{"id":33591,"date":"2023-01-06T15:37:28","date_gmt":"2023-01-06T20:37:28","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=520243"},"modified":"2023-01-09T09:02:47","modified_gmt":"2023-01-09T14:02:47","slug":"cyber-security-today-week-in-review-for-friday-january-6-2023","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cyber-security-today-week-in-review-for-friday-january-6-2023\/","title":{"rendered":"Cyber Security Today, Week in Review for Friday, January 6, 2023"},"content":{"rendered":"<p data-ar-index=\"0\">Welcome to Cyber Security Today. This is the Week in Review edition for the week ending Friday, January 6th, 2023. From Toronto, I\u2019m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.<\/p>\n<p data-ar-index=\"1\"><iframe style=\"border: none;\" title=\"Libsyn Player\" src=\"https:\/\/html5-player.libsyn.com\/embed\/episode\/id\/25516044\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/000000\/\" width=\"100%\" height=\"90\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<table style=\"width: 100%;\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.amazon.com\/ITWC-Cyber-Security-Today\/dp\/B07BRNG89P\/ref=sr_1_1?s=digital-skills&amp;ie=UTF8&amp;qid=1522688435\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396718 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-alexa-200.png\" alt=\"Cyb er Security Today on Amazon Alexa\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.google.com\/podcasts?feed=aHR0cDovL2N5YmVyc2VjdXJpdHl0b2RheS5saWJzeW4uY29tL3Jzcw%3D%3D\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"thumbnail aligncenter wp-image-408712 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2018\/09\/sub-gp-200.png\" alt=\"Cyber Security Today on Google Podcasts\" width=\"200\" height=\"74\" \/><\/a><\/td>\n<td><a href=\"https:\/\/itunes.apple.com\/ca\/podcast\/cyber-security-today\/id1363182054\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-396720 size-full\" src=\"https:\/\/i.itworldcanada.com\/wp-content\/uploads\/2017\/09\/sub-itunes-200.png\" alt=\"Subscribe to Cyber Security Today on Apple Podcasts\" width=\"200\" height=\"74\" border=\"none\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-ar-index=\"2\">In a few minutes David Shipley of <a href=\"https:\/\/www.beauceronsecurity.com\/\" rel=\"noopener\">Beauceron Security<\/a> will join me to discuss recent news. But first here are some of the headlines from the past seven days:<\/p>\n<p data-ar-index=\"3\"><strong>The LockBit ransomware gang apologized<\/strong> for hitting Toronto\u2019s Hospital for Sick Children. <a href=\"https:\/\/www.itworldcanada.com\/article\/breaking-news-ransomware-gang-gives-decryptor-to-torontos-sickkids-hospital\/519841\" rel=\"noopener\">It blames<\/a> an affiliate for ignoring the criminal gang\u2019s rules against encrypting the data of hospitals. Is this apology just a PR stunt? That\u2019s one question I\u2019ll put to David.<\/p>\n<p data-ar-index=\"4\">We\u2019ll also discuss the rise of the ChatGPT tool. According to one news report Microsoft and OpenAI want to integrate this chatbot into the Bing search engine to fight Google\u2019s lead in online search. David and I will discuss how threat actors also might use this tool.<\/p>\n<p data-ar-index=\"5\">And we\u2019ll look at the increasing trend of threat actors stealing digital tokens to get around multifactor authentication. The latest victim is the Slack instant messaging platform, which at the end of December admitted a hacker was downloaded company code from GitHub after getting hold of digital tokens of employees.<\/p>\n<p data-ar-index=\"6\">In other news, Twitter account information on 200 million users<a href=\"https:\/\/www.itworldcanada.com\/article\/stolen-data-on-200-million-twitter-users-now-being-given-away\/520070\" rel=\"noopener\"> is now available for free<\/a> on a hacker forum. The data was offered for sale on the dark web for US$200,000 in December.<\/p>\n<p data-ar-index=\"7\">Developers using the open-source PyTorch machine learning framework <a href=\"https:\/\/www.itworldcanada.com\/article\/pytorch-users-warned-of-malicious-copy-in-pypi-registry\/519879\" rel=\"noopener\">were warned<\/a> they may have downloaded a compromised version of the package from the PyPI repository over the holidays. PyTorch says someone was able to add a package with a spoofed name to the nightly package it puts on PyPI. It\u2019s just the latest example of an open-source repository being abused by threat actors.