{"id":279,"date":"2023-02-07T06:47:06","date_gmt":"2023-02-07T06:47:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tdavi096\/?p=279"},"modified":"2023-02-07T06:47:06","modified_gmt":"2023-02-07T06:47:06","slug":"third-party-exposer","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tdavi096\/2023\/02\/07\/third-party-exposer\/","title":{"rendered":"Third party exposer?&#8230;"},"content":{"rendered":"\n<p>Cybercriminals can get around security systems by hacking less-protected networks belonging to third parties that have privileged access to the hacker\u2019s primary target. <br><br>One major example of a third-party breach occurred at the beginning of 2021 when hackers leaked personal data from over 214 million Facebook, Instagram, and Linkedin accounts. The hackers were able to access the data by breaching a third-party contractor called Socialarks that was employed by all three companies and had privileged access to their networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals can get around security systems by hacking less-protected networks belonging to third parties that have privileged access to the hacker\u2019s primary target. One major example of a third-party breach occurred at the beginning of 2021 when hackers leaked personal data from over 214 million Facebook, Instagram, and Linkedin accounts. The hackers were able to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tdavi096\/2023\/02\/07\/third-party-exposer\/\">Read More<\/a><\/div>\n","protected":false},"author":26227,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/posts\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/users\/26227"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/posts\/279\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tdavi096\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}