{"id":8168,"date":"2026-05-15T12:29:24","date_gmt":"2026-05-15T12:29:24","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=8168"},"modified":"2026-05-15T12:29:24","modified_gmt":"2026-05-15T12:29:24","slug":"how-hybrid-work-and-cloud-adoption-are-changing-enterprise-ransomware-risk","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=8168","title":{"rendered":"How Hybrid Work and Cloud Adoption Are Changing Enterprise Ransomware Risk"},"content":{"rendered":"<div class=\"elementor elementor-39697\">\n<div class=\"elementor-element elementor-element-55590f1a e-ecs-flex e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-1d6980f2 ha-has-bg-overlay elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Key Takeaways<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-512544bc elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Hybrid work, cloud adoption, and identity sync have expanded ransomware entry points beyond the perimeter<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Attackers now rely on valid credentials, remote access tools, and hybrid identity abuse, not just malware<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Detection gaps in east-west cloud traffic and unmanaged endpoints allow attackers to operate undetected<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Multi-environment breaches result in higher costs and longer containment times due to fragmented visibility<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ransomware risk has shifted from perimeter defense to identity, visibility, and infrastructure control<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1af5ace e-ecs-flex e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-0e04989 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Five years ago, enterprise ransomware risk was mostly a perimeter problem. Today it\u2019s an identity problem, a visibility problem, and a cloud configuration problem, all at once. Hybrid work and cloud adoption didn\u2019t just shift where people work. They fundamentally changed where ransomware attacks begin, how far they reach, and how long they go undetected.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d2ff7e3 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What Changed: Why Hybrid Work and Cloud Adoption Caused It<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-121b93a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Before distributed work became standard, most enterprise endpoints sat on managed corporate networks. Active Directory was on-premises. Cloud workloads were limited. The attack surface was relatively bounded and mostly visible from the perimeter.<\/p>\n<p>Three shifts changed that simultaneously. First, remote work pushed endpoints onto home networks and personal devices, outside <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/endpoint-security\/what-is-endpoint-detection-and-response\/\">EDR<\/a> coverage, outside asset management, outside the visibility of security tools entirely. Second, cloud adoption moved critical workloads, sensitive data, and identity systems off-premises and into environments where east-west traffic between systems goes largely unmonitored. Third, hybrid identity, specifically the synchronization layer connecting on-premises AD to cloud identity platforms like Entra ID, creating high-privilege account bridges that most organizations never hardened or adequately monitored.<\/p>\n<p>Each of those shifts independently expanded the ransomware attack surface. Together, they created conditions where attackers can gain initial access through a credential stolen off a personal laptop, move laterally through cloud infrastructure without triggering a single alert, and destroy backup infrastructure via API before anyone detects them. None of that attack chain was possible at the same scale before 2020.<\/p>\n<p>The data reflects it. Ransomware appeared in 44% of all confirmed breaches<a href=\"https:\/\/fidelissecurity.com\/#citeref1\">1<\/a> in the Verizon 2025 DBIR, up from 32% the prior year. That 12-point increase didn\u2019t come from new malware. It came from a wider, harder-to-monitor attack surface that hybrid infrastructure created. IBM\u2019s 2025 breach data<a href=\"https:\/\/fidelissecurity.com\/#citeref2\">2<\/a> shows breaches crossing multiple environments now cost $5.05M on average and take 276 days to contain, the worst numbers of any configuration, driven directly by the detection gaps hybrid environments introduce.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4b8dcf4 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Hybrid Work and Cloud Adoption Changed the Ransomware Attack Surface<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3ad3929 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>The numbers quantify what those three structural shifts produced. In 2025, ransomware showed up in 44% of confirmed breaches globally, up from 32% the year before. US organizations absorbed this hardest: average data breach costs hit $10.22M, an all-time high, compared to $4.44M globally. Multi-environment breaches averaged $5.05M and 276 days to contain, the worst cost and dwell time of any infrastructure configuration.