<\/p>\n<p data-ar-index=\"8\">Application developers using the CircleCI continuous integration platform <a href=\"https:\/\/www.itworldcanada.com\/article\/devops-platform-circleci-urges-users-to-rotate-all-secrets\/520184\" rel=\"noopener\">were also warned<\/a> to change passwords, API keys, and digital certificates stored in the system after the discovery of an unspecified security incident.<\/p>\n<p data-ar-index=\"9\">Zoho <a href=\"https:\/\/pitstop.manageengine.com\/portal\/en\/community\/topic\/manageengine-security-advisory%E2%80%94important-security-fix-released-for-manageengine-password-manager-pro-2-1-2023\" rel=\"noopener\">is urging IT administrators<\/a> to install a security fix for ManageEngine Password Manager Pro. This is to fix a high-severity SQL injection vulnerability.<\/p>\n<p data-ar-index=\"10\">And <a href=\"https:\/\/samcurry.net\/web-hackers-vs-the-auto-industry\/\" rel=\"noopener\">security researchers found<\/a> vulnerabilities in the remote access capabilities of vehicles from 16 car manufacturers. Not only could some vehicles be started remotely, personal information of car owners could be stolen.<\/p>\n<p data-ar-index=\"11\"><span style=\"font-size: medium;\"><i>(The following transcript has been edited for clarity)<\/i><\/span><\/p>\n<p data-ar-index=\"12\"><span style=\"font-size: medium;\"><strong>Howard:<\/strong> We\u2019ll start with the ransomware attack on Toronto\u2019s Hospital for Sick Children. Known as SickKids for short, the attack started last month and the LockBit gang took credit. And then on New Year\u2019s Eve it issued a sudden apology. An affiliate of the gang was responsible for violating a rule against hitting hospitals. The gang said it \u201cformally\u201d apologizes, and the partner who did this is no longer affiliated with them. Not only that, the head of LockBit sent the hospital a decryptor to help it unscramble and recover files. Oh, my gosh David. A crook with ethics!<\/span><\/p>\n<p data-ar-index=\"13\"><strong>David Shipley:<\/strong> More like a crook with self-preservation instincts. There\u2019s two scenarios: First is what we\u2019ll call the Australian scenario. Was this the kind of attack like the Medibank attack that would cause such outrage that the government would wake up and actually get its act together, form a joint police and military response and really ruin their [the attacker\u2019s] day? And ruin the Canadian ransomware market? If so this [apology] is just business preservation. Luckily for them, Canadian politicians apparently don\u2019t care about SickKids because haven\u2019t heard any denunciations from any cabinet-level ministers or the PMO about this. It was a non-concern. What may have been a secondary concern [for LockBit] is this is one of those things where critical infrastructure was attacked. They\u2019re a gang based in Russia, we\u2019re currently at pretty high tensions now, maybe this [attack on SickKids] may upset some of the Russian government folks who don\u2019t necessarily want to see NATO trip Article 5 [a provision where an attack on one NATO member is seen as an attack on all]. Either way I highly doubt this is altruism. These cats have hit hospitals before and and not necessarily given them the [decryption] keys. So I think this is self-preservation and and self-interest.<\/p>\n<p data-ar-index=\"14\"><strong>Howard:<\/strong> They very generously sent a decrypter to the hospital. A question: Should any IT department trust a decrypter sent by a crook?<\/p>\n<p data-ar-index=\"15\"><strong>David:<\/strong> Do you really want to trust these cats? I have the privilege of knowing really really smart folks like Brett Callow at Emsisoft [who is based in British Columbia]. They have to spend a lot of time having to build or rebuild the tools to decrypt ransomware because while the criminals are great at ruining your day they\u2019re not so great at actually decrypting it. Even when the Irish healthcare system got their decryption tool [from the attackers] it didn\u2019t work. It was slower than all get out. So it\u2019s a damned if you do damned if you don\u2019t scenario. I think it [using a gang-supplied decrypto] depends on whether there are any reasonable alternatives. If there are I would avoid it. Hopefully your backups are intact. Hopefully the data is still fresh enough that it has value. But I think you are playing a dangerous game [to use a gang-supplied decryptor]. At the twilight of the ransomware market \u2014 and we\u2019re not there yet \u2014 when this thing finally totally starts to go completely south desperation set in these decryptors will cause additional havoc as well. That\u2019s when you know that they\u2019re ready to burn the [ransomware] business model and are going to evolve to something else.