GET /api/content/f9755207-6539-42ca-8667-837ad1f194f9/
HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 4266,
    "content_customizations": null,
    "shortcut_customizations": [
        {
            "id": 3562,
            "created_at": "2022-11-14T15:15:17.995776Z",
            "updated_at": "2022-11-14T15:15:18.001252Z",
            "action": "DOWNLOAD",
            "color": "#FFFFFF",
            "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/ce51e198c0b0462493657fc66b24aff5/download_icon.svg",
            "additional_data": {
                "download_url": "https://media.celero.io/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/original_file.pdf"
            },
            "content": 4266
        }
    ],
    "content_thumbnail": {
        "original": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails/1.jpg",
        "high_quality": {
            "small": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1.jpg",
            "medium": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1_medium.jpg",
            "large": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1_large.jpg",
            "microsite_preview": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/preview.jpg"
        }
    },
    "edited_pages_metadata_count": {
        "all_pages_count": 38,
        "edited_pages_count": 0
    },
    "version": {
        "id": 4264,
        "version_number": 1,
        "version_details": {
            "uuid": "f9755207-6539-42ca-8667-837ad1f194f9",
            "created_at": "2022-11-14T15:15:18.452586Z",
            "updated_at": "2025-03-23T10:59:20.494886Z",
            "name": "Cognyte Ransomware Report",
            "is_live": true,
            "access_control": {
                "min_stage": "EVERYONE_ALLOWED",
                "stage_options": {
                    "UNVERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE",
                        "form_id": "default"
                    },
                    "VERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE"
                    },
                    "GDPR_CONSENT": {},
                    "PRIVATE": {},
                    "EVERYONE_ALLOWED": {}
                }
            },
            "tags": [
                1
            ]
        },
        "created_at": "2022-11-14T15:15:18.467696Z",
        "updated_at": "2022-11-14T15:15:18.467754Z",
        "content_version_name": "Cognyte-Ransomware-Report",
        "is_active": true,
        "type": "DESKTOP",
        "content": 4266,
        "version": "f9755207-6539-42ca-8667-837ad1f194f9",
        "content_uuid": "f9755207-6539-42ca-8667-837ad1f194f9",
        "version_id": "f9755207-6539-42ca-8667-837ad1f194f9"
    },
    "custom_events": [],
    "content_action": null,
    "content_stats": {
        "version": "f9755207-6539-42ca-8667-837ad1f194f9",
        "visitors_count": 1,
        "lifetime_visitors_count": 20,
        "last_seen": "2025-04-28T20:28:30Z",
        "last_updated": "2025-05-15T12:22:05Z",
        "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
    },
    "content_meta_tags": null,
    "keywords": [],
    "seo_content_version_name": "cognyte-ransomware-report",
    "html_snippets": null,
    "is_live": true,
    "shorten": "https://engage.cognyte.com/s/33bf338e/cognyte-ransomware-report/",
    "base_url": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2",
    "fonts": [
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/AdobeHebrew-Regular_d8.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/Oswald-Bold_di.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/Oswald-SemiBold_df.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Bold_dc.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-ExtraBold_d9.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Light_db.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Light_db_1.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Light_dj.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Medium_de.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Medium_dk.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Medium_dk_1.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Regular_da.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Regular_da_1.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Regular_da_2.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Regular_da_3.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Regular_da_4.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-Regular_dg.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dd.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh_1.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh_2.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh_3.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh_4.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh_5.woff",
        "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/fonts/WorkSans-SemiBold_dh_6.woff"
    ],
    "source_url": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2",
    "content_type": [],
    "created_at": "2022-11-14T15:15:17.759679Z",
    "updated_at": "2025-05-16T00:03:33.015498Z",
    "original_name": "Cognyte-Ransomware-Report.pdf",
    "original_content_type": "application/pdf",
    "original_file_extension": "pdf",
    "original_file_size": 8444031.0,
    "content_key": "users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2",
    "annotations": {
        "pages": [
            {
                "page": 32,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/"
                        }
                    }
                ]
            },
            {
                "page": 34,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            355,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://developer.linkedin.com/docs/reference/industry-codes"
                        }
                    }
                ]
            },
            {
                "page": 6,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1193,
                            208,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cisa.gov/ransomware"
                        }
                    }
                ]
            },
            {
                "page": 8,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1164,
                            243,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://attack.mitre.org/tactics/TA0010/"
                        }
                    }
                ]
            },
            {
                "page": 9,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1199,
                            191,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/ransom"
                        }
                    }
                ]
            },
            {
                "page": 10,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            81,
                            1199,
                            659,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gangs-team-up-to-form-extortion-cartel/"
                        }
                    }
                ]
            },
            {
                "page": 13,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1187,
                            269,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://arstechnica.com/information-technolog"
                        }
                    }
                ]
            },
            {
                "page": 14,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1186,
                            164,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://intel471.com/blog/re"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1167,
                            159,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/net"
                        }
                    }
                ]
            },
            {
                "page": 15,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1204,
                            541,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-c"
                        }
                    }
                ]
            },
            {
                "page": 22,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1206,
                            529,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/"
                        }
                    }
                ]
            },
            {
                "page": 23,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1155,
                            561,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-c"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1174,
                            352,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securelist.com/ics-threat-predictions-for-2021/99613/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1120,
                            634,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            396,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Do"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1138,
                            492,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/"
                        }
                    }
                ]
            },
            {
                "page": 24,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1186,
                            653,
                            11
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1149,
                            613,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/"
                        }
                    }
                ]
            },
            {
                "page": 25,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1151,
                            303,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://kb.pulsesecure.net/articles/Pulse_Securit"
                        }
                    }
                ]
            },
            {
                "page": 26,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1137,
                            261,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://msrc.microsoft.com/update-guide/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1172,
                            139,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/r"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            148,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://media.defense.go"
                        }
                    }
                ]
            },
            {
                "page": 27,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1097,
                            761,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1115,
                            669,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1045,
                            446,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/"
                        }
                    }
                ]
            },
            {
                "page": 28,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1207,
                            113,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.sensec"
                        }
                    }
                ]
            },
            {
                "page": 29,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1172,
                            199,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://time.graphics/line/386203"
                        }
                    }
                ]
            }
        ]
    },
    "config": {
        "pagecount": 38,
        "title": "",
        "author": "",
        "subject": "",
        "keywords": "",
        "creator": "Adobe InDesign 17.0 (Windows)",
        "producer": "GPL Ghostscript 9.50",
        "creationdate": "D:20220602130849Z00'00'",
        "moddate": "D:20220602130849Z00'00'",
        "trapped": "",
        "fileName": "_6qdkTT2.pdf",
        "bounds": [
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ]
        ],
        "bookmarks": [],
        "thumbnailType": "jpg",
        "pageType": "html",
        "pageLabels": []
    },
    "uuid": "f9755207-6539-42ca-8667-837ad1f194f9",
    "is_public": true,
    "description": "GLOBAL THREAT INTELLIGENCE REPORT The Ransomware Landscape March 2021 ",
    "views_count": 133,
    "is_high_quality_thumbnails_available": true,
    "is_archived": true,
    "conversion_type": "DOCUMENT",
    "user": 557
}
Shortcut customizations

Lists are not currently supported in HTML input.

Shortcut customizations

Lists are not currently supported in HTML input.