{"id":27386,"date":"2024-04-30T12:30:50","date_gmt":"2024-04-30T09:30:50","guid":{"rendered":"https:\/\/www.kelacyber.com\/resources\/%resource_type%\/an-in-depth-analysis-of-ransomware-tactics\/"},"modified":"2024-05-07T05:52:01","modified_gmt":"2024-05-07T02:52:01","slug":"an-in-depth-analysis-of-ransomware-tactics","status":"publish","type":"resource","link":"https:\/\/www.kelacyber.com\/ja\/resources\/webinar-ja\/an-in-depth-analysis-of-ransomware-tactics\/","title":{"rendered":"\u30a6\u30a7\u30d3\u30ca\u2015\uff1a\u4ea4\u6e09\u90e8\u5c4b\u3092\u306e\u305e\u304d\u898b\u2015\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u306e\u6226\u8853\u3092\u6df1\u5800\u308a\u5206\u6790"},"content":{"rendered":"","protected":false},"featured_media":27381,"template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","_links_to":"","_links_to_target":""},"resource_type":[57],"class_list":["post-27386","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_type-webinar-ja"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3-150x110.png",150,110,true],"medium":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3-300x106.png",300,106,true],"medium_large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"1536x1536":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"2048x2048":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"blogimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"teamimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3-301x110.png",301,110,true],"pressimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"blogthumb":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"bloghimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"bloghvid":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"bloginner":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3.png",310,110,false],"blogrelated":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3-225x110.png",225,110,true],"product-icon":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3-50x50.png",50,50,true],"alm-thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/04\/ON-DEMAND-Feature-image-3-150x110.png",150,110,true]},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource\/27386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":4,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource\/27386\/revisions"}],"predecessor-version":[{"id":27428,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource\/27386\/revisions\/27428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media\/27381"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=27386"}],"wp:term":[{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/resource_type?post=27386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}