<\/p>\n<p data-ar-index=\"16\"><strong>Howard<\/strong>: Ransonware gangs, and perhaps other threat actors, have self-imposed rules which can probably change as quickly as the direction of the wind. Here\u2019s a translated list of what LockBit says its groups are forbidden to do: Encrypting the data of critical infrastructure, especially hospitals and energy companies. But it\u2019s okay to hack into their into these companies and steal their data for ransom or resale. I hope you get the distinction there. You can hack in, you can steal their data, you can ransom their data. You can\u2019t encrypt their data. If gang members or affiliates are in any doubt about what\u2019s a critical infrastructure organization they can ask the LockBit help desk. Yes, That\u2019s right, this ransomware-as-a-service gang, like a number of criminal operations, has a help desk.<\/p>\n<p data-ar-index=\"17\"><strong>David:<\/strong> What also amuses me is unlike our current federal approach to securing critical infrastructure and legislation they [LockBit] recognize that hospitals are critical infrastructure. <i>[Editor: This is a reference to <a href=\"https:\/\/www.itworldcanada.com\/article\/designated-canadian-firms-would-have-to-report-cyber-breaches-under-proposed-law\/488372\" rel=\"noopener\">proposed Canadian federal legislation overseeing critical infrastructure<\/a>. Initially, it will apply to four sectors: Banking, interprovincial pipelines, telecommunications and transportation. The federal government recognizes healthcare as part of the country\u2019s critical infrastructure in planning with provinces and industry. However, hospitals are legally a provincial responsibility.]<\/i><\/p>\n<p data-ar-index=\"18\">You\u2019d think a pandemic would have taught us that lesson but LockBit apparently recognizes hospitals as critical infrastructure but our new federal legislation doesn\u2019t. Which is kind of super-funny. I do think the LockBit distinction is about not crippling the hospital \u2014 \u2018We don\u2019t want to get pinned with actually killing somebody because that might actually spin up law enforcement and military response and or set off a whole series of geopolitical events. But no one\u2019s going to go to war over leaked medical files. Even if it might ruin someone\u2019s life.\u2019 I remind listeners about that Medibank hack in Australia. The first set of files they leaked were about people who\u2019d had abortions. So these groups and their scruples are questionable at best. They don\u2019t care what havoc they cause to individuals. They care about what blowback they could get [from the public and law enforcement]. The fact that they have a help desk goes back to the ransomware- as-a-service business model working so well and generating such money.<\/p>\n<p data-ar-index=\"19\"><strong>Howard:<\/strong> Here\u2019s another example of their LockBit self-imposed rules. The gang can very carefully and selectively attack pharmaceutical companies, dental clinics and plastic surgeries. Why is it a selective rule? Don\u2019t ask. They can attack private for-profit schools but not public school boards.<\/p>\n<p data-ar-index=\"20\">Interestingly, news emerged this week of <a href=\"https:\/\/www.itworldcanada.com\/article\/attackers-say-they-have-deleted-data-stolen-from-ontario-school-board\/520225\" rel=\"noopener\">an apparent ransomware attack on a Northern Ontario Catholic school board<\/a>. The gang stole data of employees. The school board now reports the gang says it has deleted that data. Whether it\u2019s deleted it because the gang were paid by the school board or whether the ransomware gang said, \u2018Oh we really didn\u2019t need to hit a public school board,\u2019 we don\u2019t know yet.<\/p>\n<p data-ar-index=\"21\"><strong>David:<\/strong> Not all ransomware gangs subscribe to LockBit\u2019s \u2018Robin Hood\u2019 philosophy. Some gangs don\u2019t care. The number of school districts in the United States that have been taken down is staggering. And the number of Canadian school districts that have gone down the last 12 months is starting to add up. This is getting bad, particularly for the primary and secondary education systems. It\u2019s not so much the sensitivity of the data on students. But it\u2019s the theft of employee files. That gets really dangerous and damaging. And let\u2019s be honest: teachers have had a rough couple of years here. This is not helping us retain and keep the best teaching talent. As far as dental clinics and pharmaceutical companies, I find that there\u2019s a fascinating distinction [made by LockBit] between these things. \u2018You\u2019re not going have a heart attack [in a dental office],\u2019 but you might not be able to get a root canal when you really need one. They apparently don\u2019t consider that a healthcare emergency.