123944+03'00'", "moddate": "D:20210708123908+03'00'", "trapped": "False", "fileName": "_CJz0UcE.pdf", "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ], "bookmarks": [], "thumbnailType": "jpg", "pageType": "html", "pageLabels": [] }, "uuid": "ef977b92-fac9-4fae-ac56-6322745f91ed", "is_public": true, "description": "Vulnerability Threat Intelligence Report In-depth analysis of Common Vulnerabilities and Exposures (CVE) in the past year June 2021 ", "views_count": 85, "is_high_quality_thumbnails_available": true, "is_archived": true, "conversion_type": "DOCUMENT", "user": 557 }