{"id":20610,"date":"2025-03-27T10:00:00","date_gmt":"2025-03-27T09:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=20610"},"modified":"2025-08-12T18:30:24","modified_gmt":"2025-08-12T16:30:24","slug":"virtual-meetings","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/virtuelle-meetings\/","title":{"rendered":"Virtual meetings as a gateway"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"20610\" class=\"elementor elementor-20610\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52fb94b7 e-con-full e-flex e-con e-parent\" data-id=\"52fb94b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75222a39 elementor-widget elementor-widget-text-editor\" data-id=\"75222a39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">Hackers use fake audio problems<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Virtual meetings have become an integral part of the modern working world. But it is precisely this everyday practice that is increasingly becoming the target of sophisticated cyber attacks. A new attack method uses fake audio and video problems to infiltrate companies with malware. Particularly perfidious: the attackers pose as reputable investors or business partners and deliberately rely on time pressure and human reflexes.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Are you prepared for cyber threats?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With modern protection mechanisms, the right strategy and managed security services such as the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a>\u00a0the risk can be minimized considerably. Digital security must become a priority - because attackers are already using the latest technologies. It's time to be one step ahead of them!<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Would you like to know how secure your company is? Find out with a test installation!<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"backgroundColor\":\"luminous-vivid-orange\"} -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-luminous-vivid-orange-background-color has-background wp-element-button\" href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TEST INSTALLATION<\/strong><\/a><br \/><br \/><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">The scam: fake investors and manipulated meetings<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Security researchers have discovered that a suspected North Korean hacker group is posing as venture capitalists in Zoom or Google Meet conferences. During the meetings, the attackers claim that they cannot hear the other party. They then send a supposed \"patch\" that is supposed to fix the audio problem - in reality, it is malware.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Another detail makes the attack particularly insidious: to disguise their identity, the attackers play a stock video of a supposedly bored businessman. This creates the impression of a real video connection, while malware is installed in the background.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The attackers use psychological tricks: Those who believe they are talking to important investors want to fix technical problems quickly without leaving the impression of unprofessionalism. This urgency makes people less suspicious and quicker to make rash decisions.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Losses in the millions and copycat offenders<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>According to security experts, this method has already cost companies and individuals \"tens of millions of dollars\". What is worrying is that other hacker groups are now also taking up this strategy and developing it further.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><strong>So the question is<\/strong>How can companies and individuals effectively protect themselves against such attacks?<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">DEFENDERBOX security tips: How to protect yourself from this threat<\/h2>\n<!-- \/wp:heading --><!-- wp:list {\"ordered\":true} -->\n<ol class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Be suspicious of unexpected technical problems: If a business partner or investor suddenly reports audio or video problems and asks you to download software, you should be skeptical.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Never use external links in meetings: If someone suggests changing the conference room, create a new, secure Google Meet or Zoom link yourself and share it with the participants.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Only obtain software from official sources: Updates or patches should always be downloaded directly from the provider's official website or the internal IT department - never via a link sent in a chat or by email.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Technical clarification with the IT department: In the event of suspicious incidents, inform the internal IT department immediately. It is better to briefly interrupt a meeting than to compromise the entire company network.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Promote training and awareness: Employees should be regularly trained and informed about new scams in order to recognize social engineering attacks and react correctly - <strong>Security awareness training<\/strong> with our partner <a href=\"https:\/\/defenderbox.de\/en\/partner\/\">Phishion.io<\/a><\/li>\n<!-- \/wp:list-item --><\/ol>\n<!-- \/wp:list --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Virtual meetings Conclusion: Making digital meetings safer<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>This new method of attack shows how cleverly cyber criminals exploit human behavior patterns. Companies should therefore focus more on security awareness and establish clear rules for dealing with technical problems in virtual meetings.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>With the right precautions, you can protect yourself from these perfidious attacks and make digital meetings safer. Stay vigilant - and don't let yourself be put under pressure!<\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybercriminals use sophisticated social engineering tactics to impersonate investors in Zoom or Google Meet calls and spread malware. Their trick? Alleged audio problems.<\/p>","protected":false},"author":3,"featured_media":20612,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,37,36],"class_list":["post-20610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Virtuelle Meetings als Einfallstor - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/virtual-meetings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtuelle Meetings als Einfallstor - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/virtual-meetings\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T16:30:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/03\/KI-Bild-erstellen.de-Vorsicht-vor-ange-1024x585.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Virtuelle Meetings als Einfallstor\",\"datePublished\":\"2025-03-27T09:00:00+00:00\",\"dateModified\":\"2025-08-12T16:30:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/\"},\"wordCount\":557,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/\",\"name\":\"Virtuelle Meetings als Einfallstor - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png\",\"datePublished\":\"2025-03-27T09:00:00+00:00\",\"dateModified\":\"2025-08-12T16:30:24+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png\",\"width\":1344,\"height\":768,\"caption\":\"DEFENDERBOX - die proaktive Cybersicherheitsl\u00f6sung\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/virtuelle-meetings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Virtuelle Meetings als Einfallstor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtual meetings as a gateway - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/virtual-meetings\/","og_locale":"en_US","og_type":"article","og_title":"Virtuelle Meetings als Einfallstor - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/virtual-meetings\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-03-27T09:00:00+00:00","article_modified_time":"2025-08-12T16:30:24+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/03\/KI-Bild-erstellen.de-Vorsicht-vor-ange-1024x585.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Virtuelle Meetings als Einfallstor","datePublished":"2025-03-27T09:00:00+00:00","dateModified":"2025-08-12T16:30:24+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/"},"wordCount":557,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/03\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/","url":"https:\/\/defenderbox.de\/virtuelle-meetings\/","name":"Virtual meetings as a gateway - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/03\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png","datePublished":"2025-03-27T09:00:00+00:00","dateModified":"2025-08-12T16:30:24+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/virtuelle-meetings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/03\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/03\/KI-Bild-erstellen.de-Vorsicht-vor-ange.png","width":1344,"height":768,"caption":"DEFENDERBOX - die proaktive Cybersicherheitsl\u00f6sung"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/virtuelle-meetings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Virtuelle Meetings als Einfallstor"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/20610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=20610"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/20610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/20612"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=20610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=20610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=20610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}