{"id":9167,"date":"2021-06-10T12:11:11","date_gmt":"2021-06-10T12:11:11","guid":{"rendered":"https:\/\/fieldtrust.be\/?p=9167"},"modified":"2021-06-10T12:12:02","modified_gmt":"2021-06-10T12:12:02","slug":"trends-in-phishing-with-pdf-files","status":"publish","type":"post","link":"https:\/\/fieldtrust.be\/nl\/trends-in-phishing-with-pdf-files","title":{"rendered":"Trends in Phishing with PDF Files"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9167\" class=\"elementor elementor-9167\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3bf22be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3bf22be\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ebb0069\" data-id=\"7ebb0069\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20a39e31 elementor-widget elementor-widget-text-editor\" data-id=\"20a39e31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An uptick in phishing started in 2020 with the pandemic lockdowns, and it continues to be a serious cybersecurity threat in 2021. Attackers change their methods as more people become aware of their scams and cybersecurity defenses work effectively to stop them. One of the latest trends in phishing involves PDF files.<\/p><p>PDF files allow users to share rich-text information including links, images, animation, and even internal scripts linked to the file. In the latest group of attacks, phishing campaigns include PDF attachments that perform various methods to redirect users to a malicious site in an attempt to steal user information. Here are several PDF phishing attacks to look out for in 2021<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fca2b2b elementor-widget elementor-widget-heading\" data-id=\"fca2b2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fake CAPTCHA Redirects<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7083b62c elementor-widget elementor-widget-text-editor\" data-id=\"7083b62c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A CAPTCHA is a recognized symbol for anyone who uses the internet, so it\u2019s an easy and convenient way to trick users into clicking a link. In this phishing campaign, an attacker inserts an image of the common Google CAPTCHA interface.<\/p><p>Users recognize the image and click \u201cContinue\u201d and expect to see a site recognizable to them. When the link is clicked, the user is redirected to an attacker-controlled site where users are asked to enter their private information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18637c18 elementor-widget elementor-widget-heading\" data-id=\"18637c18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Play Buttons on Static Images<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e5b0821 elementor-widget elementor-widget-text-editor\" data-id=\"2e5b0821\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When you see a play button on an image, your first instinct is to click the button and watch the videos. This natural reaction to a play button is what attackers expect when they send a PDF file with a static image containing a video-like play button.<\/p><p>This scam is common in phishing attacks targeting cryptocurrency traders and investors. PDF readers open the file, and users click the link on the fake video image. Instead of playing a video, users are redirected to a malicious site that prompts victims to enter their credit card information for a dating website.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53689f7 elementor-widget elementor-widget-heading\" data-id=\"53689f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">File Sharing and Phishing\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc81b77 elementor-widget elementor-widget-text-editor\" data-id=\"dc81b77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Most users have either a Google Drive account or a Microsoft OneDrive account. Gaining access to either one of these accounts provides attackers with plenty of documentation and private data from files stored on these cloud drive accounts. Attackers use image links in PDF files to trick users into divulging their user credentials so that they can access targeted victim accounts.<\/p><p>The image displays a prompt to access a file that the user instinctively knows should open their cloud drive, but instead a phishing page opens when the user clicks the link. This phishing page looks exactly like OneDrive or Google Drive\u2019s landing page, so users who do not notice the domain name in their browser window will instinctively enter their username and password. After they enter this information, it\u2019s sent to the attacker who can then access the cloud drive account.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3188429 elementor-widget elementor-widget-heading\" data-id=\"3188429\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ecommerce Site Scams<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efaad5d elementor-widget elementor-widget-text-editor\" data-id=\"efaad5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Just like logos, using popular logos is much more convincing than using unknown brand images. Logos for sites like eBay, PayPal, Microsoft, Google, and Amazon are known globally, so attackers have many potential victims when they send phishing emails to thousands of recipients.<\/p><p>The latest phishing attacks using PDF files include common ecommerce logos to convince readers to click links. Ecommerce sites contain private information and credit card data, so attackers can steal products using the targeted victim\u2019s information. For example, the PDF file might contain the Amazon log and ask users to click the link to purchase products. Instead of opening Amazon in the user\u2019s browser, an attacker-controlled website masquerading as the legitimate site asks users to authenticate. When users enter credentials into the phishing site, an attacker now has their login information to access their ecommerce account.<\/p><p>The image displays a prompt to access a file that the user instinctively knows should open their cloud drive, but instead a phishing page opens when the user clicks the link. This phishing page looks exactly like OneDrive or Google Drive\u2019s landing page, so users who do not notice the domain name in their browser window will instinctively enter their username and password. After they enter this information, it\u2019s sent to the attacker who can then access the cloud drive account.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89075e0 elementor-widget elementor-widget-heading\" data-id=\"89075e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0522e34 elementor-widget elementor-widget-text-editor\" data-id=\"0522e34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing attacks still maintain the number one threat against users and businesses. Use <a href=\"https:\/\/fieldtrust.be\/nl\/vendors\/vendor-portfolio\/spamtitan\/\">email filters<\/a> to stop these attacks. Email filters detect malicious attachments and block them from reaching the recipient\u2019s inbox. Using email cybersecurity, businesses can greatly reduce the risk of phishing and becoming the next victim.<\/p><p><b>SpamTitan blocks spam, viruses, malware, phishing attempts and other email threats for businesses, MSP&#8217;s and schools.