{"content_customizations":null,"shortcut_customizations":[{"id":3563,"created_at":"2022-11-14T15:21:24.168240Z","updated_at":"2022-11-14T15:21:24.173905Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/97453c4844a041fba02a62f3871f5b69/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/original_file.pdf"},"content":4267}],"content_thumbnail":{"original":"/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails/1.jpg","high_quality":{"small":"/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/1.jpg","medium":"/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/1_medium.jpg","large":"/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"ef977b92-fac9-4fae-ac56-6322745f91ed","name":"cognyte-cve-report-6-2021","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[1]},"is_active":true,"type":"DESKTOP","version":"ef977b92-fac9-4fae-ac56-6322745f91ed","content_uuid":"ef977b92-fac9-4fae-ac56-6322745f91ed","version_id":"ef977b92-fac9-4fae-ac56-6322745f91ed"},"custom_events":[],"content_action":null,"content_stats":null,"content_meta_tags":null,"keywords":[],"seo_content_version_name":"cognyte-cve-report-6-2021","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/8e471525/cognyte-cve-report-6-2021/","base_url":"/users/557/content/6fad82e7044c4ab89be77c87f25b5120/_CJz0UcE","config":{"pagecount":12,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":4,"annotations":[{"type":"TextLink","bounds":[80,1148,287,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/cve-2020-0796"}},{"type":"TextLink","bounds":[80,1164,290,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2019-19781"}},{"type":"TextLink","bounds":[732,1180,154,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2020-0688"}},{"type":"TextLink","bounds":[80,1192,136,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2020-0688"}},{"type":"TextLink","bounds":[257,1206,289,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2019-6340"}},{"type":"Link","bounds":[61,616,151,51],"objref":"138","action":{"type":"GoTo","page":8,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[220,616,151,57],"objref":"139","action":{"type":"GoTo","page":8,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[379,616,151,51],"objref":"140","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[536,616,153,51],"objref":"141","action":{"type":"GoTo","page":7,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[695,616,153,51],"objref":"142","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[261,555,69,46],"objref":"143","action":{"type":"GoTo","page":7,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[587,552,52,52],"objref":"144","action":{"type":"GoTo","page":7,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[743,549,58,60],"objref":"145","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[77,1144,295,19],"objref":"146","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/cve-2020-0796"}},{"type":"Link","bounds":[77,1161,307,17],"objref":"147","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2019-19781"}},{"type":"Link","bounds":[77,1177,830,38],"objref":"148","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2020-0688"}},{"type":"Link","bounds":[77,1203,475,19],"objref":"149","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2019-6340"}}]},{"page":5,"annotations":[{"type":"TextLink","bounds":[80,1148,290,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2017-11882"}},{"type":"TextLink","bounds":[80,1164,289,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2019-0708"}},{"type":"TextLink","bounds":[80,1180,287,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2020-1472"}},{"type":"TextLink","bounds":[80,1195,286,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2017-0199"}},{"type":"Link","bounds":[271,844,104,23],"objref":"169","action":{"type":"GoTo","page":7,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[271,885,104,23],"objref":"170","action":{"type":"GoTo","page":8,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[271,926,113,23],"objref":"171","action":{"type":"GoTo","page":8,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[271,967,104,23],"objref":"172","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[271,1009,113,23],"objref":"173","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[271,1050,104,23],"objref":"174","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[77,1144,298,19],"objref":"175","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2017-11882"}},{"type":"Link","