{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/o9KXpzigBQUT1GLJkGJK/lmsw2ZUgq7VV6kLRiEoE/YHdMp3byK-12.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as a}from\"framer\";import{motion as r}from\"framer-motion\";import*as n from\"react\";export const richText=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with \",/*#__PURE__*/e(\"strong\",{children:\" \"}),\"Albert Heinle, CEO of Heinle Solutions Inc., Creator of \",/*#__PURE__*/e(a,{href:\"https://www.coguard.io/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"CoGuard\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Albert Heinle\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/kJX5ar4q0E6hDteo677D6pJOs.png\",srcSet:\"https://framerusercontent.com/images/kJX5ar4q0E6hDteo677D6pJOs.png?scale-down-to=512 512w,https://framerusercontent.com/images/kJX5ar4q0E6hDteo677D6pJOs.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"Besides the classic attack scenarios and attack vectors such as inside jobs and ransomware, we have observed an increasing number of attacks on blockchain technology aimed at scamming people out of their crypto-currencies (see this example where an invalid NFT on a Banksy piece was auctioned off) and instances where attackers have taken advantage of bugs in smart contracts (Iron Finance). And sometimes, simple accidents have dire consequences, as in the case of Compound, where $90M was accidentally paid out to users. \"}),/*#__PURE__*/e(\"p\",{children:\"So its not really that revolutionary new attack methodologies are evolving, but rather old methods are being applied to new, hip areas.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"I believe that a strong foundation in a companys infrastructure plays a crucial role in protecting ones data and reputation. Infrastructure is the new code. And just as weve put rigor around the software development and change process, we need to invest in more rigorous processes and automatic checking around infrastructure change until we reach the same level of quality and saturation that we now have for software.\"}),/*#__PURE__*/e(\"p\",{children:\"The key to prevention against sophisticated attack scenarios lies in deploying AI to detect malicious activity. However, the quality with which cloud deployments are made today render these efforts almost meaningless. At the root of the issue is human error. Even the biggest players with the deepest pockets are not safe from human error risk (consider Microsoft, Solarwinds and Capital One). So while an investment in good monitoring is a good layer of defense, we need to also build a good foundation, one that employs defense in depth and zero trust policies. This means becoming more diligent, automatically checking work and creating a company culture that prioritizes and promotes security. That may mean tolerating certain inconveniences and delays, but rewards through risk elimination are worth those minor annoyances.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"Cyber criminals will always go for quick wins, unless they are led or funded by governments. In the latter case, we are looking at higher levels of sophistication. In the former case, the targets will remain in Blitzscale sectors like todays blockchain. Cyber criminals follow the money. In these newer fields theres a lot of money transacted, but little attention paid to cyber security. So they are basically sitting ducks.   \"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future? \"}),/*#__PURE__*/e(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Is your IT department approaching infrastructure change in the same way your software developers approach changes to code. Are they versioning their configurations?  Do they have a proper review process?  Are they using modern configuration management tools purpose-built for managing infrastructure change? If not, fix these problems fast. \"})})}),/*#__PURE__*/e(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"If you outsource part of your IT infrastructure management to external vendors, are you doing your due diligence surrounding their processes? Are you asking for AND enforcing certain security standards? If not, do so, and be picky about it. \"})})}),/*#__PURE__*/e(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Do you think compliance = security? Think again.\"})})})]});export const richText1=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.The following is an interview we recently had with Aliaksandr Latushka, Information Security Group Leader, \",/*#__PURE__*/e(a,{href:\"https://www.itechart.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"iTechArt\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Aliaksandr Latushka\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/YjfRa4rHlVud7EY5XbUZguj1A.png\",srcSet:\"https://framerusercontent.com/images/YjfRa4rHlVud7EY5XbUZguj1A.png?scale-down-to=512 512w,https://framerusercontent.com/images/YjfRa4rHlVud7EY5XbUZguj1A.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"2021 follows on emboldening the innovations and challenges brought to us by 2020 with a huge number of people even more immersed into the online world. In fact, internet tech usage is growing not only in private lives and businesses but also on the part of government organizations. As a result, the information volume available on the internet is increasing exponentially. And this couldnt go unnoticed by people who are dissatisfied with current political trends or those who want to exploit these data assets for money  legally or otherwise. In the past year, virtually every tech industry sector faced serious cyber incidents. Malicious cyber groups like Nobelium, REvil, DarkSide, Babuk, Red Epsilon, Prometheus, and APT28 were quite active and proved how they can affect the work of companies. Not a week went by without high-profile cyber incidents with gigantic amounts of data and/or capital losses: The monthly damage from cyberattacks in 2021 averaged $500 billion, a fourfold increase in 3 years, and caught even the attention of the UN.