{"id":19334,"date":"2025-01-16T10:00:00","date_gmt":"2025-01-16T09:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=19334"},"modified":"2025-08-12T17:30:30","modified_gmt":"2025-08-12T15:30:30","slug":"the-evolution-of-cybercrime","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/die-evolution-der-cyberkriminalitaet\/","title":{"rendered":"The evolution of cybercrime"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"19334\" class=\"elementor elementor-19334\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2af82764 e-con-full e-flex e-con e-parent\" data-id=\"2af82764\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54a4d7fe elementor-widget elementor-widget-text-editor\" data-id=\"54a4d7fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">From advance fee fraud to AI-driven threat<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The classic advance fee scam, known as 419 scam, has had many faces over the decades - from letters and faxes to emails. The principle was simple: an unrealistic \"business offer\" lured with high profits, provided a small advance payment was made. Conspicuous spelling mistakes and absurd stories served a purpose: only the most gullible victims would respond.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Today, the methods used by fraudsters have changed radically. Cybercriminals use AI-supported tools to create deceptively real phishing campaigns that are precisely formulated and culturally adapted. Generative AI has drastically lowered the barriers to entry. Even technically inexperienced criminals can access phishing-as-a-service kits, automated tools and curated target lists.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Are you prepared for cyber attacks?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> you are one step ahead of cyber threats: Strengthen your company's resistance to hacker attacks - especially in your own environment!<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Would you like to know how secure your company is? Find out with a test setup! Book now:<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"backgroundColor\":\"luminous-vivid-orange\"} -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-luminous-vivid-orange-background-color has-background wp-element-button\" href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TEST INSTALLATION<\/strong><\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">New strategies of the attackers\u00a0\u00a0<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Modern phishing attacks are highly sophisticated and multifunctional. Attackers use AI to:\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Compose perfect emails that look like legitimate business correspondence.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>manipulate voices and images with the help of deep learning.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Creating fake profiles on networks like LinkedIn to build trust.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Generate authentic-looking websites including graphics and forms.\u00a0\u00a0<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">AI and deep fakes: new dimensions of deception\u00a0\u00a0\u00a0\u00a0<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The use of deep fakes is particularly dangerous. AI-generated voices of managers can be so precise that even long-serving employees can be deceived. This technique is often used in voice phishing (vishing) or in manipulated video calls in which digital doppelgangers act in real time.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>One example shows how such attacks can take place: At a well-known car manufacturer, a supposed CEO called a manager to ask for support with a \"secret takeover\". However, the manager noticed minor discrepancies, such as the metallic undertone of the voice. By asking specific questions, he was able to expose the fraud.\u00a0\u00a0\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The threat of AI-supported cyber attacks is growing rapidly. But with awareness, established verification processes and critical thinking, companies and individuals can detect and defend against attacks. Vigilance remains key - even in the age of AI.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> is at your side as a reliable partner to protect your company in this dynamic threat environment. Contact us to make your cybersecurity strategy fit for 2025 and beyond.<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"className\":\"is-style-fill\",\"style\":{\"typography\":{\"fontSize\":\"15px\"}}} --><\/div>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybercriminals use AI-supported tools to create deceptively real phishing campaigns that are precisely formulated and culturally adapted. <\/p>","protected":false},"author":3,"featured_media":19335,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,28],"tags":[41,39,38,40,37,36],"class_list":["post-19334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netzwerksicherheit-mit-defenderbox","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die Evolution der Cyberkriminalit\u00e4t - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/the-evolution-of-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die Evolution der Cyberkriminalit\u00e4t - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/the-evolution-of-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-16T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T15:30:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/01\/USE_q5mNQR-0w4DDd3tCmQ.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1312\" \/>\n\t<meta property=\"og:image:height\" content=\"736\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Die Evolution der Cyberkriminalit\u00e4t\",\"datePublished\":\"2025-01-16T09:00:00+00:00\",\"dateModified\":\"2025-08-12T15:30:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/\"},\"wordCount\":401,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/USE_q5mNQR-0w4DDd3tCmQ.jpeg\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Netzwerksicherheit\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/\",\"name\":\"Die Evolution der Cyberkriminalit\u00e4t - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/USE_q5mNQR-0w4DDd3tCmQ.jpeg\",\"datePublished\":\"2025-01-16T09:00:00+00:00\",\"dateModified\":\"2025-08-12T15:30:30+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/USE_q5mNQR-0w4DDd3tCmQ.jpeg\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/USE_q5mNQR-0w4DDd3tCmQ.jpeg\",\"width\":1312,\"height\":736,\"caption\":\"DEFENDERBOX gegen die Neue Dimension der T\u00e4uschung\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/die-evolution-der-cyberkriminalitaet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die Evolution der Cyberkriminalit\u00e4t\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The evolution of cybercrime - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/the-evolution-of-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"Die Evolution der Cyberkriminalit\u00e4t - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/the-evolution-of-cybercrime\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-01-16T09:00:00+00:00","article_modified_time":"2025-08-12T15:30:30+00:00","og_image":[{"width":1312,"height":736,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/01\/USE_q5mNQR-0w4DDd3tCmQ.jpeg","type":"image\/jpeg"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Die Evolution der Cyberkriminalit\u00e4t","datePublished":"2025-01-16T09:00:00+00:00","dateModified":"2025-08-12T15:30:30+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/"},"wordCount":401,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/01\/USE_q5mNQR-0w4DDd3tCmQ.jpeg","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Netzwerksicherheit","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/","url":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/","name":"The evolution of cybercrime - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/01\/USE_q5mNQR-0w4DDd3tCmQ.jpeg","datePublished":"2025-01-16T09:00:00+00:00","dateModified":"2025-08-12T15:30:30+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/01\/USE_q5mNQR-0w4DDd3tCmQ.jpeg","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/01\/USE_q5mNQR-0w4DDd3tCmQ.jpeg","width":1312,"height":736,"caption":"DEFENDERBOX gegen die Neue Dimension der T\u00e4uschung"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/die-evolution-der-cyberkriminalitaet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Die Evolution der Cyberkriminalit\u00e4t"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/19334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=19334"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/19334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/19335"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=19334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=19334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=19334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}