bounds":[77,1161,307,17],"objref":"176","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2019-0708"}},{"type":"Link","bounds":[77,1177,295,17],"objref":"177","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2020-1472"}},{"type":"Link","bounds":[77,1192,475,17],"objref":"178","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2017-0199"}},{"type":"Link","bounds":[220,385,46,44],"objref":"179","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Link","bounds":[220,999,41,41],"objref":"180","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}}]},{"page":6,"annotations":[{"type":"TextLink","bounds":[80,1131,729,12],"action":{"type":"URI","uri":"https://www.cognyte.com/blog/what-you-need-to-know-about-the-top-4-global-ransomware-vulnerabilities-and-how-"}},{"type":"TextLink","bounds":[80,1186,277,11],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2016-4437"}},{"type":"TextLink","bounds":[80,1164,281,12],"action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2018-13379"}},{"type":"TextLink","bounds":[535,1164,278,12],"action":{"type":"URI","uri":"https://www.fortiguard.com/psirt/FG-IR-18-384"}},{"type":"Link","bounds":[77,1128,735,34],"objref":"194","action":{"type":"URI","uri":"https://www.cognyte.com/blog/what-you-need-to-know-about-the-top-4-global-ransomware-vulnerabilities-and-how-to-stay-protected/ "}},{"type":"Link","bounds":[77,1181,436,19],"objref":"195","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2016-4437"}},{"type":"Link","bounds":[77,1161,457,19],"objref":"196","action":{"type":"URI","uri":"https://nvd.nist.gov/vuln/detail/CVE-2018-13379"}},{"type":"Link","bounds":[532,1161,287,19],"objref":"197","action":{"type":"URI","uri":"https://www.fortiguard.com/psirt/FG-IR-18-384 "}},{"type":"Link","bounds":[481,712,44,43],"objref":"198","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}}]},{"page":7,"annotations":[{"type":"TextLink","bounds":[80,1131,764,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/cicada-hacking-group-exploits-zerologon-launches-new-backdoor-in-automotive-industry-attack-"}},{"type":"TextLink","bounds":[80,1186,492,11],"action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/109323/hacking/ta505-zerologon-attacks.html"}},{"type":"TextLink","bounds":[80,1164,275,12],"action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/alerts/aa20-283a"}},{"type":"Link","bounds":[77,1128,772,40],"objref":"205","action":{"type":"URI","uri":"https://www.zdnet.com/article/cicada-hacking-group-exploits-zerologon-launches-new-backdoor-in-automotive-industry-attack-wave/#ftag=RSSbaffb68"}},{"type":"Link","bounds":[77,1181,500,19],"objref":"206","action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/109323/hacking/ta505-zerologon-attacks.html "}},{"type":"Link","bounds":[77,1161,283,19],"objref":"207","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/alerts/aa20-283a "}}]},{"page":8,"annotations":[{"type":"TextLink","bounds":[80,1044,682,12],"action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"TextLink","bounds":[80,1093,714,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/"}},{"type":"TextLink","bounds":[80,1108,677,12],"action":{"type":"URI","uri":"http://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"}},{"type":"TextLink","bounds":[466,1123,376,12],"action":{"type":"URI","uri":"https://www.bankinfosecurity.com/nephilim-ransomware-gangtied-"}},{"type":"TextLink","bounds":[283,1138,558,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp"}},{"type":"TextLink","bounds":[80,1157,759,12],"action":{"type":"URI","uri":"https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html"}},{"type":"TextLink","bounds":[80,1172,223,12],"action":{"type":"URI","uri":"https://attack.mitre.org/groups/G0096/"}},{"type":"TextLink","bounds":[310,1172,530,12],"action":{"type":"URI","uri":"https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1"}},{"type":"TextLink","bounds":[107,1187,228,12],"action":{"type":"URI","uri":"https://attack.mitre.org/groups/G0016/"}},{"type":"Link","bounds":[77,1041,772,48],"objref":"212","action":{"type":"URI","uri":"http://http//"}},{"type":"Link","bounds":[80,1042,683,17],"objref":"213","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[770,1042,75,17],"objref":"214","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[80,1057,714,17],"objref":"215","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[801,1057,44,17],"objref":"216","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[80,1073,381,17],