{"id":23976,"date":"2023-07-25T11:57:44","date_gmt":"2023-07-25T08:57:44","guid":{"rendered":"https:\/\/www.kelacyber.com\/ransomware-and-network-access-sales-report-q2-2023\/"},"modified":"2023-08-27T12:31:24","modified_gmt":"2023-08-27T09:31:24","slug":"ransomware-and-network-access-sales-report-q2-2023","status":"publish","type":"page","link":"https:\/\/www.kelacyber.com\/ja\/ransomware-and-network-access-sales-report-q2-2023\/","title":{"rendered":"2023\u5e74\u7b2c2\u56db\u534a\u671f\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a8\u30a2\u88ab\u5bb3\u7d44\u7e54\u3068\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30a2\u30af\u30bb\u30b9\u306e\u8ca9\u58f2\u72b6\u6cc1"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":34,"featured_media":23433,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-report-landing-page.php","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-23976","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023.png",1200,627,false],"thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-150x150.png",150,150,true],"medium":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-300x157.png",300,157,true],"medium_large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-768x401.png",768,401,true],"large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-1024x535.png",1024,535,true],"1536x1536":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023.png",1200,627,false],"2048x2048":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023.png",1200,627,false],"blogimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-400x180.png",400,180,true],"teamimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-301x279.png",301,279,true],"pressimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-450x316.png",450,316,true],"blogthumb":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-642x200.png",642,200,true],"bloghimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-400x180.png",400,180,true],"bloghvid":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-694x384.png",694,384,true],"bloginner":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-932x420.png",932,420,true],"blogrelated":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-225x275.png",225,275,true],"product-icon":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-50x50.png",50,50,true],"alm-thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/07\/Ransomware-report-Q2-2023-150x150.png",150,150,true]},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/23976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=23976"}],"version-history":[{"count":4,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/23976\/revisions"}],"predecessor-version":[{"id":24000,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/23976\/revisions\/24000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media\/23433"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=23976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}