{"id":26830,"date":"2022-12-31T15:39:13","date_gmt":"2022-12-31T15:39:13","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/"},"modified":"2022-12-31T15:39:13","modified_gmt":"2022-12-31T15:39:13","slug":"techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/","title":{"rendered":"TechSpot&#8217;s top security stories of 2022: Vulnerabilities wait in the wings"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div>\n<p>As additional facets of daily life go digital, it&#8217;s more paramount now than ever to be proactive about online security. As 2022 proved, however, staying safe isn&#8217;t just a modern concern as vulnerabilities have been around for years &#8211; decades, even &#8211; and can crop up in the most unexpected places and ways.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/96328-security-researchers-show-off-rtx-4090-password-cracking.html\">Security researchers show off the RTX 4090&#8217;s password cracking power<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/96328-security-researchers-show-off-rtx-4090-password-cracking.html\"><picture style=\"padding-bottom: calc(100% * 673 \/ 1536)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21-j.webp 1536w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"673\" width=\"1536\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-21-j.webp 1536w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>The new GPU significantly reduces the time required to obtain or recover user passwords<\/h4>\n<p>Security researcher and password cracker Sam Croley posted benchmarks highlighting the RTX 4090&#8217;s password-cracking muscle. Nvidia&#8217;s newest flagship GPU shattered the RTX 3090&#8217;s previous benchmark records and doubled performance across almost every algorithm tested. The cracked passwords adhered to security best practices and included random letter cases, symbols, and numbers.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/95425-years-gigabyte-asus-motherboards-carried-uefi-malware.html\">For years, some Gigabyte and Asus motherboards carried UEFI malware<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/95425-years-gigabyte-asus-motherboards-carried-uefi-malware.html\"><picture style=\"padding-bottom: calc(100% * 2110 \/ 3115)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35-j.webp 3115w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"2110\" width=\"3115\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-35-j.webp 3115w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>The CosmicStrand rootkit is the latest indication that UEFI malware may be more common than previously thought<\/h4>\n<p>Security firm ESET discovered the first UEFI rootkit that had been used in the wild back in 2018. This type of persistent threat used to be the subject of theoretical discussions among security researchers, but over the past years, it&#8217;s become clear that it&#8217;s a lot more common than previously thought, despite being relatively hard to develop.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/95671-janet-jackson-song-1989-declared-cybersecurity-vulnerability-crashing.html\">Janet Jackson song from 1989 declared a cybersecurity vulnerability for crashing hard drives<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/95671-janet-jackson-song-1989-declared-cybersecurity-vulnerability-crashing.html\"><picture style=\"padding-bottom: calc(100% * 1419 \/ 2513)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20-j.webp 2513w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1419\" width=\"2513\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-20-j.webp 2513w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>Rhythm Nation doesn&#8217;t send out good vibrations<\/h4>\n<p>People of the world today, are we looking for a better way of life?&#8221; sang Janet Jackson on her 1989 hit Rhythm Nation, not knowing that the better way of life she was talking about didn&#8217;t include certain hard drives. It&#8217;s just been revealed that the song has the power to crash particular models of laptops, and it has now been recognized as a cybersecurity vulnerability.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/95916-lawsuit-claims-gamestop-wiretapped-customers-without-consent.html\">GameStop &#8220;wiretapped&#8221; customers without consent, claims lawsuit<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/95916-lawsuit-claims-gamestop-wiretapped-customers-without-consent.html\"><picture style=\"padding-bottom: calc(100% * 1920 \/ 2560)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22-j.webp 2560w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1920\" width=\"2560\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-22-j.webp 2560w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>It sold secret transcripts to a marketing firm to build profiles using personal information<\/h4>\n<p>If it wasn&#8217;t stupid enough that GameStop dove headfirst into the NFT and crypto market right before the bubble burst, hang on for a second \u2014 the company wants you to hold its beer. It is now being sued for recording customer service chats without consent and selling transcripts to a marketing firm.