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-86a20c5 e-grid e-con-full e-ecs-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\">\n<div class=\"elementor-element elementor-element-57a06a7 elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t44%\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tof all confirmed breaches involved ransomware in 2025, the highest rate recorded\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0063911 elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t$10.22M\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\taverage US data breach cost in 2025, an all-time record high\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-86968d1 elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t276 days\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\taverage time to identify and contain a multi-environment breach\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-53050fb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Top Ransomware Risks Introduced by Hybrid Work and Cloud Adoption<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-03f1822 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Six specific risks account for most of what\u2019s changing. Each one maps to confirmed attack patterns in 2025 CISA advisories, IBM X-Force IR data, and Microsoft Threat Intelligence, not projections.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8333745 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Credential theft via infostealer malware on unmanaged devices<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4563056 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>As per Verizon DBIR 2025, compromised credentials were the initial access vector in 22% of breaches. 46% of devices turning up in infostealer logs with corporate login data were unmanaged personal endpoints, entirely outside enterprise monitoring. The credentials get scraped off those devices, packaged, sold. A ransomware affiliate buys access and authenticates with a valid username and password. Nothing looks suspicious. 54% of organizations that appeared on extortion sites had already shown up in at least one infostealer log beforehand. The signal was there.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6f09466 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Unpatched VPN appliances and remote access tools as the most common entry point<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6f91862 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Vulnerability exploitation grew 34% year over year as an initial access method and is now behind 20% of breaches, per Verizon DBIR 2025. VPN appliances are the primary target. They sit at the boundary between corporate networks and the internet, frequently go unpatched, and provide direct network access when exploited. The CISA\/FBI Akira advisory updated November 2025<a href=\"https:\/\/fidelissecurity.com\/#citeref3\">3<\/a> lists unpatched VPN products and backup servers as the group\u2019s primary entry method. Akira had pulled approximately $244M in proceeds by late September 2025. That\u2019s what exploiting a single unpatched appliance class at scale produces.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-23c522e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Hybrid identity misconfigurations enabling on-premises to cloud pivot<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ffdf3ce elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Storm-0501, documented by Microsoft Threat Intelligence in August 2025<a href=\"https:\/\/fidelissecurity.com\/#citeref4\">4<\/a>, got into on-premises Active Directory, found the AD Connect sync account, compromised it, and used it to authenticate into Entra ID as Global Administrator. No malware. Just a legitimate sync credential that carried too much privilege and wasn\u2019t being watched. IBM X-Force<a href=\"https:\/\/fidelissecurity.com\/#citeref5\">5<\/a> confirmed this exact pattern across multiple 2025 IR engagements. The AD Connect component is the specific crossing point: high privilege, under-monitored, and rarely hardened to match what it can access.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d1a812b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">4. No east-west visibility inside cloud environments during lateral movement<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2fb0431 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Only 17% of organizations have full east-west visibility inside their cloud environments. That\u2019s from Check Point\u2019s Cloud Security Report 2025, which surveyed 900+ CISOs. The other 83% can\u2019t see what moves between their cloud workloads. Ransomware groups run reconnaissance, map systems, and escalate privileges inside that blind spot. By the time detection rules trigger on endpoint behavior, the attacker has already been in the environment for days mapping it out and identifying sensitive <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-exfiltration\/\">data to exfiltrate<\/a>.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6058e5b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">5. Cloud backup destruction eliminating rapid recovery options<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bd85c84 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>If backup management runs inside the same cloud tenant an attacker controls, wiping it is a few API calls. Groups like Storm-0501 do this before deploying encryption: destroy recovery options first, then encrypt. Sophos surveyed 1,733 enterprise organizations<a href=\"https:\/\/fidelissecurity.com\/#citeref6\">6<\/a> between January and March 2025. Backup use as a recovery method dropped to 53%, a four-year low, down from 73% the prior year. That number fell because backups are being destroyed, not because organizations stopped making them. Immutable backups isolated from the primary cloud tenant are the only counter, and they need to be tested to confirm the isolation actually holds.