<\/b><\/p><p><a href=\"https:\/\/fieldtrust.be\/nl\/vendors\/vendor-portfolio\/spamtitan\/\"><strong>Discover all the features of SpamTitan<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>An uptick in phishing started in 2020 with the pandemic lockdowns, and it continues to be a serious cybersecurity threat in 2021. Attackers change their methods as more people become aware of their scams and cybersecurity defenses work effectively to stop them. One of the latest trends in phishing involves PDF files. PDF files allow [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9168,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"1":"post","5":"has-post-thumbnail"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trends in Phishing with PDF Files &#8211; Fieldtrust<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fieldtrust.be\/nl\/trends-in-phishing-with-pdf-files\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trends in Phishing with PDF Files &#8211; Fieldtrust\" \/>\n<meta property=\"og:description\" content=\"An uptick in phishing started in 2020 with the pandemic lockdowns, and it continues to be a serious cybersecurity threat in 2021. Attackers change their methods as more people become aware of their scams and cybersecurity defenses work effectively to stop them. One of the latest trends in phishing involves PDF files. PDF files allow [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fieldtrust.be\/nl\/trends-in-phishing-with-pdf-files\/\" \/>\n<meta property=\"og:site_name\" content=\"Fieldtrust\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-10T12:11:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T12:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/06\/1623314122328.png\" \/>\n\t<meta property=\"og:image:width\" content=\"622\" \/>\n\t<meta property=\"og:image:height\" content=\"571\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"fieldtrust_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:site\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fieldtrust_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files\"},\"author\":{\"name\":\"fieldtrust_admin\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\"},\"headline\":\"Trends in Phishing with PDF Files\",\"datePublished\":\"2021-06-10T12:11:11+00:00\",\"dateModified\":\"2021-06-10T12:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files\"},\"wordCount\":751,\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/1623314122328.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files\",\"name\":\"Trends in Phishing with PDF Files &#8211; Fieldtrust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/1623314122328.png\",\"datePublished\":\"2021-06-10T12:11:11+00:00\",\"dateModified\":\"2021-06-10T12:12:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#primaryimage\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/1623314122328.png\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/1623314122328.png\",\"width\":622,\"height\":571},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/trends-in-phishing-with-pdf-files#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fieldtrust.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trends in Phishing with PDF Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"name\":\"Fieldtrust\",\"description\":\"The Value-Added Distributor for MSPs\",\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fieldtrust.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\",\"name\":\"Fieldtrust\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"width\":1,\"height\":1,\"caption\":\"Fieldtrust\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/fieldtrustbnl\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/fieldtrust\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCchBwXtTmebI8KkdOGrcC5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\",\"name\":\"fieldtrust_admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trends in Phishing with PDF Files &#8211; Fieldtrust","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fieldtrust.be\/nl\/trends-in-phishing-with-pdf-files\/","og_locale":"nl_NL","og_type":"article","og_title":"Trends in Phishing with PDF Files &#8211; Fieldtrust","og_description":"An uptick in phishing started in 2020 with the pandemic lockdowns, and it continues to be a serious cybersecurity threat in 2021. Attackers change their methods as more people become aware of their scams and cybersecurity defenses work effectively to stop them. One of the latest trends in phishing involves PDF files. PDF files allow [&hellip;]","og_url":"https:\/\/fieldtrust.be\/nl\/trends-in-phishing-with-pdf-files\/","og_site_name":"Fieldtrust","article_published_time":"2021-06-10T12:11:11+00:00","article_modified_time":"2021-06-10T12:12:02+00:00","og_image":[{"width":622,"height":571,"url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/06\/1623314122328.png","type":"image\/png"}],"author":"fieldtrust_admin","twitter_card":"summary_large_image","twitter_creator":"@fieldtrustbnl","twitter_site":"@fieldtrustbnl","twitter_misc":{"Geschreven door":"fieldtrust_admin","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#article","isPartOf":{"@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files"},"author":{"name":"fieldtrust_admin","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd"},"headline":"Trends in Phishing with PDF Files","datePublished":"2021-06-10T12:11:11+00:00","dateModified":"2021-06-10T12:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files"},"wordCount":751,"publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"image":{"@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/06\/1623314122328.png","articleSection":["Uncategorized"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files","url":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files","name":"Trends in Phishing with PDF Files &#8211; Fieldtrust","isPartOf":{"@id":"https:\/\/fieldtrust.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#primaryimage"},"image":{"@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/06\/1623314122328.png","datePublished":"2021-06-10T12:11:11+00:00","dateModified":"2021-06-10T12:12:02+00:00","breadcrumb":{"@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#primaryimage","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/06\/1623314122328.png","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/06\/1623314122328.png","width":622,"height":571},{"@type":"BreadcrumbList","@id":"https:\/\/fieldtrust.be\/trends-in-phishing-with-pdf-files#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fieldtrust.be\/"},{"@type":"ListItem","position":2,"name":"Trends in Phishing with PDF Files"}]},{"@type":"WebSite","@id":"https:\/\/fieldtrust.be\/#website","url":"https:\/\/fieldtrust.be\/","name":"Fieldtrust","description":"The Value-Added Distributor for MSPs","publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fieldtrust.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/fieldtrust.be\/#organization","name":"Fieldtrust","url":"https:\/\/fieldtrust.be\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","width":1,"height":1,"caption":"Fieldtrust"},"image":{"@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/fieldtrustbnl","https:\/\/www.linkedin.com\/company\/fieldtrust\/","https:\/\/www.youtube.com\/channel\/UCchBwXtTmebI8KkdOGrcC5w"]},{"@type":"Person","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd","name":"fieldtrust_admin"}]}},"_links":{"self":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/9167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/comments?post=9167"}],"version-history":[{"count":3,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/9167\/revisions"}],"predecessor-version":[{"id":9171,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/9167\/revisions\/9171"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/media\/9168"}],"wp:attachment":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/media?parent=9167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/categories?post=9167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/tags?post=9167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}