{"id":22952,"date":"2025-07-17T10:00:00","date_gmt":"2025-07-17T08:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=22952"},"modified":"2026-03-11T18:13:31","modified_gmt":"2026-03-11T17:13:31","slug":"redirection","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/redirection\/","title":{"rendered":"Everyday tools as a security risk"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"22952\" class=\"elementor elementor-22952\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd3eed e-con-full e-flex e-con e-parent\" data-id=\"bcd3eed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63b289cc elementor-widget elementor-widget-text-editor\" data-id=\"63b289cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"color: #000000;\">How popular browser extensions became spying tools<\/span><\/h2>\n<div>\n<p data-start=\"309\" data-end=\"394\">Why companies should now take a closer look - and how they can protect themselves: What looks like a practical everyday tool - color picker, emoji keyboard, volume booster - can turn out to be a massive security risk. The latest case of a large-scale attack campaign shows just how dangerous browser extensions have become.<\/p>\n<p data-start=\"309\" data-end=\"394\"><span style=\"font-size: 16px;\">At least 18 Chrome and Edge extensions have been installed millions of times over the years - well rated, officially listed in the Chrome Web Store, unobtrusive. But according to an Israeli security company, these popular browser extensions are spying tools. This is because the add-ons have been retrofitted with malicious code. The operation goes by the name of <\/span><strong style=\"font-size: 16px;\" data-start=\"1026\" data-end=\"1044\">\"ReDirection\"<\/strong><span style=\"font-size: 16px;\"> - Over 2.3 million users are affected.<\/span><\/p>\n<\/div>\n<div>\n<p data-start=\"1094\" data-end=\"1392\">Particularly perfidious: the extensions were not malicious from the outset. They worked perfectly for a long time, collected good ratings - and thus enjoyed the trust of users. A single update was enough to turn them into tools for data theft and targeted redirects.<\/p>\n<h3><span style=\"color: #000000;\">Our recommendation at DEFENDERBOX:<\/span><\/h3>\n<p style=\"font-weight: 400;\">We support you in identifying exploitable security gaps! How? Find out how secure your company really is! Now to the <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Familiarization price<\/a> the <a href=\"https:\/\/defenderbox.de\/en\/product\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #5675d5;\"><strong>DEFENDERBOX<\/strong><\/span><\/a> test!<\/p>\n<p data-start=\"1431\" data-end=\"1659\">The infected extensions analyzed every website visited, sent the data including the user ID to a remote server and redirected those affected to fake pages when certain triggers occurred - including:<\/p>\n<ul data-start=\"1661\" data-end=\"1781\">\n<li data-start=\"1661\" data-end=\"1700\">\n<p data-start=\"1663\" data-end=\"1700\">Deceptively real banking portals<\/p>\n<\/li>\n<li data-start=\"1701\" data-end=\"1750\">\n<p data-start=\"1703\" data-end=\"1750\">Alleged Zoom updates with malware<\/p>\n<\/li>\n<li data-start=\"1751\" data-end=\"1781\">\n<p data-start=\"1753\" data-end=\"1781\">fake download pages<\/p>\n<\/li>\n<\/ul>\n<p>Although the extensions appeared to come from different developers with their own websites and brand names, the technical analysis showed that they all ran via a central infrastructure. A clear indication of a coordinated campaign that specifically exploits trust in well-known platforms such as the Chrome Web Store.<\/p>\n<h3><span style=\"color: #000000;\">You should remove these extensions immediately<\/span><\/h3>\n<ul>\n<li data-start=\"2277\" data-end=\"2326\">\n<p data-start=\"2279\" data-end=\"2326\">Emoji keyboard online - copy&amp;paste your emoji<\/p>\n<\/li>\n<li data-start=\"2327\" data-end=\"2352\">\n<p data-start=\"2329\" data-end=\"2352\">Free Weather Forecast<\/p>\n<\/li>\n<li data-start=\"2353\" data-end=\"2392\">\n<p data-start=\"2355\" data-end=\"2392\">Volume Max - Ultimate Sound Booster<\/p>\n<\/li>\n<li data-start=\"2393\" data-end=\"2423\">\n<p data-start=\"2395\" data-end=\"2423\">Unlock Discord - VPN Proxy<\/p>\n<\/li>\n<li data-start=\"2424\" data-end=\"2469\">\n<p data-start=\"2426\" data-end=\"2469\">Color