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4ca48627 e-con-full e-ecs-flex e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\">\n<div class=\"elementor-element elementor-element-1cb50ab2 e-con-full e-ecs-flex e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\">\n<div class=\"elementor-element elementor-element-3905b02d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Where Ransomware Actually Breaks In<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-19cdf18 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-heading-title elementor-size-default\">Real attack paths attackers use:<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4d9b2deb elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Stolen credential access\u00a0<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">VPN exploitation entry<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">AD sync abuse<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud lateral movement\u00a0<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4d42b40a elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/xdr-for-ransomware-preparedness\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Whitepaper Now!<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-308043c1 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-ecs-flex e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\">\n<div class=\"elementor-element elementor-element-aea2443 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-06fb48e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">6. Data exfiltration enabling double extortion before file encryption<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-23ebcd7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Data walks out before encryption starts. Always. Cloud APIs and storage services make exfiltration fast enough that by the time a ransom note arrives, the sensitive data is already somewhere else. Paying to decrypt files doesn\u2019t solve that. FBI IC3 2024<a href=\"https:\/\/fidelissecurity.com\/#citeref7\">7<\/a> shows ransomware complaints up 9% year over year, with double extortion tactics running specifically across healthcare, manufacturing, and financial services, particularly sectors where data exposure causes regulatory consequences on top of operational ones.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6d16465 elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-blockquote__content\">\n\t\t\t\t&#8220;46% of the systems with corporate logins in their compromised data were non-managed, meaning they were personal devices.&#8221;\t\t\t<\/p>\n<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\tVerizon 2025 Data Breach Investigations Report\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8f133bf elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Why Ransomware Attacks Cost More in Multi-Cloud Environments<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-82fa824 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Multi-cloud plus on-premises: $5.05M average breach cost, 276 days to contain. On-premises only: $4.01M, 217 days. That million-dollar gap and those 59 extra days aren\u2019t from harder attacks. They come from fragmented visibility. When data is spread across environments that weren\u2019t built to be monitored together, detection lags. And every extra day the attacker is in the environment costs money.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9958873 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Nine months of undetected access. That\u2019s what 276 days means operationally. IBM\u2019s data also shows organizations that contained breaches in under 200 days saved an average $1.12M versus those that ran longer. Advanced threat detection that covers multi-environment visibility directly determines how much a ransomware incident costs, not just whether you get hit.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-faa7184 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Which Ransomware Groups Are Actively Targeting Hybrid Cloud Infrastructure?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7af49fb elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Four groups have active government advisories for campaigns specifically targeting hybrid enterprise infrastructure. All four are still operating.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-50d5c865 elementor-widget elementor-widget-Table\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\tGroupInitial Access MethodCloud\/Hybrid TacticStatus\t\t\t\t<\/p>\n<p>\t\t\t\t\t<a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/cyberattacks\/akira-ransomware\/\">Akira<\/a>Exploited VPN vulnerabilities (SonicWall CVE-2024-40766); stolen credentialsExfiltrates via FTP, SFTP, cloud storage before encrypting. Akira_v2 targets Windows and LinuxActiveStorm-0501Stolen credentials; compromised AD Connect sync accountsPivots from on-premises AD into Entra ID. Destroys cloud backups via API. No malware binaries requiredActiveInterlockDrive-by downloads; fake browser update luresTargets VMs across Windows and Linux. Double extortion via cloud-hosted leak sitesActivePlayDark web credential purchases; FortiOS and Exchange exploitationLateral movement through AD domain trust relationships; targets cloud-connected systems after initial footholdActive\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4502498 ha-has-bg-overlay elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong>Healthcare:<\/strong> highest-targeted critical infrastructure sector. FBI IC3 2024 recorded 238 ransomware incidents against US healthcare, more than any other sector. Operational disruption in healthcare creates acute pressure to pay quickly. CISA\u2019s November 2025 Akira update confirms the group is actively expanding into healthcare, financial services, and critical manufacturing. Patient data under HIPAA is also among the most valuable for double extortion.