{"id":22331,"date":"2025-05-22T10:00:00","date_gmt":"2025-05-22T08:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=22331"},"modified":"2025-08-12T18:23:57","modified_gmt":"2025-08-12T16:23:57","slug":"ransomware-yield","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/ransomware-rendite\/","title":{"rendered":"From ransomware to returns"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"22331\" class=\"elementor elementor-22331\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd3eed e-con-full e-flex e-con e-parent\" data-id=\"bcd3eed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63b289cc elementor-widget elementor-widget-text-editor\" data-id=\"63b289cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>How cyber criminals become investors!<\/h2>\n<h3>Cybercrime has grown up.<\/h3>\n<p style=\"font-weight: 400;\">Long gone are the days when online criminals spent their loot on luxury cars, expensive watches or parties in Dubai. Today, many criminals are thinking long-term - and surprisingly business-like.<\/p>\n<p style=\"font-weight: 400;\">A recent analysis by Sophos X-Ops shows that proceeds from ransomware, phishing or business email compromise attacks are increasingly flowing into real companies.<\/p>\n<p style=\"font-weight: 400;\">The goal: an inconspicuous but effective entry into the world of the legal economy - using all means of camouflage and professionalism.<\/p>\n<h2>Our recommendation at DEFENDERBOX:<\/h2>\n<p style=\"font-weight: 400;\">We help to distinguish the real players from the fake ones. Because cybercrime has become more professional. It's high time our response was too.<\/p>\n<p class=\"\" data-start=\"858\" data-end=\"1124\"><strong data-start=\"1000\" data-end=\"1043\">What makes the DEFENDERBOX so special?<\/strong><\/p>\n<ul>\n<li data-start=\"858\" data-end=\"1124\"><strong data-start=\"1047\" data-end=\"1062\">Plug &amp; Play<\/strong>Simply connect - done. No IT knowledge or project required.<\/li>\n<li data-start=\"858\" data-end=\"1124\"><strong data-start=\"1121\" data-end=\"1161\">Automated detection of security vulnerabilities<\/strong>Inside &amp; outside, around the clock.<\/li>\n<li data-start=\"858\" data-end=\"1124\"><strong data-start=\"1199\" data-end=\"1224\">Compact all-rounder<\/strong>Recognizes risks before attacks occur.<\/li>\n<li class=\"\" data-start=\"1119\" data-end=\"1196\">\n<p class=\"\" data-start=\"1121\" data-end=\"1196\"><strong data-start=\"1276\" data-end=\"1300\">Transparent reports<\/strong>Clear and prioritized recommendations for action in the event of exploitable security gaps - for greater security.<\/p>\n<\/li>\n<\/ul>\n<p class=\"\" data-start=\"1595\" data-end=\"1731\">Now to the <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Familiarization price<\/a> test.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:paragraph -->\n<h2>Business plans instead of botnets<\/h2>\n<p style=\"font-weight: 400;\">The modern cybercrime generation no longer looks like the old hacker movies: no hoodies in dark basements, but business suits, pitch decks and AI. The perpetrators act with real entrepreneurial discipline:<\/p>\n<ul style=\"font-weight: 400;\">\n<li><strong>Business plans:<\/strong>\u00a0well thought out, professionally presented<\/li>\n<li><strong>Structure:<\/strong>\u00a0Clear allocation of roles, operational processes<\/li>\n<li><strong>Channels:<\/strong>\u00a0Contact via WhatsApp Business, Telegram or LinkedIn<\/li>\n<li><strong>Locations:<\/strong> Investments in countries with a stable legal system - e.g. Switzerland, USA<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><br \/>At first glance, the whole thing looks legal - but it is often only legal in formal terms. Because in the background, criminally generated funds are laundered, disguised or simply \"rededicated\".<\/p>\n<h2>What is being invested in?<\/h2>\n<p style=\"font-weight: 400;\">Cyber criminals are now diversifying their portfolios in a similar way to traditional investors. Particularly popular:<\/p>\n<p style=\"font-weight: 400;\"><strong>IT companies:\u00a0<\/strong>Not just because they are profitable - but because they offer access to know-how, infrastructure and customer contacts. Some perpetrators specifically buy into start-ups, others set up their own.<\/p>\n<p style=\"font-weight: 400;\"><strong>Real estate and precious metals: <\/strong>A perennial favorite for investing money - ideal for parking large sums inconspicuously.<\/p>\n<p style=\"font-weight: 400;\"><strong>Educational initiatives &amp; coding schools:\u00a0<\/strong>Cynical, but real: by investing in training, the perpetrators secure access to talent - and build up long-term structures.<\/p>\n<p style=\"font-weight: 400;\"><strong>Gastronomy and retail:\u00a0<\/strong>Cash-intensive sectors in particular are ideal for concealing the origin and volume of sales.<\/p>\n<h2>The perfect double: criminal &amp; entrepreneur<\/h2>\n<p style=\"font-weight: 400;\">What used to be done via letterbox companies in offshore areas is now done with a more modern touch: start-up mentality, investor events, LinkedIn profiles.<br \/><br \/>The perpetrators learn from the real business world - and skillfully exploit its mechanisms. Legality is often just a facade.