{"id":117568,"date":"2025-12-10T10:00:12","date_gmt":"2025-12-10T03:00:12","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=117568"},"modified":"2026-04-01T15:20:59","modified_gmt":"2026-04-01T08:20:59","slug":"apac-cybersecurity-alert-identity-attacks-surge","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/apac-cybersecurity-alert-identity-attacks-surge\/","title":{"rendered":"Cybersicherheitswarnung f\u00fcr den asiatisch-pazifischen Raum: Identit\u00e4tsangriffe nehmen stark zu"},"content":{"rendered":"<p><span data-contrast=\"auto\">\u00a0Identit\u00e4tsdiebstahl hat sich im asiatisch-pazifischen Raum (APAC) zum zentralen Schlachtfeld der Cybersicherheit entwickelt. Angreifer verlagern ihren Fokus von systemzentrierten Angriffen hin zu direkten Zielen auf Personen. Laut einer neuen Branchenstudie sind URL-basierte Angriffe besonders relevant.<\/span><span data-contrast=\"auto\">D-Bedrohungen treten mittlerweile viermal so h\u00e4ufig auf wie Angriffe, die auf Anh\u00e4ngen basieren. Sobald ein Angreifer eine Identit\u00e4t kompromittiert hat, kann er Kontrollen umgehen, sich lateral in Netzwerken bewegen und den Zugriff schnell monetarisieren.<\/span><span data-contrast=\"auto\">y.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sicherheitsexperten warnen davor, dass Angreifer psychologische Ausl\u00f6ser wie Dringlichkeit, Autorit\u00e4t und finanzielle Anreize ausnutzen, um Opfer \u00fcber E-Mail, SMS und Kollaborationsplattformen zu manipulieren. Die wachsende Angriffsfl\u00e4che umfasst nun nicht nur Benutzernamen und Passw\u00f6rter, sondern auch Cloud-Token, API-Schl\u00fcssel und OAU-Daten.<\/span><span data-contrast=\"auto\">Anmeldeinformationen, Zertifikate und eingebettete Geheimnisse. Ein Bericht der Identity Defined Security Alliance ergab, dass 901 % der Organisationen im letzten Jahr einen Vorfall im Zusammenhang mit Identit\u00e4tsdaten erlebt haben.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Proofpoints <\/span><i><span data-contrast=\"auto\">Zustand von Phish 2025<\/span><\/i><span data-contrast=\"auto\"> Die Studie unterstreicht zudem den menschlichen Faktor und identifiziert Credential-Phishing und Business-E-Mail-Kompromittierung als die h\u00e4ufigsten Angriffsvektoren. Mehr als 101.500 Endpunkte weisen offengelegte privilegierte Passw\u00f6rter auf, wodurch Identit\u00e4tsmissbrauch zu einem der h\u00e4ufigsten \u2013 und gef\u00e4hrlichsten \u2013 Risiken wird.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mit der Integration von KI-Systemen in Arbeitsabl\u00e4ufe entstehen neue Sicherheitsl\u00fccken. KI-Assistenten lassen sich durch gezielte Manipulation oder durch das Verf\u00e4lschen ihrer Eingaben ausnutzen. Einmal kompromittiert, k\u00f6nnen sie in Windeseile sch\u00e4dliche Aktionen ausf\u00fchren. Sicherheitsexperten fordern daher, dass der Schutz von Identit\u00e4ten \u00fcber den Menschen hinausgehen und auch andere Identit\u00e4ten umfassen muss.<\/span><span data-contrast=\"auto\">e die KI-Systeme, die in ihrem Namen handeln.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Experten betonen, dass die \u201cmenschliche Widerstandsf\u00e4higkeit\u201d weiterhin eine entscheidende Verteidigungsebene darstellt und daher verst\u00e4rkte Sensibilisierungsschulungen, Phishing-resistente Multi-Faktor-Authentifizierung (MFA) und schnelle Meldemechanismen erfordert. Eine mehrschichtige Strategie, die Identit\u00e4tskontrollen, Bedrohungsanalysen, sichere Ger\u00e4tepraktiken und einen robusten Schutz personenbezogener Daten integriert, ist notwendig, da Angreifer \u00fcber verschiedene Kan\u00e4le Vertrauen missbrauchen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Die Botschaft an Organisationen im asiatisch-pazifischen Raum ist eindeutig: Identit\u00e4t ist der neue Perimeter, und ihre St\u00e4rkung ist nun zentral f\u00fcr Sicherheit, Compliance und digitales Vertrauen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.itnews.asia\/news\/identity-is-now-the-new-cybersecurity-battlefield-622384\"><span data-contrast=\"none\">https:\/\/www.itnews.asia\/news\/identity-is-now-the-new-cybersecurity-battlefield-622384<\/span><\/a> <span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00a0Identit\u00e4tsdiebstahl hat sich im asiatisch-pazifischen Raum (APAC) zum zentralen Schlachtfeld der Cybersicherheit entwickelt. Angreifer verlagern ihren Fokus von systemzentrierten Angriffen hin zu direkten Zielen auf Personen. Laut einer neuen Branchenstudie treten URL-basierte Bedrohungen mittlerweile viermal h\u00e4ufiger auf als Angriffe \u00fcber Anh\u00e4nge. Sobald ein Angreifer eine Identit\u00e4t kompromittiert hat, kann er Sicherheitsvorkehrungen umgehen, sich lateral in Netzwerken bewegen und [\u2026]<\/p>","protected":false},"author":238283293,"featured_media":117570,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1538],"class_list":["post-117568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>APAC Cybersecurity Alert: Identity Attacks Surge - Eastgate Software<\/title>\n<meta name=\"description\" content=\"Identity has become the new cybersecurity battleground in APAC, with attackers shifting to URL-based phishing and credential theft.