Picker, Eyedropper - Geco colorpick<\/p>\n<\/li>\n<li data-start=\"2470\" data-end=\"2509\">\n<p data-start=\"2472\" data-end=\"2509\">Dark Theme - Dark Reader for Chrome<\/p>\n<\/li>\n<li data-start=\"2510\" data-end=\"2531\">\n<p data-start=\"2512\" data-end=\"2531\">Youtube Unblocked<\/p>\n<\/li>\n<li data-start=\"2534\" data-end=\"2632\">SearchGPT - ChatGPT for Search Engine<\/li>\n<\/ul>\n<p data-start=\"2672\" data-end=\"2817\">Even though many of these extensions have since been removed, the underlying servers are still in use, according to Koi Security <strong data-start=\"2790\" data-end=\"2804\">still active<\/strong>. Therefore applies:<\/p>\n<p data-start=\"2819\" data-end=\"2939\"><strong data-start=\"2819\" data-end=\"2858\">1. check and delete extensions<\/strong><br data-start=\"2858\" data-end=\"2861\" \/>\u2192 Only use add-ons that you really need. If unsure, it is better to remove them.<\/p>\n<p data-start=\"2941\" data-end=\"3016\"><strong data-start=\"2941\" data-end=\"2968\">2. delete browser data<\/strong><br data-start=\"2968\" data-end=\"2971\" \/>\u2192 To remove saved redirect URLs.<\/p>\n<p data-start=\"3018\" data-end=\"3071\"><strong data-start=\"3018\" data-end=\"3071\">3. scan the system with up-to-date antivirus software<\/strong><\/p>\n<p data-start=\"3073\" data-end=\"3147\"><strong data-start=\"3073\" data-end=\"3104\">4. monitor online accounts<\/strong><br data-start=\"3104\" data-end=\"3107\" \/>\u2192 Report suspicious activities immediately.<\/p>\n<p data-start=\"3149\" data-end=\"3247\"><strong data-start=\"3149\" data-end=\"3185\">5. sensitize employees<\/strong><br data-start=\"3185\" data-end=\"3188\" \/>\u2192 Especially with BYOD devices or hybrid working models.<\/p>\n<\/div>\n<div>\n<p data-start=\"3149\" data-end=\"3247\"><strong><span style=\"color: #000000;\">Conclusion: Small tools - big impact<\/span><\/strong><\/p>\n<p data-start=\"3297\" data-end=\"3563\">The biggest vulnerability in this case was not a technical hole, but user trust. ReDirection shows how a harmless update can turn a useful browser tool into a digital bug - without any phishing or social engineering.<\/p>\n<p data-start=\"3565\" data-end=\"3836\">For companies, this means that browser extensions must become part of the IT security strategy. Policies, regular checks and technical protective measures should ensure that even seemingly small risks cannot cause major damage unnoticed.<\/p>\n<p style=\"font-weight: 400;\"><strong>Acting now will prevent the damage of tomorrow.<\/strong><\/p>\n<p style=\"font-weight: 400;\">\u27a1\ufe0f\u00a0<a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Test now<\/a><br \/>\u27a1\ufe0f <a href=\"https:\/\/defenderbox.de\/en\/metform-form\/order-2\/\" target=\"_blank\" rel=\"noopener\">Become a partner<\/a><br \/>\u27a1\ufe0f\u00a0<a href=\"https:\/\/defenderbox.de\/en\/career\/\" target=\"_blank\" rel=\"noopener\">Career with us<\/a><\/p>\n<\/div>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:column --><!-- \/wp:columns -->\n<p>\u00a0<\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What looks like a practical everyday tool - color selector, emoji keyboard, volume booster - can turn out to be a massive security risk.<\/p>","protected":false},"author":3,"featured_media":22953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,42,37,36],"class_list":["post-22952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-ihk-siegen","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Alltagstools als Sicherheitsrisiko - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"Proaktive Sicherheit mit DEFENDERBOX: Sicherheitsl\u00fccken aufdecken, Risiken mindern und Schaden verhindern.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/redirection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alltagstools als Sicherheitsrisiko - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"Proaktive Sicherheit mit DEFENDERBOX: Sicherheitsl\u00fccken aufdecken, Risiken mindern und Schaden verhindern.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/redirection\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T17:13:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/07\/ki-bild-erstellen.de-Trojaner-im-Brows.