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a2d1c58 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Enterprise Ransomware Protection: Controls Mapped to Actual Attack Techniques<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d802ee5 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>The table maps confirmed 2025 attack techniques to specific defensive controls. If a technique isn\u2019t in those sources, it\u2019s not in this table.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a41fe6e elementor-widget elementor-widget-Table\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\tAttack StageDocumented TechniqueRansomware Protection ControlPriority\t\t\t\t<\/p>\n<p>\t\t\t\t\tInitial AccessInfostealer malware on unmanaged devices; phishing targeting cloud app logins; unpatched VPN exploitationPhishing-resistant multi-factor authentication; device posture enforcement at login; patch VPN and perimeter devices by exposure risk; monitor corporate domains in infostealer credential feedsImmediateReconnaissanceMapping AD structure, Entra ID tenants, and domain trust using legitimate admin tools and blends with normal traffic<a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/using-behavioral-analytics-to-spot-hidden-threats\/\">Behavioral analytics<\/a> on privileged account activity; alert on unusual AD enumeration and service queries; threat intelligence integration for known recon tool signaturesImmediateLateral MovementAbusing AD Connect sync accounts; exploiting domain trust to cross the on-premises to cloud boundaryEast-west network visibility inside cloud workloads; Active Directory threat detection covering sync account activity; network segmentation between on-premises and cloud resources; restrict sync accounts to known IPsImmediatePrivilege EscalationEscalating via accounts with admin roles in both AD and cloud identity; exploiting overly permissive cloud rolesStrict access controls enforcing least privilege; audit all accounts with elevated roles across both environments; enforce multi-factor authentication on every admin account without exceptionImmediateData ExfiltrationLarge outbound data transfers via cloud APIs and storage services before encryption beginsReal-time threat detection on anomalous outbound volumes; <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-dlp\/\">data loss prevention across all network traffic<\/a> including encrypted channels; baseline normal movement patterns to catch deviationsImmediateImpactDeleting backups via cloud API; encrypting endpoints and servers; removing volume shadow copiesImmutable backups isolated from primary cloud tenant; test data recovery under ransomware-like conditions; ransomware recovery plan with defined decision points and law enforcement notificationHigh\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c924876 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<p class=\"elementor-heading-title elementor-size-default\">Sources: CISA advisories, Verizon DBIR 2025, IBM X-Force IR data.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a4ef140 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong>One figure most incident response plans skip: <\/strong>IBM 2025 found organizations that brought in law enforcement saved $990,000 per breach on average versus those that handled it internally. Put that step in the ransomware recovery plan before you need it, not after the ransom note lands.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-872a96c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">No East-West Visibility: The Cloud Security Gap Most Teams Underestimate<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f5ae60b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Only 17% of organizations have full east-west visibility inside their cloud environments, as per Check Point\u2019s Cloud Security Report 2025, which surveyed 900+ CISOs. Perimeter tools watch what crosses the network boundary. What moves between cloud workloads internally goes mostly unseen. That 83% blind spot is exactly where ransomware lateral movement runs, specifically after initial access, while attackers are mapping systems and locating backup infrastructure before triggering encryption.<\/p>\n<p>45% of security teams are fielding 500+ alerts per day. In that environment, the low-and-slow reconnaissance behavior ransomware groups use gets lost. Endpoint detection and response alone doesn\u2019t solve it. Catching lateral movement between cloud workloads needs visibility at the network layer inside those environments, not just signatures on endpoints.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a3fe175 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Fidelis Elevate\u00ae Addresses These Ransomware Risks<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b6bd5ee elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Fidelis Elevate<\/a>\u00ae brings network detection and response, endpoint detection and response, cloud workload security, Active Directory protection, and deception technology into one platform. The architecture is built around the gaps the six risks above expose, not generic threat coverage.