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APAC Cybersecurity Alert: Identity Attacks Surge\" \/>\n<meta property=\"og:description\" content=\"Identity has become the new cybersecurity battleground in APAC, with attackers shifting to URL-based phishing and credential theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/apac-cybersecurity-alert-identity-attacks-surge\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-10T03:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:20:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"APAC Cybersecurity Alert: Identity Attacks Surge\",\"datePublished\":\"2025-12-10T03:00:12+00:00\",\"dateModified\":\"2026-04-01T08:20:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/\"},\"wordCount\":307,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/\",\"name\":\"APAC Cybersecurity Alert: Identity Attacks Surge - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2025-12-10T03:00:12+00:00\",\"dateModified\":\"2026-04-01T08:20:59+00:00\",\"description\":\"Identity has become the new cybersecurity battleground in APAC, with attackers shifting to URL-based phishing and credential theft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"APAC Cybersecurity Alert: Identity Attacks Surge\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/apac-cybersecurity-alert-identity-attacks-surge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APAC Cybersecurity Alert: Identity Attacks Surge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersicherheitswarnung f\u00fcr den asiatisch-pazifischen Raum: Identit\u00e4tsangriffe nehmen stark zu \u2013 Eastgate Software","description":"Die Identit\u00e4tsdiebstahl hat sich im asiatisch-pazifischen Raum zum neuen Schlachtfeld der Cybersicherheit entwickelt, wobei Angreifer verst\u00e4rkt auf URL-basiertes Phishing und den Diebstahl von Zugangsdaten setzen.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"APAC Cybersecurity Alert: Identity Attacks Surge","og_description":"Identity has become the new cybersecurity battleground in APAC, with attackers shifting to URL-based phishing and credential theft.","og_url":"https:\/\/wp.eastgate-software.com\/de\/apac-cybersecurity-alert-identity-attacks-surge\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2025-12-10T03:00:12+00:00","article_modified_time":"2026-04-01T08:20:59+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"APAC Cybersecurity Alert: Identity Attacks Surge","datePublished":"2025-12-10T03:00:12+00:00","dateModified":"2026-04-01T08:20:59+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/"},"wordCount":307,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1","keywords":["cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/","url":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/","name":"Cybersicherheitswarnung f\u00fcr den asiatisch-pazifischen Raum: Identit\u00e4tsangriffe nehmen stark zu \u2013 Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1","datePublished":"2025-12-10T03:00:12+00:00","dateModified":"2026-04-01T08:20:59+00:00","description":"Die Identit\u00e4tsdiebstahl hat sich im asiatisch-pazifischen Raum zum neuen Schlachtfeld der Cybersicherheit entwickelt, wobei Angreifer verst\u00e4rkt auf URL-basiertes Phishing und den Diebstahl von Zugangsdaten setzen.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"APAC Cybersecurity Alert: Identity Attacks Surge"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/apac-cybersecurity-alert-identity-attacks-surge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"APAC Cybersecurity Alert: Identity Attacks Surge"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/12\/EGS-news-website-1366-x-768px-6.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uAg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/117568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=117568"}],"version-history":[{"count":4,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/117568\/revisions"}],"predecessor-version":[{"id":119616,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/117568\/revisions\/119616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/117570"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=117568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=117568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=117568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}