<\/p>\n<p data-ar-index=\"22\"><strong>Howard:<\/strong> LockBit makes it worthwhile for crooks to join their affiliates\u2019 team. According to a U.S. government presentation that I was able to see online, LockBit affiliates set the ransoms demanded of the victims. And they get to keep 80 per cent of payments.<\/p>\n<p data-ar-index=\"23\"><strong>David:<\/strong> We\u2019ve seen that with other gangs, and that includes NetWalker and others. You\u2019ve got to think about how much money they must be making where they\u2019re willing to give that much margin up to their affiliate. That speaks to the rumor that LockBit has made at least $100 million in revenue [since it began]. So if they [the leaders] get 20 per cent of the total take that\u2019s pretty staggering. The only rule of Russian-based gangs that I trust is they don\u2019t hack inside Russia or countries in the Russian sphere of Influence. They know that if they break that rule their legs are getting broken.<\/p>\n<p data-ar-index=\"24\"><strong>Howard:<\/strong> Before I leave ransomware I want to mention that this week the Guardian newspaper in the United Kingdom, which was hit last month by ransomware,<a href=\"https:\/\/pressgazette.co.uk\/publishers\/guardian-ransomware-attack\/\" rel=\"noopener\"> told staff that they cannot return to the office until at least January 23rd<\/a> because they\u2019re continuing to restore and cleanse their IT systems. Staff has to continue working from home.<\/p>\n<p data-ar-index=\"25\"><strong>David<\/strong>: It\u2019s interesting how the pandemic has made us more resilient. There would have been a time where not being able to go to the office would have meant the paper couldn\u2019t be put out.<\/p>\n<p data-ar-index=\"26\">\u2026 I also wonder how much the collapse of cryptocurrency has unretired some [ransomware] gangs and made some individuals have to work again. The other thing that makes me very concerned is the affiliate model. When you\u2019ve got tens of thousands of employees being laid off in the biggest tech companies on the planet there are chances that someone\u2019s feeling pretty raw about that who would know enough about their fomer organization to cause a lot of pain [by becoming a cyber gang\u2019s affiliate]. We might be heading for a year where an organization gets hit badly because they\u2019re tightening their belt for the recession and someone hits back.<\/p>\n<p data-ar-index=\"27\"><strong>Howard:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gang-cloned-victim-s-website-to-leak-stolen-data\/\" rel=\"noopener\">According to a news report<\/a> the ALPHV\/BlackCat ransomware gang recently found a new way to squeeze victim firms. Rather than offer stolen data on its private site for crooks after hitting a financial firm this gang created a publicly available leak site that mimics that company\u2019s website with the stolen data. It\u2019s a public warning: \u2018We want everybody in the public to know that your company allowed a data breach.<\/p>\n<p data-ar-index=\"28\"><strong>David<\/strong>: This is an interesting escalation, and it\u2019s not without risk back to the gang. Creating a public website\u2019s going to require registering a domain. They\u2019re going to have to figure out a way to try and cover their tracks. That\u2019s much more difficult than posting something on the dark web, so they clearly think escalating to this level makes sense. It might have been Brett [Callow] or [cybersecurity author] Alan Liskla who said this may be a site BlackCat created so when they reach out to that financial services firm\u2019s customers they point them at the site. The customers can see just how bad it is and that just puts extra pressure on the firm to pay \u2014 although at that point it may not be about the firm paying but about pointing to other people who have yet to make the decision to pay and saying, \u2018Look what we just did to these guys. You want to be next?\u2019 They must be feeling awful confident they\u2019re not going to get nicked by police when creating public websites.<\/p>\n<p data-ar-index=\"29\"><strong>Howard<\/strong>: One lesson for all IT departments that I saw from one U.S. government advisory is all cyber gangs hunt for and then exploit unpatched IT systems. These are seen as easy if not preferred targets.