<\/p>\n<p>The east-west visibility problem gets addressed through patented <a href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/deep-session-inspection\/\">Deep Session Inspection<\/a> for packet-level analysis across all ports and protocols, including encrypted traffic, with full session reconstruction. This helps address gaps in internal cloud network visibility, an area many organizations still struggle to fully monitor. It can help <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/how-to-detect-data-exfiltration\/\">detect potential data exfiltration<\/a> by flagging anomalous outbound transfer activity, improving the chances of identifying threats before encryption begins.<\/p>\n<p>For the hybrid identity attack path Storm-0501 used, the Active Directory Intercept component watches AD Connect sync account activity, Entra ID authentication patterns, and AD log events simultaneously. Privilege escalation attempts across hybrid identity components can be correlated and surfaced as alerts, reducing the risk of activity going unnoticed between on-premises and cloud environments.<\/p>\n<p>Cloud workload visibility maps misconfigurations and unmanaged assets, the exact things ransomware groups find during reconnaissance. The deception layer goes further. Decoys deployed across network and cloud environments are designed to detect attacker reconnaissance activity and generate high-confidence alerts earlier in the attack lifecycle. This supports earlier detection, which can improve response time and limit potential impact.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2143b84 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Enterprise Ransomware Protection Checklist for 2026<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-419d817 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Audit every admin account in both on-premises AD and cloud identity. Multi-factor authentication enforced with no exceptions across all privileged accounts.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Lock AD Connect and Directory Sync accounts to known IPs. Alert immediately on any password reset or configuration change to these accounts.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Deploy east-west <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/improving-enterprise-network-visibility-ndr\/\">network visibility<\/a> inside cloud environments. Perimeter monitoring misses lateral movement between cloud workloads entirely.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enforce strict access controls using least privilege. Overly permissive cloud roles are a documented privilege escalation path in active ransomware campaigns.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Patch VPNs and remote access tools by exposure risk, not just CVSS score. These are the most consistently exploited initial access surfaces in 2025 CISA data.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitor corporate domains in infostealer credential feeds. Domain exposure in those logs typically precedes active ransomware campaigns by 24-48 hours.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Test backup data recovery under ransomware-like conditions. Confirm immutable backups cannot be deleted via API from the primary cloud tenant.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Build law enforcement notification into the <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/what-is-an-incident-response-plan\/\">incident response plan<\/a> before an attack. IBM 2025: average $990K savings per breach when law enforcement is engaged early.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Run security awareness training on hybrid work credential risks. Cover cloud app phishing, browser credential exposure on personal devices, and MFA prompt bombing attacks.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement network segmentation between on-premises systems and cloud resources to limit blast radius when initial access is achieved.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6e3a2866 e-ecs-flex e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-5cecd35 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-626c2de9 elementor-widget elementor-widget-eael-adv-accordion\">\n<div class=\"elementor-widget-container\">\n<div class=\"eael-adv-accordion\">\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header active-default\">\n<h3 class=\"eael-accordion-tab-title\">How does hybrid work increase enterprise ransomware risk?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix active-default\">\n<p>Three structural changes. Remote work put corporate credentials on personal devices outside EDR. Infostealer malware harvests them and ransomware affiliates buy that access. Cloud adoption created east-west traffic between workloads that most security tools can\u2019t see, giving attackers undetected lateral movement space. Hybrid identity, meaning on-premises AD syncing to cloud identity platforms like Entra ID, introduced high-privilege sync accounts that are rarely hardened. Verizon DBIR 2025: ransomware appeared in 44% of all confirmed breaches, up from 32% the prior year. That 12-point jump reflects those structural changes, not smarter malware.<\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What is the most common ransomware entry point in 2025?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p>Stolen credentials: 22% of breaches per Verizon DBIR 2025. Exploited VPN vulnerabilities are second at 20% and growing 34% year over year. Akira ransomware specifically hunts unpatched VPN products. By late September 2025, Akira had claimed approximately $244M in proceeds through that pattern alone.