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"Despite significant losses, companies continued their activities with extensive use of IT. I believe that this is largely due to integrated corporate information made safe through security management systems. For a long time, these systems have been operating in order not to prevent cyberattacks, but to reduce the damage to an acceptable level.\"}),/*#__PURE__*/e(\"p\",{children:\"Cyber threats, globalization, and the lack of borders on the internet empowered the necessity to unite not only for working groups and professionals but also for entire companies and even state actors to develop new tools and skills to oppose and reduce damage.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"Modern tools are becoming vital, at least to increase the response rate to incidents. A fairly low entry cost threshold to execute cyber-attacks, paired with their significant financial benefits and lack of accountability led to an increase in shadow activity cases. Their participants unite into cyber groups with a deep stratification of imputed functions. Some criminals may just develop the code, unaware of or not interested in their true function in such groups.\"}),/*#__PURE__*/e(\"p\",{children:\"Theres one more potential cyber threat  the rapidly increasing number of smart devices  the so-called IoT. As a rule of thumb, such devices are not yet equipped with enough energy to carry onboard sufficient means of protection and are dependent on the safety of the environment. Due to the ever-growing adoption of those devices by the general public, IoT attacks are becoming easier and a real pain in a modern home or office.\"}),/*#__PURE__*/e(\"p\",{children:\"To sum up, we should keep on expecting increasingly complex cyberattacks aimed at causing major damage to corporations and states; cyberattacks aimed at IoT devices as a low-effort action with disproportionately inconvenient effects, and the growth of attacks using social engineering and deepfake tools.\"}),/*#__PURE__*/e(\"p\",{children:\"Alongside these, we will also observe the moral battle between two views: One advocating for control in detriment of privacy (for example, to increase governmental watch tools or for the business purposes of corporations) and another willing to preserve privacy as the means, among other things, to avoid massive cyber frauds.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/e(\"p\",{children:\"Is there anything you can oppose to such a future? Id say, theres definitely a need to develop a culture of safe work environments, which must be integrated into all aspects of IT activities  from design to operation and support of the finished product.\"}),/*#__PURE__*/e(\"p\",{children:\"SDLC procedures should take place for the entire range of products, and Pentest should be the proof of effectiveness. Conducting Pentest audits will also contribute to developing BCP procedures in case of cyber incidents;\"}),/*#__PURE__*/e(\"p\",{children:\"Conducting research and exchanging experiences about past cyber-attacks should take place. Using the SOC experience may also be effective for countering and reducing damage from attacks;\"}),/*#__PURE__*/e(\"p\",{children:\"Capping it off, it is also much necessary to provide awareness training for staff and IT users.\"}),/*#__PURE__*/t(\"p\",{children:[\"Table of Contents\",/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-aliaksandr-latushka/#how-have-cyber-attacks-evolved-over-the-past-12-months?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"How have cyber attacks evolved over the past 12 months?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-aliaksandr-latushka/#what-lessons-can-be-learned-from-the-biggest-cyber-attacks-in-recent-history?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-aliaksandr-latushka/#what-will-cyber-attacks-look-like-in-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What will cyber attacks look like in the future?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-aliaksandr-latushka/#what-are-three-pieces-of-advice-for-organizations-looking-to-get-ahead-of-the-cyber-attacks-of-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"})})]})]});export const richText2=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with\",/*#__PURE__*/e(a,{href:\"https://privacyaustralia.net/author/isla-sibanda/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\" Isla Sibanda\"})}),\", Ethical Hacker and Cybersecurity Specialist\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Isla Sibanda\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/gkhrDnwKL8FY8i3bNLoByBfX4k.png\",srcSet:\"https://framerusercontent.com/images/gkhrDnwKL8FY8i3bNLoByBfX4k.png?scale-down-to=512 512w,https://framerusercontent.com/images/gkhrDnwKL8FY8i3bNLoByBfX4k.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months? \"}),/*#__PURE__*/e(\"p\",{children:\"The majority of documented DDoS assaults are volumetric, i.e., they target network capacity and saturate it with junk packets to jam genuine users connectivity. A DNS amplification attack, which spoofs DNS queries to flood back at a target, is a typical way of doing so. DNS amplification attacks accounted for 17% of all DDoS assaults reported to the F5 SIRT in 2019. By 2020, that percentage had nearly doubled, reaching 31%.\"}),/*#__PURE__*/e(\"p\",{children:\"A DNS query flood is another DNS DDoS tactic, in which an attacker makes malicious DNS queries that are purposefully malformed in order to deplete a DNS servers resources. Malicious DNS queries against customers were responsible for 12% of DDoS assaults in 2020.\"}),/*#__PURE__*/e(\"p\",{children:\"DDoS assaults on web applications increased during the first half of 2020. In 2019, web applications were recognized as the target of 4.2 percent of DDoS assaults recorded to the F5 SIRT. However, by 2020, this had grown sixfold to 26%.\"}),/*#__PURE__*/e(\"p\",{children:\"Geographic variations in attack type were also highlighted by the F5 SIRT incident data. Around the world, the Asia/Pacific region had the largest percentage of incidents reported as DDoS assaults (83 percent). DDoS assaults were the most common in Europe, the Middle East, and Africa (EMEA), accounting for 54 percent of recorded instances.