Content Retrieve Api
GET /api/content/fd4d2baa-de3a-4257-8f81-bee2efd4e961/?format=api
{ "content_customizations": null, "shortcut_customizations": [ { "id": 5660, "created_at": "2023-04-04T09:01:50.988930Z", "updated_at": "2023-04-04T09:01:51.002158Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/d94cfb99a4804f92a0e8a9329fdb9f06/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/original_file.pdf" }, "content": 6364 } ], "content_thumbnail": { "original": "/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails/1.jpg", "high_quality": { "small": "/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/1.jpg", "medium": "/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/1_medium.jpg", "large": "/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/preview.jpg" } }, "version": { "version_number": 1, "version_details": { "uuid": "fd4d2baa-de3a-4257-8f81-bee2efd4e961", "name": "Luminar_Annual Threat_Landscape_RP", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "base_shorten": "536c631e", "tags": [] }, "is_active": true, "type": "DESKTOP", "version": "fd4d2baa-de3a-4257-8f81-bee2efd4e961", "content_uuid": "fd4d2baa-de3a-4257-8f81-bee2efd4e961", "version_id": "fd4d2baa-de3a-4257-8f81-bee2efd4e961" }, "custom_events": [], "content_action": null, "content_stats": null, "content_meta_tags": { "url_title": "luminar-annual-threat-landscape-report-2023", "title": "Annual Threat Landscape Report 2023", "description": "The Shift from Traditional Underground Cybercrime Platforms to Telegram", "og_enabled": true, "seo_enabled": false, "version": "fd4d2baa-de3a-4257-8f81-bee2efd4e961" }, "keywords": [], "seo_content_version_name": "luminar-annual-threat-landscape-rp", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/536c631e/", "base_url": "/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4", "config": { "pagecount": 35, "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ] }, "annotations": { "pages": [ { "page": 33, "annotations": [ { "type": "Link", "bounds": [ 90, 339, 49, 22 ], "objref": "252", "action": { "type": "URI", "uri": "https://www.cisecurity.org/cybersecurity-threats/alert-level/" } } ] }, { "page": 2, "annotations": [ { "type": "Link", "bounds": [ 81, 350, 524, 26 ], "objref": "28", "action": { "type": "GoTo", "page": 4, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 92, 376, 514, 23 ], "objref": "33", "action": { "type": "GoTo", "page": 4, "zoom": "XYZ 79 733 0" } }, { "type": "Link", "bounds": [ 81, 399, 524, 25 ], "objref": "34", "action": { "type": "GoTo", "page": 6, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 92, 423, 514, 25 ], "objref": "37", "action": { "type": "GoTo", "page": 6, "zoom": "XYZ 79 650 0" } }, { "type": "Link", "bounds": [ 92, 448, 514, 23 ], "objref": "38", "action": { "type": "GoTo", "page": 7, "zoom": "XYZ 79 548 0" } }, { "type": "Link", "bounds": [ 92, 471, 514, 23 ], "objref": "40", "action": { "type": "GoTo", "page": 8, "zoom": "XYZ 79 557 0" } }, { "type": "Link", "bounds": [ 81, 494, 524, 26 ], "objref": "42", "action": { "type": "GoTo", "page": 11, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 92, 520, 514, 23 ], "objref": "46", "action": { "type": "GoTo", "page": 11, "zoom": "XYZ 79 985 0" } }, { "type": "Link", "bounds": [ 92, 543, 514, 23 ], "objref": "47", "action": { "type": "GoTo", "page": 13, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 101, 565, 503, 25 ], "objref": "50", "action": { "type": "GoTo", "page": 13, "zoom": "XYZ 79 935 0" } }, { "type": "Link", "bounds": [ 101, 590, 503, 25 ], "objref": "51", "action": { "type": "GoTo", "page": 14, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 101, 614, 503, 26 ], "objref": "53", "action": { "type": "GoTo", "page": 14, "zoom": "XYZ 79 753 0" } }, { "type": "Link", "bounds": [ 101, 640, 503, 25 ], "objref": "59", "action": { "type": "GoTo", "page": 15, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 101, 665, 503, 25 ], "objref": "61", "action": { "type": "GoTo", "page": 15, "zoom": "XYZ 79 634 0" } }, { "type": "Link", "bounds": [ 