GET /api/content/f9755207-6539-42ca-8667-837ad1f194f9/?format=api
HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "content_customizations": null,
    "shortcut_customizations": [
        {
            "id": 3562,
            "created_at": "2022-11-14T15:15:17.995776Z",
            "updated_at": "2022-11-14T15:15:18.001252Z",
            "action": "DOWNLOAD",
            "color": "#FFFFFF",
            "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/ce51e198c0b0462493657fc66b24aff5/download_icon.svg",
            "additional_data": {
                "download_url": "https://media.celero.io/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/original_file.pdf"
            },
            "content": 4266
        }
    ],
    "content_thumbnail": {
        "original": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails/1.jpg",
        "high_quality": {
            "small": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1.jpg",
            "medium": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1_medium.jpg",
            "large": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/1_large.jpg",
            "microsite_preview": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2/thumbnails_high_quality/preview.jpg"
        }
    },
    "version": {
        "version_number": 1,
        "version_details": {
            "uuid": "f9755207-6539-42ca-8667-837ad1f194f9",
            "name": "Cognyte Ransomware Report",
            "is_live": true,
            "access_control": {
                "min_stage": "EVERYONE_ALLOWED",
                "stage_options": {
                    "UNVERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE",
                        "form_id": "default"
                    },
                    "VERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE"
                    },
                    "GDPR_CONSENT": {},
                    "PRIVATE": {},
                    "EVERYONE_ALLOWED": {}
                }
            },
            "base_shorten": null,
            "tags": [
                1
            ]
        },
        "is_active": true,
        "type": "DESKTOP",
        "version": "f9755207-6539-42ca-8667-837ad1f194f9",
        "content_uuid": "f9755207-6539-42ca-8667-837ad1f194f9",
        "version_id": "f9755207-6539-42ca-8667-837ad1f194f9"
    },
    "custom_events": [],
    "content_action": null,
    "content_stats": {
        "version": "f9755207-6539-42ca-8667-837ad1f194f9",
        "visitors_count": 8,
        "lifetime_visitors_count": null,
        "last_seen": "2026-02-06T00:00:00Z",
        "last_updated": "2026-02-22T10:15:45Z",
        "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
    },
    "content_meta_tags": null,
    "keywords": [],
    "seo_content_version_name": "cognyte-ransomware-report",
    "html_snippets": null,
    "is_live": true,
    "shorten": "https://engage.cognyte.com/s/33bf338e/cognyte-ransomware-report/",
    "base_url": "/users/557/content/883c2f0777b74ccabc6ec5fe7f7e3701/_6qdkTT2",
    "config": {
        "pagecount": 38,
        "bounds": [
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ]
        ]
    },
    "annotations": {
        "pages": [
            {
                "page": 32,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/"
                        }
                    }
                ]
            },
            {
                "page": 34,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            355,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://developer.linkedin.com/docs/reference/industry-codes"
                        }
                    }
                ]
            },
            {
                "page": 6,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1193,
                            208,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cisa.gov/ransomware"
                        }
                    }
                ]
            },
            {
                "page": 8,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1164,
                            243,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://attack.mitre.org/tactics/TA0010/"
                        }
                    }
                ]
            },
            {
                "page": 9,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1199,
                            191,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/ransom"
                        }
                    }
                ]
            },
            {
                "page": 10,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            81,
                            1199,
                            659,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gangs-team-up-to-form-extortion-cartel/"
                        }
                    }
                ]
            },
            {
                "page": 13,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1187,
                            269,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://arstechnica.com/information-technolog"
                        }
                    }
                ]
            },
            {
                "page": 14,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1186,
                            164,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://intel471.com/blog/re"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1167,
                            159,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/net"
                        }
                    }
                ]
            },
            {
                "page": 15,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1204,
                            541,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-c"
                        }
                    }
                ]
            },
            {
                "page": 22,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1206,
                            529,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/"
                        }
                    }
                ]
            },
            {
                "page": 23,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1155,
                            561,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-c"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1174,
                            352,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securelist.com/ics-threat-predictions-for-2021/99613/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1120,
                            634,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            396,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Do"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1138,
                            492,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/"
                        }
                    }
                ]
            },
            {
                "page": 24,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1186,
                            653,
                            11
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1149,
                            613,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/"
                        }
                    }
                ]
            },
            {
                "page": 25,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1151,
                            303,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://kb.pulsesecure.net/articles/Pulse_Securit"
                        }
                    }
                ]
            },
            {
                "page": 26,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1137,
                            261,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://msrc.microsoft.com/update-guide/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1172,
                            139,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/r"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            148,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://media.defense.go"
                        }
                    }
                ]
            },
            {
                "page": 27,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1097,
                            761,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1115,
                            669,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1045,
                            446,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/"
                        }
                    }
                ]
            },
            {
                "page": 28,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1207,
                            113,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.sensec"
                        }
                    }
                ]
            },
            {
                "page": 29,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1172,
                            199,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://time.graphics/line/386203"
                        }
                    }
                ]
            }
        ]
    },
    "created_at": "2022-11-14T15:15:17.759679Z",
    "updated_at": "2026-02-22T10:38:42.707374Z",
    "original_name": "Cognyte-Ransomware-Report.pdf",
    "uuid": "f9755207-6539-42ca-8667-837ad1f194f9",
    "description": "GLOBAL THREAT INTELLIGENCE REPORT The Ransomware Landscape March 2021 ",
    "is_high_quality_thumbnails_available": true,
    "conversion_type": "DOCUMENT"
}
Shortcut customizations

Lists are not currently supported in HTML input.

Shortcut customizations

Lists are not currently supported in HTML input.