<\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">Why do ransomware attacks on cloud environments cost more to recover from?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p>Slower detection. IBM Cost of a Data Breach 2025: multi-environment breaches cost $5.05M on average and took 276 days to contain. On-premises-only averaged $4.01M and 217 days. The extra time gives attackers room to exfiltrate data, destroy backups, and establish persistence, all of which drive recovery costs up sharply.<\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">How do ransomware groups move laterally from on-premises to cloud?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p>Through AD Connect synchronization accounts. Storm-0501, documented by Microsoft Threat Intelligence in August 2025, compromised one of these accounts and used it to authenticate into Entra ID as Global Administrator. No malware required. Just a valid sync credential with high privilege and no MFA enforced. IBM X-Force confirmed this crossing pattern across multiple 2025 IR engagements.<\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What is the best ransomware protection for hybrid enterprise environments?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p>Phishing-resistant MFA on all admin accounts with no exceptions. East-west network visibility inside cloud environments. Perimeter tools do not cover it. Active Directory-specific threat detection covering sync account activity. Immutable backups isolated from the primary cloud tenant and tested for recovery. Automated patch management on VPN appliances prioritized by exposure risk, not just CVE score.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8907900 e-ecs-flex e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-38f524a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Citations:<\/span>\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c70aa59 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fidelissecurity.com\/#cite1\">^<\/a><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Verizon 2025 DBIR<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite2\">^<\/a><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">IBM\u2019s Data Breach Report<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite3\">^<\/a><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-109a\" target=\"_blank\" rel=\"noopener\">CISA\/FBI Akira advisory updated November 2025<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite4\">^<\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/08\/27\/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware\/\" target=\"_blank\" rel=\"noopener\">Microsoft Threat Intelligence in August 2025,<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite5\">^<\/a><a href=\"https:\/\/www.ibm.com\/think\/x-force\/cloud-attacks-evolving-what-2025-trends-mean-defenders-2026\" target=\"_blank\" rel=\"noopener\">IBM X-Force<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite6\">^<\/a><a href=\"https:\/\/www.sophos.com\/en-us\/blog\/the-state-of-ransomware-in-enterprise-2025\" target=\"_blank\" rel=\"noopener\">Sophos surveyed 1,733 enterprise organizations<\/a><a href=\"https:\/\/fidelissecurity.com\/#cite7\">^<\/a><a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">FBI IC3 2024<\/a>\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6d7e178 e-ecs-flex e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-f28cc4c keepExploring elementor-widget elementor-widget-related_posts\">\n<div class=\"elementor-widget-container\">\n<div class=\"related-posts-widget-wrapper\">\n<div class=\"related-posts-wrapper\">\n<p>The following cybersecurity terms mentioned in this article are defined in detail in our cyber glossary section:<\/p>\n<div class=\"ecs-posts elementor-posts-container elementor-posts\"><a href=\"https:\/\/fidelissecurity.com\/glossary\/sensitive-data\/\">Sensitive Data<\/a><a href=\"https:\/\/fidelissecurity.com\/glossary\/mfa-multi-factor-authentication\/\">Multi-Factor Authentication (MFA)<\/a><a href=\"https:\/\/fidelissecurity.com\/glossary\/network-segmentation\/\">Network Segmentation<\/a><a href=\"https:\/\/fidelissecurity.com\/glossary\/hybrid-cloud\/\">Hybrid Cloud<\/a><a href=\"https:\/\/fidelissecurity.com\/glossary\/hybrid-network\/\">Hybrid Network<\/a><a href=\"https:\/\/fidelissecurity.com\/glossary\/cloud-network\/\">Cloud Network<\/a><a href=\"https:\/\/fidelissecurity.com\/glossary\/attack-surface\/\">Attack Surface<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/enterprise-ransomware-protection-in-hybrid-and-cloud-era\/\">How Hybrid Work and Cloud Adoption Are Changing Enterprise Ransomware Risk<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Key Takeaways Hybrid work, cloud adoption, and identity sync have expanded ransomware entry points beyond the perimeter Attackers now rely on valid credentials, remote access tools, and hybrid identity abuse, not just malware Detection gaps in east-west cloud traffic and unmanaged endpoints allow attackers to operate undetected Multi-environment breaches result in higher costs and longer [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":8169,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-8168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/8168"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8168"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/8168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/8169"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}