<\/p>\n<p data-ar-index=\"30\"><strong>David<\/strong>: One hundred per cent. And let me put this warning call out there: If you are still running your own Exchange environment, or if you are buying a hosted Exchange environment, make 2023 the year you get to Office 365 because the tens of thousands of organizations that have been hit by numerous Exchange vulnerabilities just continue to happen \u2014 but aren\u2019t happening in the Microsoft 365 environment. It\u2019s a no-brainer. The value prop versus risk equation of hosting Exchange is one of those easy wins. Get out of that business. It no longer makes any sense.<\/p>\n<p data-ar-index=\"31\"><strong>Howard:<\/strong> Item two: Access control. <a href=\"https:\/\/slack.com\/intl\/en-au\/blog\/news\/slack-security-update\" rel=\"noopener\">At the end of the year the Slack instant messaging platform admitted<\/a> that a hacker was able to get hold of digital tokens used by employees for logging into GitHub. GitHub is where developers work on slack application code. The hacker was able to download some of that code none of it had customer data. This is a new trend: Stealing digital tokens. Slack came out with its statement fast \u2014 three or four days after the attack.<\/p>\n<p data-ar-index=\"32\"><strong>David:<\/strong> Their incident response on this is fantastic. Their transparency is great. What\u2019s going to be really key now is how this incident get weaponized by attackers as they continue to target. Slack. So what we saw with the LastPass breach just before Christmas was that a previous breach used details that only insiders would know to further their attacks. It resulted in a more catastrophic breach. So just because they didn\u2019t get customer information [from Slack] doesn\u2019t mean that the information they took can\u2019t be highly useful for continuing their campaign. It\u2019s clear Slack is in somebody\u2019s sights. How they handle the next few attacks is really going to make all the difference.<\/p>\n<p data-ar-index=\"33\"><strong>Howard:<\/strong> As I said this deals with the theft of digital tokens which are the snippets of code that are tucked into browsers that IT systems use for identity and access control. If hackers can get a hold of them they can be used for bypassing multifactor authentication. In fact in November Microsoft warned that it\u2019s seeing an increase in token theft. One way that a hacker can steal a token is through a man-in-the-middle attack, which is intercepting the multifactor authentication token that\u2019s used by an employee when he logs in. Then the hacker replays the token for their own access.<\/p>\n<p data-ar-index=\"34\"><strong>David:<\/strong> <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/11\/16\/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft\/\" rel=\"noopener\">Microsoft has a really great article about token theft.<\/a> If I can phish you and get your username and password, I\u2019m off to the races if you don\u2019t have multifactor authentication. If I can fish you and deliver malware to your machine and now I can be the attacker in the middle and capture the browser session cookies and then replay them, I\u2019m laughing. One of the challenges that Microsoft highlights in their analysis that I really liked is in this rush to remote work with so many bring-your-own-device policies and so many devices that aren\u2019t under corporate control the devices may not have the security controls, antivirus software updates etc that could actually prevent malware from getting root and causing problems. Second is there may not be the telemetry heading back into IT security to say, \u2018We\u2019ve got a problem with this device.\u2019 So you\u2019re missing that particular insight. The other part about the Microsoft side of things in terms of the advice is The use of physical tokens like Yubikeys etc where you can\u2019t replay those credentials because they\u2019re tested every time you\u2019re authenticated. The challenge is those hard keys are useful for high-risk roles like IT admins and others. But for regular roles there\u2019s a balance between usability and security, because if the user loses their Yubikey good luck getting them productive again for a couple of days.<\/p>\n<p data-ar-index=\"35\"><strong>Howard:<\/strong> The other way tokens are stolen is by stealing browser cookies. These cookies keep you signed in continuously to a website. Like a man-in-the-middle attack, a cookie theft usually starts with an email or a text phishing attack. If the victim falls for this trick malware gets installed that tries to steal the cookies from the victim\u2019s browser. Um. The difference is in a cookie attack the Hacker doesn\u2019t need the victim\u2019s credentials.