81, 689, 524, 25 ], "objref": "62", "action": { "type": "GoTo", "page": 17, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 92, 714, 514, 25 ], "objref": "65", "action": { "type": "GoTo", "page": 17, "zoom": "XYZ 79 985 0" } }, { "type": "Link", "bounds": [ 101, 738, 503, 25 ], "objref": "66", "action": { "type": "GoTo", "page": 17, "zoom": "XYZ 79 779 0" } }, { "type": "Link", "bounds": [ 101, 763, 503, 25 ], "objref": "67", "action": { "type": "GoTo", "page": 18, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 101, 787, 503, 25 ], "objref": "69", "action": { "type": "GoTo", "page": 19, "zoom": "XYZ 79 800 0" } }, { "type": "Link", "bounds": [ 92, 811, 514, 23 ], "objref": "71", "action": { "type": "GoTo", "page": 19, "zoom": "XYZ 79 519 0" } }, { "type": "Link", "bounds": [ 101, 834, 503, 26 ], "objref": "72", "action": { "type": "GoTo", "page": 20, "zoom": "XYZ 79 672 0" } }, { "type": "Link", "bounds": [ 101, 860, 503, 25 ], "objref": "74", "action": { "type": "GoTo", "page": 21, "zoom": "XYZ 79 757 0" } }, { "type": "Link", "bounds": [ 101, 885, 503, 25 ], "objref": "76", "action": { "type": "GoTo", "page": 22, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 81, 909, 524, 25 ], "objref": "78", "action": { "type": "GoTo", "page": 23, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 81, 934, 524, 26 ], "objref": "80", "action": { "type": "GoTo", "page": 29, "zoom": "XYZ 79 1028 0" } } ] }, { "page": 3, "annotations": [ { "type": "Link", "bounds": [ 92, 290, 514, 25 ], "objref": "88", "action": { "type": "GoTo", "page": 29, "zoom": "XYZ 79 985 0" } }, { "type": "Link", "bounds": [ 92, 315, 514, 23 ], "objref": "89", "action": { "type": "GoTo", "page": 29, "zoom": "XYZ 79 575 0" } }, { "type": "Link", "bounds": [ 81, 338, 524, 25 ], "objref": "90", "action": { "type": "GoTo", "page": 32, "zoom": "XYZ 79 1028 0" } }, { "type": "Link", "bounds": [ 81, 362, 524, 26 ], "objref": "94", "action": { "type": "GoTo", "page": 33, "zoom": "XYZ 79 1028 0" } } ] }, { "page": 6, "annotations": [ { "type": "TextLink", "bounds": [ 89, 900, 364, 11 ], "action": { "type": "URI", "uri": "https://www.zerofox.com/blog/blog-dark-web-forums-are-they-here-to-stay/" } }, { "type": "TextLink", "bounds": [ 89, 924, 300, 11 ], "action": { "type": "URI", "uri": "https://www.kaspersky.com/resource-center/threats/deep-web" } }, { "type": "TextLink", "bounds": [ 89, 949, 394, 11 ], "action": { "type": "URI", "uri": "https://www.cybereason.com/blog/what-is-the-dark-web-ransomware-marketplace" } }, { "type": "Link", "bounds": [ 87, 900, 370, 25 ], "objref": "113", "action": { "type": "URI", "uri": "https://www.zerofox.com/blog/blog-dark-web-forums-are-they-here-to-stay/" } }, { "type": "Link", "bounds": [ 87, 924, 307, 25 ], "objref": "114", "action": { "type": "URI", "uri": "https://www.kaspersky.com/resource-center/threats/deep-web" } }, { "type": "Link", "bounds": [ 87, 949, 400, 25 ], "objref": "115", "action": { "type": "URI", "uri": "https://www.cybereason.com/blog/what-is-the-dark-web-ransomware-marketplace" } } ] }, { "page": 7, "annotations": [ { "type": "TextLink", "bounds": [ 89, 949, 362, 11 ], "action": { "type": "URI", "uri": "https://intel471.com/blog/how-threat-actors-use-underground-marketplaces" } }, { "type": "Link", "bounds": [ 87, 949, 368, 25 ], "objref": "119", "action": { "type": "URI", "uri": "https://intel471.com/blog/how-threat-actors-use-underground-marketplaces" } } ] }, { "page": 8, "annotations": [ { "type": "TextLink", "bounds": [ 89, 949, 480, 11 ], "action": { "type": "URI", "uri": "https://www.paloaltonetworks.com/blog/2022/03/ransomware-trends-demands-dark-web-leak-sites/" } }, { "type": "Link", "bounds": [ 87, 949, 486, 25 ], "objref": "122", "action": { "type": "URI", "uri": "https://www.paloaltonetworks.com/blog/2022/03/ransomware-trends-demands-dark-web-leak-sites/" } } ] }, { "page": 9, "annotations": [ { "type": "TextLink", "bounds": [ 89, 854, 492, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/" } }, { "type": "TextLink", "bounds": [ 83, 869, 23, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/" } }, { "type": "TextLink", "bounds": [ 89, 894, 512, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/" } }, { "type": "TextLink", "bounds": [ 83, 909, 43, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/" } }, { "type": "TextLink", "bounds": [ 89, 934, 506, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/" } }, { "type": "TextLink", "bounds": [ 83, 949, 74, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/" } }, { "type": "Link", "bounds": [ 87, 854, 518, 15 ], "objref": "125", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/" } }, { "type": "Link", "bounds": [ 81, 869, 31, 25 ], "objref": "126", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/" } }, { "type": "Link", "bounds": [ 87, 894, 518, 15 ], "objref": "127", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/" } }, { "type": "Link", "bounds": [ 81, 909, 49, 25 ], "objref": "128", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/" } }, { "type": "Link", "bounds": [ 87, 934, 518, 15 ], "objref": "129", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/" } }, { "type": "Link", "bounds": [ 81, 949, 81, 25 ], "objref": "130", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/" } } ] }, { "page": 10, "annotations": [ { "type": "TextLink", "bounds": [ 89, 909, 480, 11 ], "action": { "type": "URI", "uri": "https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against" } }, { "type": "TextLink", "bounds": [ 83, 924, 121, 11 ], "action": { "type": "URI", "uri": "https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against" } }, { "type": "TextLink", "bounds": [ 92, 949, 468, 11 ], "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html" } }, { "type": "Link", "bounds": [ 87, 909, 518, 15 ], "objref": "133", "action": { "type": "URI", "uri": "https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against" } }, { "type": "Link", "bounds": [ 81, 924, 125, 25 ], "objref": "134", "action": { "type": "URI", "uri": "https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against" } }, { "type": "Link", "bounds": [ 90, 949, 475, 25 ], "objref": "135", "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html" } } ] }, { "page": 11, "annotations": [ { "type": "TextLink", "bounds": [ 92, 845, 306, 11 ], "action": { "type": "URI", "uri": "https://www.forbes.com/profile/pavel-durov/?sh=520cd6a114c5" } }, { "type": "TextLink", "bounds": [ 92, 869, 503, 11 ], "action": { "type": "URI", "uri": "https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news" } }, { "type": "TextLink", "bounds": [ 83, 885, 23, 11 ], "action": { "type": "URI", "uri": "https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news" } }, { "type": "TextLink", "bounds": [ 92, 909, 324, 11 ], "action": { "type": "URI", "uri": "https://flashpoint.io/blog/telegram-intelligence-ukraine-russian-war/" } }, { "type": "TextLink", "bounds": [ 92, 934, 459, 11 ], "action": { "type": "URI", "uri": "https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps" } }, { "type": "TextLink", "bounds": [ 83, 949, 74, 11 ], "action": { "type": "URI", "uri": "https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps" } }, { "type": "Link", "bounds": [ 90, 845, 312, 25 ], "objref": "142", "action": { "type": "URI", "uri": "https://www.forbes.com/profile/pavel-durov/?sh=520cd6a114c5" } }, { "type": "Link", "bounds": [ 90, 869, 515, 15 ], "objref": "143", "action": { "type": "URI", "uri": "https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news" } }, { "type": "Link", "bounds": [ 81, 885, 29, 25 ], "objref": "144", "action": { "type": "URI", "uri": "https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news" } }, { "type": "Link", "bounds": [ 90, 909, 330, 25 ], "objref": "145", "action": { "type": "URI", "uri": "https://flashpoint.io/blog/telegram-intelligence-ukraine-russian-war/" } }, { "type": "Link", "bounds": [ 90, 934, 515, 15 ], "objref": "146", "action": { "type": "URI", "uri": "https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps" } }, { "type": "Link", "bounds": [ 