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/92909-qnap-issues-warning-users-secure-or-disconnect-unprotected.html\">QNAP issues ransomware warning to users: secure your devices or disconnect unprotected NAS<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/92909-qnap-issues-warning-users-secure-or-disconnect-unprotected.html\"><picture style=\"padding-bottom: calc(100% * 1159 \/ 1680)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29-j.webp 1680w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1159\" width=\"1680\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-29-j.webp 1680w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>Ransomware and brute force attacks from unidentified sources are actively targeting network devices<\/h4>\n<p class=\"tsadinc\">QNAP issued a security statement urging their NAS users to take immediate action and secure their data against ongoing ransomware and brute force attacks. While the responsible parties have not been identified, the widespread attacks appear to target any vulnerable network devices. The company has provided security setting instructions and mitigation actions that any QNAP NAS users should implement immediately.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/93568-nvidia-allegedly-hacked-hackers-stole-data-back.html\">Nvidia allegedly hacked its hackers, stole its data back<\/a><\/h3>\n<div class=\"video-container\"><a href=\"https:\/\/www.techspot.com\/news\/93568-nvidia-allegedly-hacked-hackers-stole-data-back.html\"><picture style=\"padding-bottom: calc(100% * 1707 \/ 2560)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30-j.webp 2560w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1707\" width=\"2560\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-30-j.webp 2560w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/div>\n<h4>Hacking group Lapsus$ claims to still have a copy of the data<\/h4>\n<p class=\"tsadinc\">Several online security groups are reporting that the South American hacker group Lapsus$ is claiming to have been behind the recent cyberattack on Nvidia. It&#8217;s also claiming that Nvidia hacked them in return, encrypted the stolen data, and ransomed back their machines. For now, this is just hearsay, but makes for a great turning-the-tables story.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/94708-multiple-security-flaws-emerge-australian-digital-driver-licenses.html\">Multiple security flaws emerge in Australian digital driver&#8217;s licenses<\/a><\/h3>\n<div class=\"video-container\"><a href=\"https:\/\/www.techspot.com\/news\/94708-multiple-security-flaws-emerge-australian-digital-driver-licenses.html\"><picture style=\"padding-bottom: calc(100% * 1280 \/ 2124)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31-j.webp 2124w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1280\" width=\"2124\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-31-j.webp 2124w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/div>\n<h4>Possibly less secure than physical ID cards<\/h4>\n<p>The government of New South Wales in Australia introduced digital driver&#8217;s licenses in late 2019, claiming they were harder to forge than physical identification. A security company recently outlined multiple reasons why this isn&#8217;t the case.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/93663-nvidia-hackers-leak-190gb-sensitive-data-samsung.html\">Nvidia hackers leak 190GB of sensitive data from Samsung<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/93663-nvidia-hackers-leak-190gb-sensitive-data-samsung.html\"><picture style=\"padding-bottom: calc(100% * 1120 \/ 1680)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32-j.webp 1680w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1120\" width=\"1680\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-32-j.webp 1680w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>The leaks includes Samsung&#8217;s encryption data and source code<\/h4>\n<p>Lapsus$, a hacking group that leaked confidential information from Nvidia just last week, has reportedly moved to a new target: Samsung. The hackers have claimed an attack that leaked 190GB of confidential information from the South Korean technology giant, including encryption data and source code for Samsung&#8217;s most recent devices.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/92971-teen-hacker-gains-remote-control-over-20-teslas.html\">Teen hacker gains remote control of over 20 Teslas<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/92971-teen-hacker-gains-remote-control-over-20-teslas.html\"><picture style=\"padding-bottom: calc(100% * 1667 \/ 2500)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33-j.webp 2500w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1667\" width=\"2500\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-33-j.webp 2500w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>Full control over car doors, security system, and more<\/h4>\n<p>This week, a teenager reported that he has gained remote access to around two dozen Tesla cars in multiple countries and is trying to contact their owners. The list of things he can do to the affected vehicles is long and dangerous.