<\/p>\n<p data-ar-index=\"36\"><strong>David:<\/strong> I would say email phishing is surging again in activity. And credentials continue to be a pretty big target. The other part that that we may be missing in terms of malware delivery is just before the end of the year we also saw a warning from the FBI about the use of malicious Google ads and other things that impersonate popular websites. When you landed at these sites you could end up getting malware served to you or the ad network serving malware. So while phishing is the easiest way to target a specific individual as part of a more sophisticated attack, generic malware looking to scrape credentials for reuse and access is also surging. This gets back to making sure devices are locked down.<\/p>\n<p data-ar-index=\"37\"><strong>Howard:<\/strong> Our final topic is going to be ChatGPT. It\u2019s the hot technology these days. But a few researchers say it also may be a valuable tool for threat actors. First of all, what is it?<\/p>\n<p data-ar-index=\"38\"><strong>David:<\/strong> ChatGPT is the latest evolution of machine learning models which have been both instructed by human beings as well as having self-taught algorithms that go out and read the Internet and then give relatively coherent responses to questions \u2026 It is a fascinating example of the extent that language models have evolved. One of the things that gets really interesting, given we were just talking about phishing, is we used to teach people that phishing emails are poorly written, that they\u2019ll have spelling or grammatical mistakes, that they\u2019ll lack context. Well, all the cool kids around the world who aren\u2019t necessarily English speakers now have ChatGPT or something close to it. Some researchers have actually been able to get ChatGPT to write some pretty damn good phishing emails. And they can use some of the social engeinnering techniques that we talk about here to make a phish really compelling.<\/p>\n<p data-ar-index=\"39\"><strong>Howard:<\/strong> <a href=\"https:\/\/www.itworldcanada.com\/article\/threat-actors-will-take-advantge-of-chatgpt-says-expert\/520295\" rel=\"noopener\">I interviewed a security researcher this week<\/a> at a company called Cyberint who made the point that this chatbot could help threat actors reverse engineer anti-malware and security software, as well as just simply be used to find bugs in the code that hackers are writing.<\/p>\n<p data-ar-index=\"40\"><strong>David:<\/strong> I think we\u2019re going to see this. We\u2019ve we\u2019ve seen criminals use other tools to understand how to protect themselves. One ransomware gang actually set up a front company to buy cybersecurity antivirus engines to test their software against before putting it on the market. Criminals are not stupid. They\u2019re actually quite bright. It\u2019s that they\u2019re lazy. They don\u2019t want to work hard for their money and they want to steal yours so they\u2019re going to use every new technology they can get their hands on. That just makes life harder for everybody. And because ChatGPT can do code, which is another form of language, it\u2019s going to cause headaches. It\u2019s going to be interesting to see if it\u2019s used to race to find zero-day bugs. I think we\u2019re in for a bad year in 2023. ChatGPT is a harbinger of what\u2019s coming next. It\u2019s the moment AI starts to balance out. We\u2019ve heard how AI has been helping defenders. Well, everything in crime is gonna have AI, too.<\/p>\n<p data-ar-index=\"41\">The post <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-week-in-review-for-friday-january-6-2023\/520243\">Cyber Security Today, Week in Review for Friday, January 6, 2023<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This episode features discussion on ransomware, ChatGPT and digital t<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[360,16],"tags":[389],"class_list":["post-33591","post","type-post","status-publish","format-standard","hentry","category-podcasts","category-security","tag-cyber-security-today"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/33591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=33591"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/33591\/revisions"}],"predecessor-version":[{"id":33673,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/33591\/revisions\/33673"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=33591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=33591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=33591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}