81, 949, 80, 25 ], "objref": "147", "action": { "type": "URI", "uri": "https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps" } } ] }, { "page": 12, "annotations": [ { "type": "TextLink", "bounds": [ 92, 752, 468, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2019/03/14/telegram-gets-3m-new-signups-during-facebook-apps-outage/" } }, { "type": "TextLink", "bounds": [ 92, 776, 478, 11 ], "action": { "type": "URI", "uri": "https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification" } }, { "type": "TextLink", "bounds": [ 83, 792, 112, 11 ], "action": { "type": "URI", "uri": "https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification" } }, { "type": "TextLink", "bounds": [ 92, 816, 504, 11 ], "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on" } }, { "type": "TextLink", "bounds": [ 83, 831, 139, 11 ], "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on" } }, { "type": "TextLink", "bounds": [ 83, 845, 381, 11 ], "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on" } }, { "type": "TextLink", "bounds": [ 92, 885, 394, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2022/12/06/telegram-premium-tops-1-million-subscribers/" } }, { "type": "TextLink", "bounds": [ 92, 909, 292, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2018/01/08/telegram-open-network/" } }, { "type": "TextLink", "bounds": [ 92, 934, 509, 11 ], "action": { "type": "URI", "uri": "https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9" } }, { "type": "TextLink", "bounds": [ 83, 949, 242, 11 ], "action": { "type": "URI", "uri": "https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9" } }, { "type": "Link", "bounds": [ 90, 750, 474, 25 ], "objref": "149", "action": { "type": "URI", "uri": "https://techcrunch.com/2019/03/14/telegram-gets-3m-new-signups-during-facebook-apps-outage/" } }, { "type": "Link", "bounds": [ 90, 775, 515, 15 ], "objref": "150", "action": { "type": "URI", "uri": "https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification" } }, { "type": "Link", "bounds": [ 81, 790, 119, 25 ], "objref": "151", "action": { "type": "URI", "uri": "https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification" } }, { "type": "Link", "bounds": [ 90, 814, 515, 15 ], "objref": "152", "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation" } }, { "type": "Link", "bounds": [ 81, 830, 524, 15 ], "objref": "153", "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation" } }, { "type": "Link", "bounds": [ 81, 845, 524, 15 ], "objref": "154", "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation" } }, { "type": "Link", "bounds": [ 81, 860, 145, 25 ], "objref": "155", "action": { "type": "URI", "uri": "https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation" } }, { "type": "Link", "bounds": [ 90, 885, 400, 25 ], "objref": "156", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/12/06/telegram-premium-tops-1-million-subscribers/" } }, { "type": "Link", "bounds": [ 90, 909, 298, 25 ], "objref": "157", "action": { "type": "URI", "uri": "https://techcrunch.com/2018/01/08/telegram-open-network/" } }, { "type": "Link", "bounds": [ 90, 934, 515, 15 ], "objref": "158", "action": { "type": "URI", "uri": "https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9" } }, { "type": "Link", "bounds": [ 81, 949, 248, 25 ], "objref": "159", "action": { "type": "URI", "uri": "https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9" } } ] }, { "page": 13, "annotations": [ { "type": "TextLink", "bounds": [ 92, 949, 162, 11 ], "action": { "type": "URI", "uri": "https://telegram.org/faq_channels" } }, { "type": "Link", "bounds": [ 90, 949, 170, 25 ], "objref": "168", "action": { "type": "URI", "uri": "https://telegram.org/faq_channels" } } ] }, { "page": 14, "annotations": [ { "type": "TextLink", "bounds": [ 92, 807, 492, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/" } }, { "type": "TextLink", "bounds": [ 83, 821, 116, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/" } }, { "type": "TextLink", "bounds": [ 83, 860, 303, 11 ], "action": { "type": "URI", "uri": "https://telegram.org/faq#:~:text=You%20can%20log%20in%20to" } }, { "type": "TextLink", "bounds": [ 92, 885, 465, 11 ], "action": { "type": "URI", "uri": "https://cointelegraph.com/news/telegram-to-allow-no-sim-accounts-via-anon-blockchain-numbers" } }, { "type": "TextLink", "bounds": [ 92, 909, 509, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/" } }, { "type": "TextLink", "bounds": [ 83, 924, 66, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/" } }, { "type": "TextLink", "bounds": [ 92, 949, 164, 11 ], "action": { "type": "URI", "uri": "https://core.telegram.org/mtproto" } }, { "type": "Link", "bounds": [ 90, 805, 515, 15 ], "objref": "170", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/" } }, { "type": "Link", "bounds": [ 81, 821, 122, 25 ], "objref": "171", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/" } }, { "type": "Link", "bounds": [ 81, 860, 520, 25 ], "objref": "172", "action": { "type": "URI", "uri": "https://telegram.org/faq#:~:text=You%20can%20log%20in%20to,cloud%20chats%20will%20sync%20instantly" } }, { "type": "Link", "bounds": [ 90, 885, 471, 25 ], "objref": "173", "action": { "type": "URI", "uri": "https://cointelegraph.com/news/telegram-to-allow-no-sim-accounts-via-anon-blockchain-numbers" } }, { "type": "Link", "bounds": [ 90, 909, 515, 15 ], "objref": "174", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/" } }, { "type": "Link", "bounds": [ 81, 924, 72, 25 ], "objref": "175", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/" } }, { "type": "Link", "bounds": [ 90, 949, 170, 25 ], "objref": "176", "action": { "type": "URI", "uri": "https://core.telegram.org/mtproto" } } ] }, { "page": 15, "annotations": [ { "type": "TextLink", "bounds": [ 92, 876, 139, 11 ], "action": { "type": "URI", "uri": "https://core.telegram.org/api" } }, { "type": "TextLink", "bounds": [ 92, 900, 144, 11 ], "action": { "type": "URI", "uri": "https://core.telegram.org/bots" } }, { "type": "TextLink", "bounds": [ 92, 924, 174, 11 ], "action": { "type": "URI", "uri": "https://core.telegram.org/bots/inline" } }, { "type": "TextLink", "bounds": [ 92, 949, 158, 11 ], "action": { "type": "URI", "uri": "https://instantview.telegram.org/" } }, { "type": "Link", "bounds": [ 90, 876, 145, 25 ], "objref": "178", "action": { "type": "URI", "uri": "https://core.telegram.org/api" } }, { "type": "Link", "bounds": [ 90, 900, 151, 25 ], "objref": "179", "action": { "type": "URI", "uri": "https://core.telegram.org/bots" } }, { "type": "Link", "bounds": [ 90, 924, 182, 25 ], "objref": "180", "action": { "type": "URI", "uri": "https://core.telegram.org/bots/inline" } }, { "type": "Link", "bounds": [ 90, 949, 164, 25 ], "objref": "181", "action": { "type": "URI", "uri": "https://instantview.telegram.org/" } } ] }, { "page": 16, "annotations": [ { "type": "TextLink", "bounds": [ 92, 949, 271, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2016/11/22/telegram-telegraph/" } }, { "type": "Link", "bounds": [ 90, 949, 277, 25 ], "objref": "183", "action": { "type": "URI", "uri": "https://techcrunch.com/2016/11/22/telegram-telegraph/" } } ] }, { "page": 17, "annotations": [ { "type": "TextLink", "bounds": [ 92, 854, 402, 11 ], "action": { "type": "URI", "uri": "https://krebsonsecurity.com/2022/04/raidforums-get-raided-alleged-admin-arrested/" } }, { "type": "TextLink", "bounds": [ 92, 879, 471, 11 ], "action": { "type": "URI", "uri": "https://www.cnbc.com/2022/04/05/darknet-hydra-market-site-seized-and-shut-down-doj-says.html" } }, { "type": "TextLink", "bounds": [ 90, 903, 338, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAA" } }, { "type": "TextLink", "bounds": [ 83, 918, 515, 11 ], "action": { "type": "URI", "uri": "https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAA" } }, { "type": "Link", "bounds": [ 90, 854, 410, 25 ], "objref": "185", "action": { "type": "URI", "uri": "https://krebsonsecurity.com/2022/04/raidforums-get-raided-alleged-admin-arrested/" } }, { "type": "Link", "bounds": [ 90, 879, 477, 25 ], "objref": "186", "action": { "type": "URI", "uri": "https://www.cnbc.com/2022/04/05/darknet-hydra-market-site-seized-and-shut-down-doj-says.html" } }, { "type": "Link", "bounds": [ 89, 903, 517, 15 ], "objref": "187", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi" } }, { "type": "Link", "bounds": [ 81, 918, 524, 15 ], "objref": "188", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi" } }, { "type": "Link", "bounds": [ 81, 934, 524, 15 ], "objref": "189", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi" } }, { "type": "Link", "bounds": [ 81, 949, 506, 25 ], "objref": "190", "action": { "type": "URI", "uri": "https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi" } } ] }, { "page": 18, "annotations": [ { "type": "TextLink", "bounds": [ 92, 869, 417, 11 ], "action": { "type": "URI", "uri": "https://intel471.com/blog/mazafaka-hacked-cybercrime-forums-exploit-crdclub-verified/" } }, { "type": "TextLink", "bounds": [ 92, 894, 504, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/" } }, { "type": "TextLink", "bounds": [ 83, 909, 63, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/" } }, { "type": "TextLink", "bounds": [ 92, 934, 492, 11 ], "action": { "type": "URI", "uri": "https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own" } }, { "type": "TextLink", "bounds": [ 83, 949, 19, 11 ], "action": { "type": "URI", "uri": "https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own" } }, { "type": "Link", "bounds": [ 90, 869, 423, 25 ], "objref": "192", "action": { "type": "URI", "uri": "https://intel471.com/blog/mazafaka-hacked-cybercrime-forums-exploit-crdclub-verified/" } }, { "type": "Link", "bounds": [ 90, 894, 515, 15 ], "objref": "193", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/" } }, { "type": "Link", "bounds": [ 81, 909, 69, 25 ], "objref": "194", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/" } }, { "type": "Link", "bounds": [ 90, 934, 515, 15 ], "objref": "195", "action": { "type": "URI", "uri": "https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own" } }, { "type": "Link", "bounds": [ 81, 949, 25, 25 ], "objref": "196", "action": { "type": "URI", "uri": "https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own" } } ] }, { "page": 19, "annotations": [ { "type": "TextLink", "bounds": [ 92, 876, 319, 11 ], "action": { "type": "URI", "uri": "https://therecord.media/dark-web-marketplace-torrez-shuts-down/" } }, { "type": "TextLink", "bounds": [ 92, 900, 497, 11 ], "action": { "type": "URI", "uri": "https://www.darkreading.com/threat-intelligence/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks" } }, { "type": "TextLink", "bounds": [ 92, 924, 347, 11 ], "action": { "type": "URI", "uri": "https://www.cyberscoop.com/colonial-pipeline-ransomware-xss-criminal/" } }, { "type": "TextLink", "bounds": [ 92, 949, 443, 11 ], "action": { "type": "URI", "uri": "https://securityintelligence.com/news/ransomware-gangs-using-data-leak-sites-new-affiliates/" } }, { "type": "Link", "bounds": [ 90, 876, 326, 25 ], "objref": "200", "action": { "type": "URI", "uri": "https://therecord.media/dark-web-marketplace-torrez-shuts-down/" } }, { "type": "Link", "bounds": [ 90, 900, 503, 25 ], "objref": "201", "action": { "type": "URI", "uri": "https://www.darkreading.com/threat-intelligence/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks" } }, { "type": "Link", "bounds": [ 90, 924, 353, 25 ], "objref": "202", "action": { "type": "URI", "uri": "https://www.cyberscoop.com/colonial-pipeline-ransomware-xss-criminal/" } }, { "type": "Link", "bounds": [ 90, 949, 451, 25 ], "objref": "203", "action": { "type": "URI", "uri": "https://securityintelligence.com/news/ransomware-gangs-using-data-leak-sites-new-affiliates/" } } ] }, { "page": 20, "annotations": [ { "type": "TextLink", "bounds": [ 92, 885, 491, 11 ], "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/" } }, { "type": "TextLink", "bounds": [ 83, 900, 86, 11 ], "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/" } }, { "type": "TextLink", "bounds": [ 92, 924, 446, 11 ], "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2022/03/02/telegram-becomes-a-digital-forefront-in-the-conflict/" } }, { "type": "TextLink", "bounds": [ 92, 949, 335, 11 ], "action": { "type": "URI", "uri": "https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram" } }, { "type": "Link", "bounds": [ 90, 885, 515, 15 ], "objref": "205", "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/" } }, { "type": "Link", "bounds": [ 81, 900, 92, 25 ], "objref": "206", "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/" } }, { "type": "Link", "bounds": [ 90, 924, 454, 25 ], "objref": "207", "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2022/03/02/telegram-becomes-a-digital-forefront-in-the-conflict/" } }, { "type": "Link", "bounds": [ 90, 949, 341, 25 ], "objref": "208", "action": { "type": "URI", "uri": "https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram" } } ] }, { "page": 21, "annotations": [ { "type": "TextLink", "bounds": [ 92, 924, 480, 11 ], "action": { "type": "URI", "uri": "https://intel471.com/blog/how-cybercriminals-are-using-messaging-apps-to-launch-malware-schemes" } }, { "type": "TextLink", "bounds": [ 92, 949, 335, 11 ], "action": { "type": "URI", "uri": "https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram" } }, { "type": "Link", "bounds": [ 90, 924, 486, 25 ], "objref": "210", "action": { "type": "URI", "uri": "https://intel471.com/blog/how-cybercriminals-are-using-messaging-apps-to-launch-malware-schemes" } }, { "type": "Link", "bounds": [ 90, 949, 341, 25 ], "objref": "211", "action": { "type": "URI", "uri": "https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram" } } ] }, { "page": 22, "annotations": [ { "type": "TextLink", "bounds": [ 92, 949, 286, 11 ], "action": { "type": "URI", "uri": "https://www.vpnmentor.com/blog/cybercrime-on-telegram/" } }, { "type": "Link", "bounds": [ 90, 949, 292, 25 ], "objref": "213", "action": { "type": "URI", "uri": "https://www.vpnmentor.com/blog/cybercrime-on-telegram/" } } ] }, { "page": 23, "annotations": [ { "type": "TextLink", "bounds": [ 92, 900, 460, 11 ], "action": { "type": "URI", "uri": "https://news.cybersixgill.com/telegram-a-cybercriminal-hotspot-compromised-financial-accounts/" } }, { "type": "TextLink", "bounds": [ 92, 924, 382, 11 ], "action": { "type": "URI", "uri": "https://www.ptsecurity.com/ww-en/analytics/cybercriminal-market-in-telegram/" } }, { "type": "TextLink", "bounds": [ 92, 949, 356, 11 ], "action": { "type": "URI", "uri": "https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf" } }, { "type": "Link", "bounds": [ 90, 900, 468, 25 ], "objref": "215", "action": { "type": "URI", "uri": "https://news.cybersixgill.com/telegram-a-cybercriminal-hotspot-compromised-financial-accounts/" } }, { "type": "Link", "bounds": [ 90, 924, 388, 25 ], "objref": "216", "action": { "type": "URI", "uri": "https://www.ptsecurity.com/ww-en/analytics/cybercriminal-market-in-telegram/" } }, { "type": "Link", "bounds": [ 90, 949, 361, 25 ], "objref": "217", "action": { "type": "URI", "uri": "https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf" } } ] }, { "page": 29, "annotations": [ { "type": "TextLink", "bounds": [ 92, 885, 286, 11 ], "action": { "type": "URI", "uri": "https://www.vpnmentor.com/blog/cybercrime-on-telegram/" } }, { "type": "TextLink", "bounds": [ 92, 909, 454, 11 ], "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/" } }, { "type": "TextLink", "bounds": [ 92, 934, 483, 11 ], "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/" } }, { "type": "TextLink", "bounds": [ 83, 949, 150, 11 ], "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/" } }, { "type": "Link", "bounds": [ 90, 885, 292, 25 ], "objref": "234", "action": { "type": "URI", "uri": "https://www.vpnmentor.com/blog/cybercrime-on-telegram/" } }, { "type": "Link", "bounds": [ 90, 909, 460, 25 ], "objref": "235", "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/" } }, { "type": "Link", "bounds": [ 90, 934, 515, 15 ], "objref": "236", "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/" } }, { "type": "Link", "bounds": [ 