{"id":9808,"date":"2019-12-18T09:15:00","date_gmt":"2019-12-18T09:15:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9808"},"modified":"2026-04-17T18:07:50","modified_gmt":"2026-04-17T18:07:50","slug":"cybersecurity-insights-9","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/cybersecurity-insights-9\/","title":{"rendered":"Cybersecurity Insights-9"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>5.3 DDoS Attacks<\/strong><\/h2>\n<h3><strong>5.3.1 Attack Trend<\/strong><\/h3>\n<p>In 2018, we observed 148,000 DDoS attacks (down 28.4% from 2017), which generated a total of 643,100 TB of attack traffic, about the same volume as observed in 2017. This trend suggests that<br \/>\nwhile the number of DDoS attacks is lower, the size of the attack are growing. Large and medium-size attacks are on the rise.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1218-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9809\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1218-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"685\" height=\"475\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1218-1.jpg 685w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1218-1-300x208.jpg 300w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/a><\/p>\n<p>In 2018, the number of DDoS attacks dropped significantly, driven by effective fortifications against reflection attacks. Since the beginning of 2018, the National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC) has deployed its provincial branches, in cooperation with carriers and cloud service providers around the country, in a special campaign against DDoD reflection attack resources in China by, for example, identifying bogus source IP addresses and making reflection attack sources known to the public. These governance measures have effectively reduced the success rate of reflection attacks, forcing attackers to resort to other means. According to statistics, in 2018, the number of reflection attacks did decrease 80%, but other DDoS attacks increased 73%. As a result, reflection attacks accounted for only 3% of all DDoS attacks.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-A.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9827\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-A.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"735\" height=\"437\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-A.jpg 735w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-A-300x178.jpg 300w\" sizes=\"(max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p>In the first half of 2018, the number of DDoS attacks increased slowly. However, in the second half the DDoS attacks quickly ramped upwards. We believe that the month-to-month increase in the number of DDoS attacks was linked with the fall of cryptocurrency prices. In the 2017 DDoS and Web Application Attack Landscape 612 , we pointed out that, with the appreciation of cryptocurrency, hackers began to divert prime botnet resources to cost-efficient cryptomining activities and away from costly DDoS attacks. In 2018, the price of cryptocurrency dropped, leading to decreased profits from cryptomining, which in turn made DDoS attacks more attractive and led to the monthly increases. Comparing the monthly Bitcoin price with the monthly DDoS attack traffic, we get the Pearson correlation coefficient of &acirc;&euro;&ldquo;0.48, indicating a negative correlation between the two, which validates our results.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-B.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9829\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-B.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"645\" height=\"373\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-B.jpg 645w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-B-300x173.jpg 300w\" sizes=\"(max-width: 645px) 100vw, 645px\" \/><\/a><\/p>\n<p>In recent years, super-large attacks have emerged and constantly grown in the peak size. In March 2018, the well-known code hosting website GitHub was hit by a DDoS attack peaking at 1.35 Tbps, the largest attack size seen until then. As of the time of writing, the peak traffic rate of DDoS attacks had kept increasing and has reached a record high of 1.7 Tbps713. Monthly statistics of the past two years reveal that the number of large attacks with a peak rate of more than 100 Gbps have rapidly increased. This indicates that the scale of attack resources controlled by attackers is expanding and their attack capabilities are constantly being upgraded.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-C.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9830\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-C.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"635\" height=\"346\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-C.jpg 635w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1219-C-300x163.jpg 300w\" sizes=\"(max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p>Improving DDoS attack capabilities and the record high average peak sizes both point to DDoS attacks are becoming increasingly more destructive. In fact, most hackers can now easily generate huge amounts of attack traffic and their capabilities are still growing rapidly. Security professionals need to pay attention to this alarming trend and take appropriate action.<\/p>\n<p>&nbsp;<\/p>\n<p>To be continued.<\/p>\n<p>&nbsp;<\/p>\n<p><em>12&atilde;&euro;&euro;https:\/\/nsfocusglobal.com\/2017-attack-landscape-report\/<\/em><\/p>\n<p><em>13&atilde;&euro;&euro;https:\/\/www.wired.com\/story\/github-ddos-memcached\/<\/em><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>5.3 DDoS Attacks 5.3.1 Attack Trend In 2018, we observed 148,000 DDoS attacks (down 28.4% from 2017), which generated a total of 643,100 TB of attack traffic, about the same volume as observed in 2017. This trend suggests that while the number of DDoS attacks is lower, the size of the attack are growing. Large [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[357],"class_list":["post-9808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Insights-9 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Insights-9 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"5.3 DDoS Attacks 5.3.1 Attack Trend In 2018, we observed 148,000 DDoS attacks (down 28.4% from 2017), which generated a total of 643,100 TB of attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-18T09:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Insights-9 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"5.3 DDoS Attacks 5.3.1 Attack Trend In 2018, we observed 148,000 DDoS attacks (down 28.4% from 2017), which generated a total of 643,100 TB of attack\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Cybersecurity Insights-9\",\"datePublished\":\"2019-12-18T09:15:00+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/\"},\"wordCount\":499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"keywords\":[\"Cybersecurity Insights\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/\",\"name\":\"Cybersecurity Insights-9 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"datePublished\":\"2019-12-18T09:15:00+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"width\":540,\"height\":381,\"caption\":\"Cybersecurity insights cover with green design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-9\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Insights-9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Insights-9 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Insights-9 - NSFOCUS","og_description":"5.3 DDoS Attacks 5.3.1 Attack Trend In 2018, we observed 148,000 DDoS attacks (down 28.4% from 2017), which generated a total of 643,100 TB of attack","og_url":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/","og_site_name":"NSFOCUS","article_published_time":"2019-12-18T09:15:00+00:00","article_modified_time":"2026-04-17T18:07:50+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Insights-9 - NSFOCUS","twitter_description":"5.3 DDoS Attacks 5.3.1 Attack Trend In 2018, we observed 148,000 DDoS attacks (down 28.4% from 2017), which generated a total of 643,100 TB of attack","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Cybersecurity Insights-9","datePublished":"2019-12-18T09:15:00+00:00","dateModified":"2026-04-17T18:07:50+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/"},"wordCount":499,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","keywords":["Cybersecurity Insights"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/","url":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/","name":"Cybersecurity Insights-9 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","datePublished":"2019-12-18T09:15:00+00:00","dateModified":"2026-04-17T18:07:50+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","width":540,"height":381,"caption":"Cybersecurity insights cover with green design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-9\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Insights-9"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9808"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9808\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9469"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}