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"No system is safe\"}),\": Nobody likes to brag about being the first known or best known victim of a cyber assault. Is there a way to keep your company from being connected with such negative press? Limit Internet connectivity points with silos if you dont want to be complacent.\"]}),/*#__PURE__*/e(\"p\",{children:\"The utilitys internet connection was attacked in the cryptojacking case through an opportunity created by some restricted internet access for remote monitoring. Radiflow CEO Ilan Barda told Wired that the utility was not targeted. The attackers were just looking for unused computing power that they could take advantage of.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Train your personnel:\"}),\" Without the aid of human mistakes, the Triton attack vector would not have been able to propagate throughout the Middle Eastern network. Triton requires programming control to conduct activities on the infected network since it was designed to function as a remote access Trojan (RAT). This example emphasizes the need of instilling a sense of vigilance in employees and boosting awareness of potential risks. Hope this is helpful!\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Stay current: \"}),\"On legacy platforms, industrial control systems frequently run out-of-date software. Concerns that new control systems or software upgrades would cause critical infrastructure to become unstable might stymie the best practice of constantly upgrading. Still, before unleashing havoc on the ICS, the cyber thief just has to identify one minor flaw to attack.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"As cyber-attacks get more sophisticated, they will begin to replicate our online characteristics and impersonate individuals. Alternatively, a hostile attacker may take control of your AI helper. Alternatively, weaponized AI may get to the point where it can successfully mimic a living human you trust.\"}),/*#__PURE__*/e(\"p\",{children:\"Following that, these new machine intelligence will go for the very defenses that are being used against them. They will learn how to use the firewall and when the security team is in the office. Theyll adjust to dodge and weaken defenses as a result. Meanwhile, theyll utilize their might to propagate, breaking through barriers to compromise and infecting equipment with ruthless efficiency.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Preparing: \"}),\"Businesses must sit down and evaluate which aspects of their operations are crucial to their survival. The evaluation then moves on to determine which data is critical and what cybersecurity measures are required to safeguard it. The discussion must focus on how to effectively safeguard such procedures and activities.\"]}),/*#__PURE__*/e(\"p\",{children:\"When a company has remote teams who need to access a certain application process or customer care, for example, such remote access must be secure at all times. Its all about keeping bad actors out of customer and corporate data. Examining data and balancing the risks of how it may be misused.\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Build a response plan: \"}),\"First and foremost, a written plan is required. Those classified as high performing were more than twice as likely as the typical organization to have a cybersecurity incident response plan (CSIRP) for their whole company, according to IBM Securitys 2020 Cyber Resilient Organization Report. Whats interesting about these top achievers is that their strategies were more likely to be implemented uniformly across the board. They were also significantly more likely than the typical responder to have prepared reaction strategies for specific attacks. A training program for all employees can help make a better and more effective plan. \"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Simulation training: \"})}),/*#__PURE__*/e(\"p\",{children:\"There is a tremendous demand for more effective crisis training than what most providers now offer. Online crisis simulations that are short and gamified are one such commercial offering. These exercises are simple to carry out, may be modified to target an organizations most critical present threats, and can be performed on demand. They are accessible to remote employees, who are often overlooked during in-office simulations and larger-scale hands-on training events. Theyre also less time-consuming than tabletop workouts. As a result, online crisis situations may boost buy-in across the organization, including among non-technical employees.\"})]});export const richText3=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with \",/*#__PURE__*/e(\"strong\",{children:\" \"}),\"Matt Hartley, Co-Founder & Chief Product Officer at \",/*#__PURE__*/e(a,{href:\"https://www.breachrx.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"BreachRx\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Matt Hartley\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/ag1NYkp1gEuhSNo1sFFRy6n6Z4.png\",srcSet:\"https://framerusercontent.com/images/ag1NYkp1gEuhSNo1sFFRy6n6Z4.png?scale-down-to=512 512w,https://framerusercontent.com/images/ag1NYkp1gEuhSNo1sFFRy6n6Z4.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"Over the last couple of years, ransomware has become widely prevalent and can have a mammoth impact on a business. Not only do these attacks prevent a business from safely operating, but the successes adversaries have had are leading them to more frequently exfiltrate data to exploit for increased ransoms. In addition, the proliferation of nation-state-grade tactics,techniques, and procedures into the underground continues to be a major source of new innovation for criminals. With more nations entering the mix given the low bar for entry, this trend will only continue to improve the capabilities of criminals, hacktivists, and other threats.