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Alltagstools als Sicherheitsrisiko\",\"datePublished\":\"2025-07-17T08:00:00+00:00\",\"dateModified\":\"2026-03-11T17:13:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/\"},\"wordCount\":468,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ki-bild-erstellen.de-Trojaner-im-Brows.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"IHK Siegen\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/\",\"name\":\"Alltagstools als Sicherheitsrisiko - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ki-bild-erstellen.de-Trojaner-im-Brows.png\",\"datePublished\":\"2025-07-17T08:00:00+00:00\",\"dateModified\":\"2026-03-11T17:13:31+00:00\",\"description\":\"Proaktive Sicherheit mit DEFENDERBOX: Sicherheitsl\u00fccken aufdecken, Risiken mindern und Schaden verhindern.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ki-bild-erstellen.de-Trojaner-im-Brows.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/ki-bild-erstellen.de-Trojaner-im-Brows.png\",\"width\":1344,\"height\":768,\"caption\":\"DEFENDERBOX - Sybersicherheitsl\u00f6sung\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/redirection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alltagstools als Sicherheitsrisiko\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everyday tools as a security risk - DEFENDERBOX","description":"Proactive security with DEFENDERBOX: uncover security gaps, minimize risks and prevent damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/redirection\/","og_locale":"en_US","og_type":"article","og_title":"Alltagstools als Sicherheitsrisiko - DEFENDERBOX","og_description":"Proaktive Sicherheit mit DEFENDERBOX: Sicherheitsl\u00fccken aufdecken, Risiken mindern und Schaden verhindern.","og_url":"https:\/\/defenderbox.de\/en\/redirection\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-07-17T08:00:00+00:00","article_modified_time":"2026-03-11T17:13:31+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/07\/ki-bild-erstellen.de-Trojaner-im-Brows.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/redirection\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/redirection\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Alltagstools als Sicherheitsrisiko","datePublished":"2025-07-17T08:00:00+00:00","dateModified":"2026-03-11T17:13:31+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/redirection\/"},"wordCount":468,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/redirection\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/07\/ki-bild-erstellen.de-Trojaner-im-Brows.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","IHK Siegen","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/redirection\/","url":"https:\/\/defenderbox.de\/redirection\/","name":"Everyday tools as a security risk - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/redirection\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/redirection\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/07\/ki-bild-erstellen.de-Trojaner-im-Brows.png","datePublished":"2025-07-17T08:00:00+00:00","dateModified":"2026-03-11T17:13:31+00:00","description":"Proactive security with DEFENDERBOX: uncover security gaps, minimize risks and prevent damage.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/redirection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/redirection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/redirection\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/07\/ki-bild-erstellen.de-Trojaner-im-Brows.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/07\/ki-bild-erstellen.de-Trojaner-im-Brows.png","width":1344,"height":768,"caption":"DEFENDERBOX - Sybersicherheitsl\u00f6sung"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/redirection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Alltagstools als Sicherheitsrisiko"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=22952"}],"version-history":[{"count":13,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22952\/revisions"}],"predecessor-version":[{"id":27199,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22952\/revisions\/27199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/22953"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=22952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=22952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=22952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}