<\/p>\n<h3><a href=\"https:\/\/www.techspot.com\/news\/96252-source-code-alder-lake-bios-posted-github.html\">Source code for Alder Lake BIOS was posted to GitHub<\/a><\/h3>\n<p><a href=\"https:\/\/www.techspot.com\/news\/96252-source-code-alder-lake-bios-posted-github.html\"><picture style=\"padding-bottom: calc(100% * 1440 \/ 2560)\"><source type=\"image\/webp\" data-srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34-j.webp 2560w\" data-sizes=\"(max-width: 960px) 100vw, 680px\"\/><img loading=\"lazy\" decoding=\"async\" height=\"1440\" width=\"2560\" alt=\"\" class=\"b-lazy\" src=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34.jpg\" srcset=\"https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34-j_500.webp 500w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34-j_1100.webp 1100w, https:\/\/static.techspot.com\/images2\/news\/bigimage\/2022\/12\/2022-12-30-image-34-j.webp 2560w\" sizes=\"auto, (max-width: 960px) 100vw, 680px\"\/><\/picture><\/a><\/p>\n<h4>It could&#8217;ve exposed some security vulnerabilities<\/h4>\n<p class=\"tsadinc\">Apparent source code for Alder Lake BIOS has been shared online. It seems to have been leaked in its entirety at 5.9 GB uncompressed, possibly by someone working at a motherboard vendor, or accidentally by a Lenovo manufacturing partner.<\/p>\n<\/p><\/div>\n<iframe src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.techspot.com\/news\/97125-techspot-top-security-stories-2022-vulnerabilities-wait-wings.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As additional facets of daily life go digital, it&#8217;s more paramount now than ever to be proactive about online security. As 2022 proved, however, staying&#8230;<\/p>\n","protected":false},"author":1,"featured_media":26831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-26830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TechSpot&#039;s top security stories of 2022: Vulnerabilities wait in the wings - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TechSpot&#039;s top security stories of 2022: Vulnerabilities wait in the wings - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-31T15:39:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/2022-12-30-image-36.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"TechSpot&#8217;s top security stories of 2022: Vulnerabilities wait in the wings\",\"datePublished\":\"2022-12-31T15:39:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/\"},\"wordCount\":791,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/2022-12-30-image-36.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/\",\"name\":\"TechSpot's top security stories of 2022: Vulnerabilities wait in the wings - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/2022-12-30-image-36.jpg\",\"datePublished\":\"2022-12-31T15:39:13+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/2022-12-30-image-36.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/2022-12-30-image-36.jpg\",\"width\":2500,\"height\":1667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/31\\\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TechSpot&#8217;s top security stories of 2022: Vulnerabilities wait in the wings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TechSpot's top security stories of 2022: Vulnerabilities wait in the wings - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/","og_locale":"en_US","og_type":"article","og_title":"TechSpot's top security stories of 2022: Vulnerabilities wait in the wings - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-12-31T15:39:13+00:00","og_image":[{"width":2500,"height":1667,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/2022-12-30-image-36.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"TechSpot&#8217;s top security stories of 2022: Vulnerabilities wait in the wings","datePublished":"2022-12-31T15:39:13+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/"},"wordCount":791,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/2022-12-30-image-36.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/","name":"TechSpot's top security stories of 2022: Vulnerabilities wait in the wings - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/2022-12-30-image-36.jpg","datePublished":"2022-12-31T15:39:13+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/2022-12-30-image-36.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/2022-12-30-image-36.jpg","width":2500,"height":1667},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/31\/techspots-top-security-stories-of-2022-vulnerabilities-wait-in-the-wings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"TechSpot&#8217;s top security stories of 2022: Vulnerabilities wait in the wings"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/26830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=26830"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/26830\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/26831"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=26830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=26830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=26830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}