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"While we perpetually hope and work toward security technologies that will outpace cyber attackers, the arms race between defenders and attackers will clearly continue well into the future. Defenders need to continue to move away from a network-and technology-centric to a risk-centric approach that centers on understanding and then protecting the data, process, people, and operations of their organizations. In addition, people-centric teams like privacy and legal involved in responding to attacks need to add automation quickly as theyre already overwhelmed.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"Over the last twenty years, weve seen that attackers are motivated by the same innovations as researchers, technologists, and the greater business community. For example, with the expansion of automation and technology to automate workflows over the last decade, weve seen adversaries adopt similar technologies for their attacks. This trend will only continue  attackers will increasingly adopt technologies emerging from communities like machine learning and artificial intelligence. Further, the success of legitimate as-a-service businesses has led to an surge of malicious as-a-service businesses that have lowered the bar for less-sophisticated adversaries to launch sophisticated attacks. Coupled together, the future attacks will have the ability to more easily increase the scale and breadth of their attacks, making it much harder for defenders to respond quickly and effectively.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/e(\"p\",{children:\"First, build security and privacy in from the start. Organizations that wait to try to bolt security or privacy into their processes and products after theyve been built are exposing themselves to serious risk of compromise and will be tempted to continue to kick the can down the road on what would likely be major, expensive efforts to add protections and controls after the fact.\"}),/*#__PURE__*/e(\"p\",{children:\"Second, expect more oversight from insurance companies and governments  the impacts from data breaches have already driven increased oversight from insurance firms and led to the creation of dozens of regulations in the United States and across the world, which requires notifications, allow for oversight, and huge fines that can ultimately takedown a business if these arent understood and prepared to deal with correctly.\"}),/*#__PURE__*/e(\"p\",{children:\"Third, while putting together the traditional high-level incident response plan is useful for compliance and to determine some organizational processes ahead of an event, theyre never pulled off the shelf during an incident or breach. Teams ultimately need discrete, actionable, and automated playbooks that can be practiced and used to respond quickly and effectively to attacks now and that will emerge in the future.\"})]});export const richText4=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.The following is an interview we recently had with Hugo Sanchez, CEO and co-founder of \",/*#__PURE__*/e(a,{href:\"https://rthreat.net/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"rThreat\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Hugo Sanchez\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/x40zb7wfBGedODAKXjxYSsEm04.png\",srcSet:\"https://framerusercontent.com/images/x40zb7wfBGedODAKXjxYSsEm04.png?scale-down-to=512 512w,https://framerusercontent.com/images/x40zb7wfBGedODAKXjxYSsEm04.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months? \"}),/*#__PURE__*/e(\"p\",{children:\"One of the most significant developments has been growth in third-party supply chain attacks, which involve threat actors who gain access to companies that are connected to the primary targets. The Solarwinds and Kaseya breaches both involved attacks through third-party software that was compromised by threat actors, enabling unauthorized access to the US government agencies that used the Solarwinds product and to a major European grocery chain that used Kaseya, among others. While these were not the first supply chain attacks  the Target breach in 2013 began with a breach of their HVAC vendor  supply chain risks have become a much bigger focus for cyber defense planning in the last year. The increasing frequency of these breaches merely highlights the fact that the technology that has been used to defend against them is insufficient, and there is a need for government agencies and private entities alike to rethink their cyber defenses and integrate an element of real-world strategy.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history? \"}),/*#__PURE__*/e(\"p\",{children:\"There are many lessons to be learned from these most recent attacks, particularly for consumers who remain unaware of the extent to which they are vulnerable to data breaches and other forms of cyber attacks. An important reminder for the public is that very little private data that is provided by consumers to e-commerce companies and others that collect it can truly be trusted to remain private. WIth this in mind, its necessary to be cautious when sharing key personal information online and to put safeguards in place to protect themselves when possible.  An important implication for consumers is that fraud actors will use this data for social engineering, posing as a trusted company by showing that they know private information that the consumer gave to that company. Some people are already familiar with these types of scams, but its a good idea to reinforce this warning, for adults and children: be cautious about which links youre clicking on and verify that they are coming from the company or institution they claim to be by calling their official number. \"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"To be perfectly honest, we dont know, and thats part of the problem. Attackers are innovating faster than our cyber security protocols can currently keep up with, and the government isnt doing enough to encourage innovation to protect against the attacks. It is safe to assume that the frequency and complexity of these attacks will only increase as technology gets more advanced, and cyber defenses need to be appropriately strengthened to stand up to this onslaught. One thing that is important to understand is that attackers often leverage the same software advances that we see in commercial solutions. A major trend currently is the incorporation of machine learning and artificial intelligence into many commercial solutions, including those used in cyber-defense. The use of ML/AI in cyber-attack technology is certain to grow in coming years, so organizations need to be working twice as hard to ensure that they are protected from these more advanced attacks.