{"id":25529,"date":"2023-12-26T14:23:02","date_gmt":"2023-12-26T12:23:02","guid":{"rendered":"https:\/\/www.kelacyber.com\/revealing-corporate-vulnerabilities-understanding-how-threat-actors-breach-and-exploit-your-data\/"},"modified":"2024-02-01T12:09:33","modified_gmt":"2024-02-01T10:09:33","slug":"revealing-corporate-vulnerabilities-understanding-how-threat-actors-breach-and-exploit-your-data","status":"publish","type":"post","link":"https:\/\/www.kelacyber.com\/ja\/blog\/revealing-corporate-vulnerabilities-understanding-how-threat-actors-breach-and-exploit-your-data\/","title":{"rendered":"\u4f01\u696d\u306e\u5f31\u70b9\u3092\u89e3\u660e\uff1a \u8105\u5a01\u30a2\u30af\u30bf\u30fc\u304c\u7d44\u7e54\u306e\u30c7\u30fc\u30bf\u3092\u4fb5\u5bb3\u30fb\u60aa\u7528\u3059\u308b\u65b9\u6cd5"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">KELA\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bb\u30f3\u30bf\u30fc<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>KELA\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bb\u30f3\u30bf\u30fc<\/p>\n","protected":false},"author":34,"featured_media":25516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[],"class_list":["post-25529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-7"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data.gif",1200,628,false],"thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-150x150.gif",150,150,true],"medium":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-300x157.gif",300,157,true],"medium_large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-768x402.gif",768,402,true],"large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-1024x536.gif",1024,536,true],"1536x1536":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data.gif",1200,628,false],"2048x2048":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data.gif",1200,628,false],"blogimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-400x180.gif",400,180,true],"teamimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-301x279.gif",301,279,true],"pressimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-450x316.gif",450,316,true],"blogthumb":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-642x200.gif",642,200,true],"bloghimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-400x180.gif",400,180,true],"bloghvid":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-694x384.gif",694,384,true],"bloginner":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-932x420.gif",932,420,true],"blogrelated":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-225x275.gif",225,275,true],"product-icon":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-50x50.gif",50,50,true],"alm-thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2023\/12\/data-150x150.gif",150,150,true]},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":"KELA\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30bb\u30f3\u30bf\u30fc","_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/25529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=25529"}],"version-history":[{"count":7,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/25529\/revisions"}],"predecessor-version":[{"id":26399,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/25529\/revisions\/26399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media\/25516"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=25529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/categories?post=25529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/tags?post=25529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}