81, 949, 156, 25 ], "objref": "237", "action": { "type": "URI", "uri": "https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/" } } ] }, { "page": 30, "annotations": [ { "type": "TextLink", "bounds": [ 92, 787, 387, 11 ], "action": { "type": "URI", "uri": "https://www.cybersprint.com/news/how-criminals-are-tracked-down-on-telegram" } }, { "type": "TextLink", "bounds": [ 92, 811, 333, 11 ], "action": { "type": "URI", "uri": "https://www.ft.com/content/cc3e3854-5f76-4422-a970-9010c3bc732b" } }, { "type": "TextLink", "bounds": [ 92, 836, 174, 11 ], "action": { "type": "URI", "uri": "https://telegram.org/privacy?setln=it" } }, { "type": "TextLink", "bounds": [ 92, 860, 410, 11 ], "action": { "type": "URI", "uri": "https://www.washingtonpost.com/technology/2021/01/15/parler-telegram-chat-apps/" } }, { "type": "TextLink", "bounds": [ 92, 885, 468, 11 ], "action": { "type": "URI", "uri": "https://www.dw.com/en/german-police-pressure-telegram-to-delete-far-right-content/a-60453402" } }, { "type": "TextLink", "bounds": [ 92, 909, 454, 11 ], "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/" } }, { "type": "TextLink", "bounds": [ 92, 934, 475, 11 ], "action": { "type": "URI", "uri": "https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575" } }, { "type": "TextLink", "bounds": [ 83, 949, 229, 11 ], "action": { "type": "URI", "uri": "https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575" } }, { "type": "Link", "bounds": [ 90, 787, 394, 25 ], "objref": "239", "action": { "type": "URI", "uri": "https://www.cybersprint.com/news/how-criminals-are-tracked-down-on-telegram" } }, { "type": "Link", "bounds": [ 90, 811, 339, 25 ], "objref": "240", "action": { "type": "URI", "uri": "https://www.ft.com/content/cc3e3854-5f76-4422-a970-9010c3bc732b" } }, { "type": "Link", "bounds": [ 90, 836, 180, 25 ], "objref": "241", "action": { "type": "URI", "uri": "https://telegram.org/privacy?setln=it" } }, { "type": "Link", "bounds": [ 90, 860, 416, 25 ], "objref": "242", "action": { "type": "URI", "uri": "https://www.washingtonpost.com/technology/2021/01/15/parler-telegram-chat-apps/" } }, { "type": "Link", "bounds": [ 90, 885, 474, 25 ], "objref": "243", "action": { "type": "URI", "uri": "https://www.dw.com/en/german-police-pressure-telegram-to-delete-far-right-content/a-60453402" } }, { "type": "Link", "bounds": [ 90, 909, 460, 25 ], "objref": "244", "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/" } }, { "type": "Link", "bounds": [ 90, 934, 515, 15 ], "objref": "245", "action": { "type": "URI", "uri": "https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575" } }, { "type": "Link", "bounds": [ 81, 949, 235, 25 ], "objref": "246", "action": { "type": "URI", "uri": "https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575" } } ] }, { "page": 31, "annotations": [ { "type": "TextLink", "bounds": [ 92, 924, 422, 11 ], "action": { "type": "URI", "uri": "https://myntex.com/blog/index.php/2021/10/06/the-security-vulnerabilities-of-telegram/" } }, { "type": "TextLink", "bounds": [ 92, 949, 504, 11 ], "action": { "type": "URI", "uri": "https://theintercept.com/2021/09/21/surveillance-social-media-police-microsoft-shadowdragon-kaseware/" } }, { "type": "Link", "bounds": [ 90, 924, 429, 25 ], "objref": "248", "action": { "type": "URI", "uri": "https://myntex.com/blog/index.php/2021/10/06/the-security-vulnerabilities-of-telegram/" } }, { "type": "Link", "bounds": [ 90, 949, 512, 25 ], "objref": "249", "action": { "type": "URI", "uri": "https://theintercept.com/2021/09/21/surveillance-social-media-police-microsoft-shadowdragon-kaseware/" } } ] } ] }, "created_at": "2023-04-04T09:01:50.474197Z", "updated_at": "2026-02-22T10:36:50.520057Z", "original_name": "Luminar Annual Threat Landscape Report 2023.pdf", "uuid": "fd4d2baa-de3a-4257-8f81-bee2efd4e961", "description": "Annual Threat Landscape Report The Shift from Traditional Underground Cybercrime Platforms to Telegram TLP: Amber March 2023 ", "is_high_quality_thumbnails_available": true, "conversion_type": "DOCUMENT" }