<\/p>\n<h2>What does this mean for IT security?<\/h2>\n<p style=\"font-weight: 400;\">The analysis clearly shows: <strong>Cybersecurity does not end at the firewall.<br \/><\/strong><br \/>We need to think further - beyond the code, the malware and the phishing mail. If you want to understand how modern cybercrime networks work, you also have to look at the economic and social dynamics behind them.<\/p>\n<h3>What to do?<\/h3>\n<ul style=\"font-weight: 400;\">\n<li><strong>Promote education:<\/strong> in companies, schools and public authorities<\/li>\n<li><strong>Check suspicious business models:<\/strong>\u00a0also in the context of investments and partnerships<\/li>\n<li><strong>Sensitize partners:<\/strong>\u00a0not only technically, but also economically<\/li>\n<li><strong>Conduct digital due diligence:<\/strong>\u00a0especially in the channel environment<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong><br \/>Conclusion: When cybercriminals play investor, the security community needs a better look behind the scenes.<\/strong><\/p>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/defenderbox.de\/en\/product\/\" target=\"_blank\" rel=\"noopener\"><strong>DEFENDERBOX<\/strong><\/a> supports its customers and <a href=\"https:\/\/defenderbox.de\/en\/partner\/\" target=\"_blank\" rel=\"noopener\">Partner<\/a> not only with technical security expertise, but also with the necessary intuition for new forms of digital threat - from attacks to start-up financing.<\/p>\n<p>\u00a0<\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Long gone are the days when online criminals pocketed their loot in luxury. Today, criminals think in surprisingly business-like terms.<\/p>","protected":false},"author":3,"featured_media":22332,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,42,37,36],"class_list":["post-22331","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-ihk-siegen","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Von der Ransomware zur Rendite - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/ransomware-yield\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Von der Ransomware zur Rendite - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/ransomware-yield\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-22T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T16:23:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Von der Ransomware zur Rendite\",\"datePublished\":\"2025-05-22T08:00:00+00:00\",\"dateModified\":\"2025-08-12T16:23:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"IHK Siegen\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/\",\"name\":\"Von der Ransomware zur Rendite - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg\",\"datePublished\":\"2025-05-22T08:00:00+00:00\",\"dateModified\":\"2025-08-12T16:23:57+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg\",\"width\":1344,\"height\":768,\"caption\":\"DEFENDERBOX unterst\u00fctzt KMU gegen Hacker: Von Ransomware zu Rendite\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/ransomware-rendite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Von der Ransomware zur Rendite\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From ransomware to return on investment - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/ransomware-yield\/","og_locale":"en_US","og_type":"article","og_title":"Von der Ransomware zur Rendite - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/ransomware-yield\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-05-22T08:00:00+00:00","article_modified_time":"2025-08-12T16:23:57+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg","type":"image\/jpeg"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/ransomware-rendite\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Von der Ransomware zur Rendite","datePublished":"2025-05-22T08:00:00+00:00","dateModified":"2025-08-12T16:23:57+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/ransomware-rendite\/"},"wordCount":554,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","IHK Siegen","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/ransomware-rendite\/","url":"https:\/\/defenderbox.de\/ransomware-rendite\/","name":"From ransomware to return on investment - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg","datePublished":"2025-05-22T08:00:00+00:00","dateModified":"2025-08-12T16:23:57+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/ransomware-rendite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Cybercrime-Von-de.jpg","width":1344,"height":768,"caption":"DEFENDERBOX unterst\u00fctzt KMU gegen Hacker: Von Ransomware zu Rendite"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/ransomware-rendite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Von der Ransomware zur Rendite"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=22331"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22331\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/22332"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=22331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=22331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=22331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}