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/e(\"p\",{children:\"The first thing organizations need to do is adopt a Zero Trust mindset, which means building and managing your cyber-defenses based on the assumption that attackers will be inside your systems environment  or already are. The weakest aspect of current cyber protocols that fail to adhere to this mindset is that by the time they discover a threat, its too late  the threat actor or virus is already inside their system and defending against it becomes nearly impossible. The Zero Trust mindset gives organizations a chance to be proactive about their defenses and more innovative with regards to their strategy. After adopting this mindset shift, organizations should perform threat modeling and invest in contingency planning based on the key risk areas for your organization. Its impossible to know what to protect against without an in-depth risk analysis, and your ability to recover from common scenarios is critical, so this is an essential step. On a final note, once these two elements are in place, test your defenses  people, processes, and technology  on a continuous basis. I cant stress this enough, because validating your defense posture against ever-evolving threats will play a major part in keeping your security program current.\"}),/*#__PURE__*/t(\"p\",{children:[\"Table of Contents\",/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-hugo-sanchez/#how-have-cyber-attacks-evolved-over-the-past-12-months?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"How have cyber attacks evolved over the past 12 months?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-hugo-sanchez/#what-lessons-can-be-learned-from-the-biggest-cyber-attacks-in-recent-history?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-hugo-sanchez/#what-will-cyber-attacks-look-like-in-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What will cyber attacks look like in the future?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-hugo-sanchez/#what-are-three-pieces-of-advice-for-organizations-looking-to-get-ahead-of-the-cyber-attacks-of-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"})})]})]});export const richText5=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.The following is an interview we recently had with David Vincent, Chief Security Evangelist and VP of Product Strategy at \",/*#__PURE__*/e(a,{href:\"https://appsiansecurity.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Appsian\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From David Vincent\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/qR2dfGorxvkT0cGAbZrMiizhlS4.png\",srcSet:\"https://framerusercontent.com/images/qR2dfGorxvkT0cGAbZrMiizhlS4.png?scale-down-to=512 512w,https://framerusercontent.com/images/qR2dfGorxvkT0cGAbZrMiizhlS4.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber-attacks evolved over the past 12 months?  \"}),/*#__PURE__*/t(\"p\",{children:[\"Its common knowledge that cybercriminal activity is constantly increasing and is one of the biggest globally challenges that organizations will face in the next two decades. Current reports from numerous sources such as IBM, McAfee, Verizon, \",/*#__PURE__*/e(a,{href:\"https://cybersecurityventures.com/top-5-cybersecurity-facts-figures-predictions-and-statistics-for-2019-to-2021/#:~:text=Cyber%20crime%20damages%20will%20cost,all%20major%20illegal%20drugs%20combined.\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Cyber Magazine\"})}),\", etc., are predicting the impact of cybercrime damage to reach \",/*#__PURE__*/e(\"strong\",{children:\"$6T\"}),\" by the end of 2021.    \"]}),/*#__PURE__*/t(\"p\",{children:[\"It is difficult to accurately report on the evolution of cyber-attacks that occurred within the last 12 months because according to the annual Verizon Data Breach Investigations \",/*#__PURE__*/e(a,{href:\"https://www.verizon.com/business/resources/reports/dbir/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Report\"})}),\", 58% of cyber-attacks take months or even years to detect, but they did indicate that 36% of confirmed data breaches involve phishing techniques, and 24% of those cyberattacks targeted financial institutions. Additionally, according to \",/*#__PURE__*/e(a,{href:\"https://www.bluevoyant.com/blog/top-5-cybercrimes-and-prevention-tips/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"BlueVoyant\"})}),\", the top 5 cybercrime attack methods in 2020 were: \",/*#__PURE__*/e(\"em\",{children:\"phishing scams, website spoofing, ransomware, malware, and IOT hacking.     \"})]}),/*#__PURE__*/t(\"p\",{children:[\"We can all agree that cyber-crime is no longer the highly skilled college student mischievously trying to hack into an organization. Now cybercriminal organizations like the top five: \",/*#__PURE__*/e(\"em\",{children:\"Cobalt, Lazarus, MageCart, Evil Corp and GozNum\"}),\" are recruiting highly skilled cybercriminals, but not just for the sole purpose of performing their own criminal activity against organizations. These cybercriminal organizations have evolved into \",/*#__PURE__*/e(\"strong\",{children:\"cybercrime\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"entrepreneurs\"}),\" through the development of increasingly sophisticated cybercrime tools that the average cybercriminal could not create on their own and selling these tools on the black market for a reasonable price. This is drastically increasing the population of cybercriminals that organizations must defend against.  \"]}),/*#__PURE__*/t(\"p\",{children:[\"More and more cybersecurity professionals are mentioning that they have seen some of the most authentic \",/*#__PURE__*/e(\"em\",{children:\"bank phishing\"}),\" attempts recently. Bank Phishing is a criminal activity where a malicious person(s) attempts to fraudulently acquire sensitive information, such as online banking passwords and credit card details, by masquerading as a trustworthy organization or website. These phishing attacks are usually done in the form of an email, and the increase in the number of \",/*#__PURE__*/e(\"em\",{children:\"highly authentic\"}),\" phishing and website site spoofing attacks are likely a result of cybercrime entrepreneurs selling their sophisticated crime kits on the black market to less experienced cybercriminals.   \"]}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber-attacks in recent history?  \"}),/*#__PURE__*/e(\"p\",{children:\"Organizations need to: \"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Change their \",/*#__PURE__*/e(\"strong\",{children:\"mindset and security posture\"}),\" from \",/*#__PURE__*/e(\"em\",{children:\"if we are breached\"}),\" to \",/*#__PURE__*/e(\"em\",{children:\"when we are breached\"}),\". \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Implement the \",/*#__PURE__*/e(\"strong\",{children:\"Zero-Trust\"}),\" \",/*#__PURE__*/e(\"strong\",{children:\"security model \"}),\"to enforce the principle of never trust, always validate.  \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Implement \",/*#__PURE__*/e(\"strong\",{children:\"layered security\"}),\", also known as \",/*#__PURE__*/e(\"em\",{children:\"defense in depth (DiD)\"}),\", which is implemented in overlapping layers of controls that typically provide the three control capabilities needed to secure assets: \",/*#__PURE__*/e(\"em\",{children:\"prevention, detection, and response\"}),\". While no individual security control is guaranteed to stop 100% of the cyber threats, layered security provides mitigations against a wide variety of threats while incorporating redundancy in the form of compensating controls in the event that one control should fail. \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Transition from static security found in the typical Role-Based Access Control (RBAC) security models to a \",/*#__PURE__*/e(\"strong\",{children:\"dynamic security model\"}),\" like Attribute-Based Access Control (ABAC) to enable the enforcement of policy requirements into the access controls at the transaction and data level and provide adaptive security with contextual-based controls at the transaction and data field level.  \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Use \",/*#__PURE__*/e(\"strong\",{children:\"Multi-Factor Authentication (MFA)\"}),\". Enforcing MFA at various layers  login, critical transaction level, and critical data field level to enable layers of security. \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Implement \",/*#__PURE__*/e(\"strong\",{children:\"dynamic security controls capabilities\"}),\" to improve the organizations ability to identify, detect, prevent, respond, and recover from anomalies and threats. \"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber-attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"No doubt phishing scams, website spoofing, ransomware, malware, and IOT hacking will continue to occur, and these techniques will improve in their effectiveness with more convincing presentations of bank phishing emails and fraudulent websites. New cyber-attack methods will also appear, which will be difficult for anyone to predict what those will be, but many conference topics and articles have been mentioning the following as areas that will likely see more cyber-crime attacks. \"}),/*#__PURE__*/t(\"ol\",{style:{\"--list-style-type\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Multi-Factor Authentication for remotely accessing systems and data will become a bigger target.  \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Mobile devices will become a bigger target. Mobile attacks such as \",/*#__PURE__*/e(\"strong\",{children:\"smishing\"}),\", which is similar to phishing, but sent through SMS text messages rather than emails.  \"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Another example of a mobile device threat is a keyboard logging app called \",/*#__PURE__*/e(a,{href:\"https://www.securityweek.com/airhopper-malware-uses-radio-signals-steal-data-isolated-computers\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"AirHopper\"})}),\", which is malware loaded on the target system that is able to transmit radio signals from up to 7 meters away to wirelessly steal data from isolated computers. With more and more organizations adopting bring-your-own-device (BYOD), which are relatively easy to infect with malware, organizations need to manage personal device risks exposure more effectively.  \"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber-attacks of the future? \"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Always Understand Your Current Risk Exposure & Vulnerabilities\"}),\"  The first step in any battle is to assess your defensive capabilities to identify weaknesses that need to be resolved quickly. This can be done by conducting a thorough risk assessment to identify and quantify all of the potential security risk exposure, and then evaluate the design and operating effectiveness of those controls intended to mitigate those risks to determine if any vulnerabilities exist that could be exploited by cyber criminals. Part of this risk assessment should determine your security control environments capability to detect, prevent, respond, and recover from threat events. Furthermore, it is important to monitor the residual risk level, of a given risk event, against the organizations maximum risk appetite level to determine if they have implemented adequate level of mitigation controls. Residual Risk = Inherent Risk  Control Effectiveness. If the residual risk level is too close or exceeds the maximum risk appetite level, then the organization must go back and improve their control effectiveness.