"objref":"217","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[77,1089,772,78],"objref":"218","action":{"type":"URI","uri":"https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp"}},{"type":"Link","bounds":[80,1091,715,17],"objref":"219","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[802,1091,43,17],"objref":"220","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[80,1106,679,17],"objref":"221","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[767,1106,78,17],"objref":"222","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[80,1122,381,17],"objref":"223","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[466,1122,379,17],"objref":"224","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[80,1137,197,17],"objref":"225","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[284,1137,556,17],"objref":"226","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[77,1154,772,48],"objref":"227","action":{"type":"URI","uri":"https://attack.mitre.org/groups/G0016/ "}},{"type":"Link","bounds":[80,1154,761,19],"objref":"228","action":{"type":"URI","uri":"https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"}},{"type":"Link","bounds":[80,1169,225,19],"objref":"229","action":{"type":"URI","uri":"https://attack.mitre.org/groups/G0096/"}},{"type":"Link","bounds":[312,1169,533,19],"objref":"230","action":{"type":"URI","uri":"https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf"}},{"type":"Link","bounds":[80,1184,22,19],"objref":"231","action":{"type":"URI","uri":"https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf"}},{"type":"Link","bounds":[109,1184,232,19],"objref":"232","action":{"type":"URI","uri":"https://attack.mitre.org/groups/G0016/ "}}]},{"page":9,"annotations":[{"type":"TextLink","bounds":[80,1028,737,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/"}},{"type":"TextLink","bounds":[80,1047,397,12],"action":{"type":"URI","uri":"https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html"}},{"type":"TextLink","bounds":[486,1047,358,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/windows-"}},{"type":"TextLink","bounds":[80,1083,439,11],"action":{"type":"URI","uri":"https://www.helpnetsecurity.com/2019/06/10/office-equation-editor-exploit/"}},{"type":"TextLink","bounds":[526,1083,318,11],"action":{"type":"URI","uri":"https://www.fireeye.com/blog/threat-research/2019/06/"}},{"type":"TextLink","bounds":[80,1114,451,12],"action":{"type":"URI","uri":"https://www.infosecurity-magazine.com/news-features/exploited-state-fix/"}},{"type":"TextLink","bounds":[80,1132,607,12],"action":{"type":"URI","uri":"https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.html"}},{"type":"TextLink","bounds":[80,1149,448,12],"action":{"type":"URI","uri":"https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/"}},{"type":"TextLink","bounds":[80,1196,764,12],"action":{"type":"URI","uri":"https://www.darkreading.com/endpoint/carbanak-cobalt-fin7-group-targets-russian-romanian-banks-in-new-attacks/d/d-id/1332707"}},{"type":"TextLink","bounds":[80,1166,567,12],"action":{"type":"URI","uri":"https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/"}},{"type":"TextLink","bounds":[659,1166,185,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/"}},{"type":"Link","bounds":[77,1025,744,19],"objref":"255","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/ "}},{"type":"Link","bounds":[77,1044,772,32],"objref":"256","action":{"type":"URI","uri":"https://"}},{"type":"Link","bounds":[80,1044,402,19],"objref":"257","action":{"type":"URI","uri":"https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html;"}},{"type":"Link","bounds":[486,1044,359,19],"objref":"258","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/windows-bluekeep-rdp-attacks-are-here-infecting-with-miners/ "}},{"type":"Link","bounds":[80,1059,323,19],"objref":"259","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/windows-bluekeep-rdp-attacks-are-here-infecting-with-miners/ "}},{"type":"Link","bounds":[77,1079,772,32],"objref":"260","action":{"type":"URI","uri":"https://"}},{"type":"Link","bounds":[80,1079,440,19],"objref":"261","action":{"type":"URI","uri":"https://www.helpnetsecurity.com/2019/06/10/office-equation-editor-exploit/"}},{"type":"Link","bounds":[526,1079,319,19],"objref":"262","action":{"type":"URI","uri":"https://www.fireeye.com/blog/threat-research/2019/06/government-in-central-asia-targeted-with-hawkball-backdoor.html  "}},{"type":"Link","bounds":[80,1094,413,19],"objref":"263","action":{"type":"URI","uri":"https://www.fireeye.com/blog/threat-research/2019/06/government-in-central-asia-targeted-with-hawkball-backdoor.html  "}},{"type":"Link","bounds":[77,1111,459,19],"objref":"264","action":{"type":"URI","uri":"https://www.infosecurity-magazine.com/news-features/exploited-state-fix/ "}},{"type":"Link","bounds":[77,1129,613,17],"objref":"265","action":{"type":"URI","uri":"https://www.infosecurity-magazine.com/news-features/exploited-state-fix/ "}},{"type":"Link","bounds":[77,1146,455,19],"objref":"266","action":{"type":"URI","uri":"https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/ "}},{"type":"Link","bounds":[77,1193,772,29],"objref":"267","action":{"type":"URI","uri":"https://www.darkreading.com/endpoint/carbanak-cobalt-fin7-group-targets-russian-romanian-banks-in-new-attacks/d/d-id/1332707 "}},{"type":"Link","bounds":[77,1163,772,32],"objref":"268","action":{"type":"URI","uri":"https://"}},{"type":"Link","bounds":[80,1163,569,19],"objref":"269","action":{"type":"URI","uri":"https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/"}},{"type":"Link","bounds":[659,1163,187,19],"objref":"270","action":{"type":"URI","uri":"https://www.zdnet.com/article/oceanlotus-revamps-public-exploit-code-to-abuse-microsoft-office-software/ "}},{"type":"Link","bounds":[80,1178,478,19],"objref":"271","action":{"type":"URI","uri":"https://www.zdnet.com/article/oceanlotus-revamps-public-exploit-code-to-abuse-microsoft-office-software/ "}},{"type":"Link","bounds":[72,471,49,51],"objref":"272","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}}]},{"page":10,"annotations":[{"type":"TextLink","bounds":[80,1105,579,12],"action":{"type":"URI","uri":"https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/"}},{"type":"TextLink","bounds":[80,1122,495,12],"action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/58692/apt/ta459-apt-targets-financial-firms.html"}},{"type":"TextLink","bounds":[80,1141,408,12],"action":{"type":"URI","uri":"https://securelist.com/gaza-cybergang-updated-2017-activity/82765/"}},{"type":"TextLink","bounds":[80,1160,541,12],"action":{"type":"URI","uri":"https://www.securityweek.com/iranian-cyberspies-exploit-recently-patched-office-flaw"}},{"type":"TextLink","bounds":[80,1175,339,12],"action":{"type":"URI","uri":"https://securelist.com/apt-trends-report-q2-2017/79332/"}},{"type":"TextLink","bounds":[80,1193,695,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/hacking-campaign-uses-old-microsoft-office-flaws-to-create-backdoors-steal-files/"}},{"type":"Link","bounds":[77,1102,744,17],"objref":"292","action":{"type":"URI","uri":"https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/ "}},{"type":"Link","bounds":[77,1119,503,19],"objref":"293","action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/58692/apt/ta459-apt-targets-financial-firms.html "}},{"type":"Link","bounds":[77,1138,772,32],"objref":"294","action":{"type":"URI","uri":"https://securelist.com/gaza-cybergang-updated-2017-activity/82765/ "}},{"type":"Link","bounds":[77,1157,553,34],"objref":"295","action":{"type":"URI","uri":"https://www.securityweek.com/iranian-cyberspies-exploit-recently-patched-office-flaw; https://securelist.com/apt-trends-report-q2-2017/79332/  "}},{"type":"Link","bounds":[77,1190,703,19],"objref":"296","action":{"type":"URI","uri":"https://www.zdnet.com/article/hacking-campaign-uses-old-microsoft-office-flaws-to-create-backdoors-steal-files/ "}}]},{"page":11,"annotations":[{"type":"Link","bounds":[80,1198,284,17],"objref":"310","action":{"type":"URI","uri":"https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf "}},{"type":"Link","bounds":[529,484,41,41],"objref":"311","action":{"type":"GoTo","page":9,"zoom":"XYZ null null null"}},{"type":"Highlight","bounds":[445,326,52,25],"objref":"312","title":"OFrenkel","appearance":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADQAAAAYCAYAAAC1Ft6mAAAAd0lEQVR42u3XIQ6AQAwEwKYGR5AEHA4Dov9/WzlxJJgL4G63bbIPmKxoKxJh3H0tsZ7zBzP2jqnZv4IMKMMbZgMDGVM7d7SFUVDQwgayFuhkAxkDSNmOggQlKEEJkjCLlev0AV6uc5z3ge7Bq6CJpp0H6qDBoM8FRYf1Vnvt3kYAAAAASUVORK5CYII="}]}]},"created_at":"2022-11-14T15:21:23.897205Z","updated_at":"2026-04-17T04:58:54.557608Z","original_name":"cognyte-cve-report-6-2021.pdf","uuid":"ef977b92-fac9-4fae-ac56-6322745f91ed","description":"Vulnerability Threat Intelligence Report In-depth analysis of Common Vulnerabilities and Exposures (CVE) in the past year June 2021 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}