{"id":83996,"date":"2026-01-22T04:57:43","date_gmt":"2026-01-22T04:57:43","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83996"},"modified":"2026-02-24T13:11:36","modified_gmt":"2026-02-24T13:11:36","slug":"attck-ransomware-unraveling-the-avoslocker-apt","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/","title":{"rendered":"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83996\" class=\"elementor elementor-83996\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-091dd64 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"091dd64\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a189a4f\" data-id=\"a189a4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d9dcbd elementor-widget elementor-widget-text-editor\" data-id=\"5d9dcbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> January 21, 2026<br>\n<strong>Time:<\/strong> 10:30 AM GMT-3| 8:30 AM EST | 7:00 PM IST<br>\n<strong>Topic:<\/strong> ATT&amp;CK Ransomware: Unraveling the AvosLocker APT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong>As the threat landscape continues to evolve, ransomware-as-a-service (RaaS) has emerged as a thriving business model for cybercrime, where threat actors develop and lease ransomware to affiliates who execute attacks. This shift has increased the demand for high-quality threat intelligence contributors. In this webinar, we explore the RaaS ecosystem, its impact on organizations, and the speaker\u2019s journey from investigating the AvosLocker variant ransomware incident to becoming a MITRE ATT&amp;CK contributor for the same. Through a real-world case study, the speaker demonstrates how misalignment between people, processes, and technology can lead to significant business losses and what organizations can do to strengthen their defenses. Participants will gain a clear understanding of emerging ransomware threats, the risks of misalignment, and practical protection measures, along with insights from contributing to MITRE ATT&amp;CK.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the ransomware-as-a-service (RaaS) model<\/li>\n<li>Analysis of a real incident and its consequences<\/li>\n<li>Trends in ransomware attacks for the coming years<\/li>\n<li>The importance of alignment between people, processes and technology in preventing attacks<\/li>\n<li>My experience and contribution to MITRE ATT&amp;CK<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<strong><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-74756 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Flavio.jpeg\" alt=\"\" width=\"200\" height=\"300\">Fl\u00e1vio Costa,\u202f<\/strong>Business Development Engineer (BDE), Fortinet.<\/p>\n<p><strong>Bio: <\/strong>Fl\u00e1vio Costa is a cybersecurity expert, professor, author, and public speaker. He currently works as a freelance consultant and as a Business Development Engineer at Fortinet. Fl\u00e1vio Costa teaches aspiring professionals through the \u201cHackers for Good\u201d program, a Brazilian federal initiative. He is a master\u2019s student in cybersecurity at Harvard and a contributor to the MITRE ATT&amp;CK framework, with threat intelligence work recognized internationally by global institutions.<br>\n<a name=\"attend\"><\/a><br>\n<iframe width=\"560\" height=\"415\" src=\"https:\/\/www.youtube.com\/embed\/pl-9w86U8FE?si=vB3dv0yjHGlX_a3E&amp;enablejsapi=1&amp;origin=https:\/\/www.eccouncil.org\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\" data-lf-form-tracking-inspected-lynor8xwpxvawqjz=\"true\" data-lf-yt-playback-inspected-lynor8xwpxvawqjz=\"true\" data-lf-vimeo-playback-inspected-lynor8xwpxvawqjz=\"true\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: January 21, 2026 Time: 10:30 AM GMT-3| 8:30 AM EST | 7:00 PM IST Topic: ATT&amp;CK Ransomware: Unraveling the AvosLocker APT Watch Now Abstract: As the threat landscape continues to evolve, ransomware-as-a-service (RaaS) has emerged as a thriving business model for cybercrime, where threat actors develop and lease ransomware to affiliates who execute attacks.&hellip;<\/p>\n","protected":false},"author":104,"featured_media":83997,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83996","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ATT&amp;CK Ransomware: Inside the AvosLocker APT<\/title>\n<meta name=\"description\" content=\"ATT&amp;CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\" \/>\n<meta property=\"og:description\" content=\"ATT&amp;CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-22T04:57:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:11:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/21-jan_465x310-Without-RN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laxmi.Yadav@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\" \/>\n<meta name=\"twitter:description\" content=\"ATT&amp;CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laxmi.Yadav@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/\"},\"author\":{\"name\":\"Laxmi.Yadav@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/73b16d6854043e94f4e0e75086069102\"},\"headline\":\"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\u00a0\",\"datePublished\":\"2026-01-22T04:57:43+00:00\",\"dateModified\":\"2026-02-24T13:11:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/\"},\"wordCount\":289,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/21-jan_465x310-Without-RN.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/\",\"name\":\"ATT&CK Ransomware: Inside the AvosLocker APT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/21-jan_465x310-Without-RN.jpg\",\"datePublished\":\"2026-01-22T04:57:43+00:00\",\"dateModified\":\"2026-02-24T13:11:36+00:00\",\"description\":\"ATT&CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/21-jan_465x310-Without-RN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/21-jan_465x310-Without-RN.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/attck-ransomware-unraveling-the-avoslocker-apt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/73b16d6854043e94f4e0e75086069102\",\"name\":\"Laxmi.Yadav@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ATT&CK Ransomware: Inside the AvosLocker APT","description":"ATT&CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/","og_locale":"en_US","og_type":"article","og_title":"ATT&CK Ransomware: Unraveling the AvosLocker APT","og_description":"ATT&CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-22T04:57:43+00:00","article_modified_time":"2026-02-24T13:11:36+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/21-jan_465x310-Without-RN.jpg","type":"image\/jpeg"}],"author":"Laxmi.Yadav@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"ATT&CK Ransomware: Unraveling the AvosLocker APT","twitter_description":"ATT&CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.","twitter_misc":{"Written by":"Laxmi.Yadav@eccouncil.org","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/"},"author":{"name":"Laxmi.Yadav@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/73b16d6854043e94f4e0e75086069102"},"headline":"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\u00a0","datePublished":"2026-01-22T04:57:43+00:00","dateModified":"2026-02-24T13:11:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/"},"wordCount":289,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/21-jan_465x310-Without-RN.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/","name":"ATT&CK Ransomware: Inside the AvosLocker APT","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/21-jan_465x310-Without-RN.jpg","datePublished":"2026-01-22T04:57:43+00:00","dateModified":"2026-02-24T13:11:36+00:00","description":"ATT&CK Ransomware: AvosLocker APT explained. Learn attack strategies, detection methods, and defense techniques in this expert-led webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/21-jan_465x310-Without-RN.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/21-jan_465x310-Without-RN.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/attck-ransomware-unraveling-the-avoslocker-apt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"ATT&amp;CK Ransomware: Unraveling the AvosLocker APT\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/73b16d6854043e94f4e0e75086069102","name":"Laxmi.Yadav@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/104"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83996"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83996\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83997"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}