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Perform Independent Risk Assessments \"}),\" Have an independent audit performed every six months to evaluate the design and operating effectiveness of the security control you have implemented to safeguard your systems and data. Part of this independent risk assessment should determine your security control environments capability to detect, prevent, respond, and recover from threat events.    \"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Implement A Continuous Improvement Process \"}),\" After implementing the 6 leading practices listed in question # 2, consider implementing \",/*#__PURE__*/e(\"strong\",{children:\"AI & ML capability to \"}),\"constantly (24/7/365) perform your security risk assessment based on the \",/*#__PURE__*/e(\"em\",{children:\"monitoring of the key risk indicators to detect and respond to\"}),\" \",/*#__PURE__*/e(\"em\",{children:\"anomalies and threats\"}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"Table of Contents\",/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-david-vincent-2/#how-have-cyber-attacks-evolved-over-the-past-12-months?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"How have cyber-attacks evolved over the past 12 months?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-david-vincent-2/#what-lessons-can-be-learned-from-the-biggest-cyber-attacks-in-recent-history?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What lessons can be learned from the biggest cyber-attacks in recent history?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-david-vincent-2/#what-will-cyber-attacks-look-like-in-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What will cyber-attacks look like in the future?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-david-vincent-2/#what-are-three-pieces-of-advice-for-organizations-looking-to-get-ahead-of-the-cyber-attacks-of-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber-attacks of the future?\"})})]})]});export const richText6=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Giora Engel,  CEO & Co-Founder, \",/*#__PURE__*/e(a,{href:\"https://www.neosec.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Neosec\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Giora Engel\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/VyON7LXHACYXIu2rRvuUOORzSg.png\",srcSet:\"https://framerusercontent.com/images/VyON7LXHACYXIu2rRvuUOORzSg.png?scale-down-to=512 512w,https://framerusercontent.com/images/VyON7LXHACYXIu2rRvuUOORzSg.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"The past 12 months have seen an inflection point where attackers changed their behavior from focusing primarily on data centers and enterprise networks to targeting the application environment, and specifically APIs. While Gartner has predicted that in 2022 the majority of attacks will involve APIs, we see the change already underway. The reason is that the digital transformation has seen a massive increase in the adoption of APIs and microservices. Why are they under attack? Simple, they are open in nature and give attackers a large attack surface to evaluate and, more worryingly, they are largely undefended. \"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"We are seeing APIs being exploited in a variety of ways. Attackers are finding that targeting APIs gets them faster access to the data and the ultimate incentives for their behavior.  This speed to abuse is because APIs are open to the outside by design and directly connect to the core business. This access to the core business is what worries security practitioners. Organizations are moving quickly to build new business processes using APIs but determining how to protect these business processes, and the APIs that facilitate them, is playing catch-up. The harsh reality is that practically all organizations are unprepared and dont even have an inventory of their APIs, let alone plans to identify malicious behavior within them. \"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"The trend that we are seeing now will continue and the vast majority of attacks in the future will focus on the applications environment and abuse existing exposed APIs. Security is at the beginning of a major evolution and new security techniques will take over. Traditional security products protected the datacenter. But the datacenter is disappearing and these new business systems, applications, APIs, and microservices are now elsewhere. The ability to protect this new style of application and the APIs is going to be paramount.  \"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Step 1  Make sure you have the right visibility and logging in your api environments. \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Step 2  Build a continuous inventory of your APIs and find out which carry sensitive data, and audit your security posture. \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Step 3  The ability to detect attacks or abuse when it happens. Focus on whats important for the business and understand what is normal versus abnormal. Behavioral analytics of API traffic is essential.\"})})]})]});export const richText7=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Eslam Reda, Penetration Tester, \",/*#__PURE__*/e(a,{href:\"https://seclinq.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"SECLINQ\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Eslam Reda\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/bq86RqkitiiaMcC64fwnta9EY.png\",srcSet:\"https://framerusercontent.com/images/bq86RqkitiiaMcC64fwnta9EY.png?scale-down-to=512 512w,https://framerusercontent.com/images/bq86RqkitiiaMcC64fwnta9EY.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"There have been a lot of changes in the cybersecurity space because of the rise of ransomware attacks and 0-day exploits. A lot of the details on how to use these exploits get published on the dark web and malicious forums, which provides opportunities for hackers to use these exploits against other companies. The move to cloud environments also makes everything reachable with one configuration mistake.