{"id":8424,"date":"2024-05-23T10:00:00","date_gmt":"2024-05-23T08:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=8424"},"modified":"2025-08-13T19:14:39","modified_gmt":"2025-08-13T17:14:39","slug":"rapid-response","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/rapid-response\/","title":{"rendered":"Know about new cyber threats"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"8424\" class=\"elementor elementor-8424\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a1957da e-con-full e-flex e-con e-parent\" data-id=\"6a1957da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cabfb86 elementor-widget elementor-widget-text-editor\" data-id=\"6cabfb86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">...before they become public?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Imagine your garden fence has a hole in it. Maybe you know about the hole, or maybe you don't know about it. The fact is: burglars could get into your garden through the hole, steal your garden tools and gain access to your house.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The situation is similar with security gaps within your IT infrastructure and on your computer: Cyber criminals make it a point to find such gaps in order to attack. A so-called exploit attack.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>In the constantly evolving field of cyber security, the speed with which you respond to new security vulnerabilities makes a significant difference. Because this can result in either a minor security incident or a catastrophic business situation.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>With the <strong><a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a><\/strong> you have\u00a0<strong>as of now<\/strong>\u00a0a strategic and cyber-secure advantage: By identifying exploits at an early stage, you can initiate preventive measures in good time!\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\">Your advantages<\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p><span style=\"text-decoration: underline;\">Early warning:<\/span>\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Receive instant notifications from the DEFENDERBOX team about emerging vulnerabilities that have been confirmed as exploitable for your organization. This gives you a head start on remediating any cyber threats that are imminent!<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p><span style=\"text-decoration: underline;\">Preventive advice:<\/span>\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>The <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> informs you about the status of the threat and provides you with information that is modeled from the perspective of the attackers. This gives you a better understanding of threats and enables you to mitigate or eliminate them as quickly as possible.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p><span style=\"text-decoration: underline;\">Background knowledge:<\/span>\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Each alert contains detailed information about the type of threat and the affected devices in your company so that you can prioritize your response to be as effective as possible.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p><span style=\"text-decoration: underline;\">Efficient use of resources:<\/span><\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>The <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> helps you to concentrate on the essentials. By setting the focus and quickly identifying actionable threats, you can deploy your resources in a targeted manner to eliminate them.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p><span style=\"text-decoration: underline;\">Early availability of exploits:<\/span><\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Exploits are often available days or weeks before they become public knowledge. Pentesting with the DEFENDERBOX allows you to test and refine your cyber security against the latest attack vectors well in advance.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p><span style=\"text-decoration: underline;\">Safe to use:<\/span>\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Scan regularly and often in between to test the existing measures. The scans are adapted so that they are not disrupted in live environments.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p>With the DEFENDERBOX you are definitely on the right side. Our box contains the most important pentest and vulnerability analysis tools, including NodeZero from Horizon3.ai.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\">And this is how you benefit as a DEFENDERBOX customer<\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p><a href=\"https:\/\/defenderbox.de\/en\/partner\/\">Horizon3.ai<\/a> has recognized the critical role of response time in the development of exploits and offers the \"Rapid Response\" system as a service included in NodeZero.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>At the heart of Rapid Response is the idea that early detection from the hacker's perspective and rapid response from the company's perspective are essential to stay one step ahead of evolving cyberattacks. And that before they become a trend.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>By leveraging Horizon3.ai's expertise in offensive cybersecurity and NodeZero's autonomous pentesting capabilities, the <a href=\"https:\/\/defenderbox.de\/en\/product\/\" target=\"_blank\" rel=\"noopener\">DEFENDERBOX<\/a> with the integrated Rapid Response System your SME: We provide you with verified threat information at an early stage! We assess the exploitability and urgency of these vulnerability(ies), taking into account factors such as the ease of exploitation, the severity of the impact and the frequency of use.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Be with the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> One step ahead of cyber threats: Strengthen your company's resilience against attacks aimed at exploiting the latest vulnerabilities.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Would you like to know how secure your company is? Find out with our <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\">Test installation<\/a> \"Find &amp; Fix\" out!<\/p>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:column --><!-- \/wp:columns --><!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With DEFENDERBOX, you now have a strategic and cyber-secure advantage: by identifying exploits at an early stage, you can initiate preventive measures in good time! <\/p>","protected":false},"author":3,"featured_media":8444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,34],"tags":[46,41,39,38,40,37,36],"class_list":["post-8424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netzwerksicherheit-mit-defenderbox","category-defenderbox","tag-automotive","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00dcber neue Cyberbedrohungen Bescheid wissen - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/rapid-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00dcber neue Cyberbedrohungen Bescheid wissen - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/rapid-response\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T17:14:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/fence-6597423_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"\u00dcber neue Cyberbedrohungen Bescheid wissen\",\"datePublished\":\"2024-05-23T08:00:00+00:00\",\"dateModified\":\"2025-08-13T17:14:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/fence-6597423_1280.jpg\",\"keywords\":[\"Automotive\",\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Netzwerksicherheit\",\"Produkt\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/\",\"name\":\"\u00dcber neue Cyberbedrohungen Bescheid wissen - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/fence-6597423_1280.jpg\",\"datePublished\":\"2024-05-23T08:00:00+00:00\",\"dateModified\":\"2025-08-13T17:14:39+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/fence-6597423_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/fence-6597423_1280.jpg\",\"width\":1280,\"height\":853,\"caption\":\"Mit der DEFENDERBOX sind Sie definitiv auf der richtigen Seite. Unsere Box beinhaltet die wichtigsten Pentest- und Schwachstellenanalyse- Tools, unter anderem NodeZero von Horizon3.ai.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/rapid-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00dcber neue Cyberbedrohungen Bescheid wissen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Knowing about new cyber threats - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/rapid-response\/","og_locale":"en_US","og_type":"article","og_title":"\u00dcber neue Cyberbedrohungen Bescheid wissen - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/rapid-response\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-05-23T08:00:00+00:00","article_modified_time":"2025-08-13T17:14:39+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/fence-6597423_1280.jpg","type":"image\/jpeg"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/rapid-response\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/rapid-response\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"\u00dcber neue Cyberbedrohungen Bescheid wissen","datePublished":"2024-05-23T08:00:00+00:00","dateModified":"2025-08-13T17:14:39+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/rapid-response\/"},"wordCount":585,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/rapid-response\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/fence-6597423_1280.jpg","keywords":["Automotive","Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Netzwerksicherheit","Produkt"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/rapid-response\/","url":"https:\/\/defenderbox.de\/rapid-response\/","name":"Knowing about new cyber threats - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/rapid-response\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/rapid-response\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/fence-6597423_1280.jpg","datePublished":"2024-05-23T08:00:00+00:00","dateModified":"2025-08-13T17:14:39+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/rapid-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/rapid-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/rapid-response\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/fence-6597423_1280.jpg","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/fence-6597423_1280.jpg","width":1280,"height":853,"caption":"Mit der DEFENDERBOX sind Sie definitiv auf der richtigen Seite. Unsere Box beinhaltet die wichtigsten Pentest- und Schwachstellenanalyse- Tools, unter anderem NodeZero von Horizon3.ai."},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/rapid-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"\u00dcber neue Cyberbedrohungen Bescheid wissen"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/8424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=8424"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/8424\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/8444"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=8424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=8424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=8424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}