{"id":9814,"date":"2019-12-25T01:37:23","date_gmt":"2019-12-25T01:37:23","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9814"},"modified":"2026-04-17T18:07:50","modified_gmt":"2026-04-17T18:07:50","slug":"cybersecurity-insights-10","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/cybersecurity-insights-10\/","title":{"rendered":"Cybersecurity Insights-10"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>5.3.2 Attack Type Distribution<\/strong><\/h2>\n<p>In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which altogether accounted for 96% of all DDoS attacks. In contrast, reflection attackers contributed to no more than 3% of attacks. Compared with 2017, the year 2018 witnessed a 80% decrease in the number of reflection attacks, but a 73% increase in other attacks. This is because of effective governance measures taken against reflectors.<!--more--><\/p>\n<p>ACK flood attacks generated 42.6% of the total attack traffic. Certain sectors (like gaming) have large number of users and sessions as well as long-lived connections which make them easy targets of ACK attacks characterized by large packets.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9815\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"662\" height=\"429\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-1.jpg 662w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-1-300x194.jpg 300w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><\/a><\/p>\n<p>SYN flood attacks still stood out among all types of DDoS attacks. This is a method where an attacker, by exploiting defects in the TCP protocol, sends a large number of TCP connection requests to exhaust resources of a target. This method is seldom used independently, but rather used with SYN floods to overwhelm hosts and firewalls that need to perform large numbers of calculations to determine whether the ACK packets are legitimate. This will deplete resources of the target and cause a denial of service attack.<\/p>\n<p>UDP floods are traffic-based DDoS attacks that are always active on the internet. Usually, an attacker floods DNS servers, RADIUS authentication servers and streaming media servers with many small UDP packets. As a simple protocol, UDP makes it extremely easy to generate large amounts of traffic with few resources. Also, UDP floods do not require setup of connections, thus becoming the attack method of choice.<\/p>\n<p>HTTP floods and HTTPS floods are application layer attacks launched against web servers. An attacker launches these types of attack by simulating a legitimate user accessing websites. This may cause&Acirc;&nbsp;serious chain effects. When a client keeps sending requests while performing frequent database operations, not only will the web front-end respond slowly, but the backend server program will also be indirectly affected. In the worst case scenario, backend services, such as the database, may stop responding or crash, and even related hosts, such as the log storage server and image server, may be compromised.<\/p>\n<p>Of all DDoS attacks seen in 2018, 13% used a combination of multiple attack methods. By flexibly combining several methods to adapt to different environments of target systems, attackers could<br \/>\ninitiate large amounts of traffic as well as exploiting vulnerabilities in different protocols &amp; systems, bringing attack capabilities fully into play. Conversely, defenders found it very costly to effectively analyze, respond to, and mitigate such distributed attacks.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9816\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"782\" height=\"338\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-2.jpg 782w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-2-300x130.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-2-768x332.jpg 768w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/><\/a><\/p>\n<p>In 2018, the number of reflection attacks experienced a sharp drop, accounting for only 3% of the total DDoS attacks, but related traffic took up 10% of total DDoS traffic. Due to the destructive power of the amplification effect, reflection attacks are still a threat that cannot be ignored.<\/p>\n<p>In terms of the attack count, NTP reflection attacks topped the list, accounting for 60% of all reflection attacks. In terms of the attack traffic, SSDP reflection attacks generated 42% of traffic.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9817\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"766\" height=\"461\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-3.jpg 766w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-3-300x181.jpg 300w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/><\/a><\/p>\n<p>The number of active reflectors dropped by 60% in 2018. Specifically, the number of SSDP reflectors decreased significantly while DNS reflectors increased slightly. Obviously, authorities&#8217; cracking down on attack sources, especially SSDP reflectors, has had a great impact.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9818\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"661\" height=\"416\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-4.jpg 661w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1225-4-300x189.jpg 300w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>To be continued.<\/p>\n<p>&nbsp;<\/p>\n<p><em>14&atilde;&euro;&euro;Here, we break down multi-vector attacks into respective types.<\/em><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>5.3.2 Attack Type Distribution In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which altogether accounted for 96% of all DDoS attacks. In contrast, reflection attackers contributed to no more than 3% of attacks. Compared with 2017, the year 2018 witnessed a 80% decrease [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[357],"class_list":["post-9814","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Insights-10 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Insights-10 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"5.3.2 Attack Type Distribution In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-25T01:37:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Insights-10 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"5.3.2 Attack Type Distribution In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Cybersecurity Insights-10\",\"datePublished\":\"2019-12-25T01:37:23+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/\"},\"wordCount\":551,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"keywords\":[\"Cybersecurity Insights\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/\",\"name\":\"Cybersecurity Insights-10 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"datePublished\":\"2019-12-25T01:37:23+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"width\":540,\"height\":381,\"caption\":\"Cybersecurity insights cover with green design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-10\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Insights-10\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Insights-10 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Insights-10 - NSFOCUS","og_description":"5.3.2 Attack Type Distribution In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which","og_url":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/","og_site_name":"NSFOCUS","article_published_time":"2019-12-25T01:37:23+00:00","article_modified_time":"2026-04-17T18:07:50+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Insights-10 - NSFOCUS","twitter_description":"5.3.2 Attack Type Distribution In 2018, the most frequent attacks seen814 were SYN flood, UDP flood, ACK flood, HTTP flood and HTTPS flood attacks, which","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Cybersecurity Insights-10","datePublished":"2019-12-25T01:37:23+00:00","dateModified":"2026-04-17T18:07:50+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/"},"wordCount":551,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","keywords":["Cybersecurity Insights"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/","url":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/","name":"Cybersecurity Insights-10 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","datePublished":"2019-12-25T01:37:23+00:00","dateModified":"2026-04-17T18:07:50+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","width":540,"height":381,"caption":"Cybersecurity insights cover with green design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-10\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Insights-10"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9814"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9814\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9469"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}