\"}),/*#__PURE__*/e(\"p\",{children:\"It has been a successful 12 months for hackers targeting the human element with phishing and other attacks. Hackers target situations around the world such as the Covid-19 situation and working remotely.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"Do not trust the hackers, if you pay the ransom there is no guarantee that you will get your data back. Take sufficient measures to secure your data, backup your data, and have a business continuity plan in place. Recently, it has been a trend that hackers target the backups of your data before taking over the main data for ransom, then the controls you use to protect your data are used against you.\"}),/*#__PURE__*/e(\"p\",{children:\"The recent attacks on large companies like T-mobile or Twitch show that it is not enough to have a cybersecurity plan in place. You have to take further steps to hire enough professionals to implement these plans and simulate hackers by doing penetration testing and red teaming engagements.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"From my point of view, as I have been on both sides hacking systems and also protecting them. It is an everyday evolving field, there is no guarantee that the attacks used today will be effective tomorrow. But the attack surface itself is increasing to include IoT, Public cloud, and working from home structure. A lot of companies are moving towards AI to create security products which is a good step, but I dont see it replacing the human skilled ethical hackers any time soon.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Penetration testing, hacking simulations are not an option. It is a mandatory exercise to secure your business.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Create a disaster recovery site and secure your backups with the same security controls you have applied on the main site. It is a target too.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Even though we cant predict the future, we can prepare for it. Consider new security technologies and a lot of them are open-source.\"})})]})]});export const richText8=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.The following is an interview we recently had with Kimberly Sutherland, VP of Fraud and Identity Strategy,\",/*#__PURE__*/e(a,{href:\"https://risk.lexisnexis.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\" LexisNexis Risk Solutions\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/Wh2dxhF0sl40w6mibLz4rvbr8tQ.png\",srcSet:\"https://framerusercontent.com/images/Wh2dxhF0sl40w6mibLz4rvbr8tQ.png?scale-down-to=512 512w,https://framerusercontent.com/images/Wh2dxhF0sl40w6mibLz4rvbr8tQ.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:/*#__PURE__*/e(\"br\",{})}),\"In comparison to last year, the LexisNexis Risk Solutions Digital Identity Network has seen growth in automated bot attacks in every region globally. These attack volumes are based on the bot traffic seen by organizations within our network and these bot attacks use extensive attack typologies and attempt to trick or overwhelm business fraud defenses. Organizations should expect to see a continued evolution of bot attack typologies, ranging from short, sharp high velocity attacks that are conducted over a series of days to stealth attacks that may build up over a series of months.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest security breaches over the past 12 months?\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:/*#__PURE__*/e(\"br\",{})}),\"Often the role of and impact to the consumer is less emphasized following a security breach. Organizations seem to focus on which data elements may have been compromised and whether the points of exploit have been remediated. While numerous studies have shown that security breaches erode consumers trust, they rarely change consumer behavior. Despite being impacted by a security breach or cyber incident, consumers rarely change their passwords or authentication processes to lessen the risk of account takeover fraud. This is an important lesson for organizations to ensure that they do not place too much emphasis on consumer behavioral changes, but proactively enforce risk-based authentication in the highest risk consumer channels to balance the customer experience with the appropriate level of security.\"]}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"We will continue to see short high velocity attacks as well as stealth attacks in the future where fraudsters use the same device to target multiple organizations via several different access methods. We also expect to see an increase in cross-organizational, cross-industry and cross-regional attack patterns. Organizations should prepare for recalibration of what they consider to be high-risk activity, as those individuals and organizations committing cyber attacks expand their attack methods to avoid detection.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations should be sure to pay attention to cyber attacks of all sizes, as small attacks can have seismic impacts. It will become increasingly more difficult for organizations to determine human vs bot initiated activity, so data and risk signals associated with device behavior such as behavioral biometrics will be necessary to improve the detection of new attacks. Finally, we continue to say that it takes a network to fight a network  these attacks will occur across both micro and macro fraud networks; organizations should not limit themselves to their own data or intel and look for opportunities to share intelligence related to confirmed fraud events and cyber attacks so that an entity that is marked as high-risk or fraudulent by one organization, can be reviewed by subsequent organizations before further transactions are processed.\"}),/*#__PURE__*/t(\"p\",{children:[\"Table of Contents\",/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-kimberly-sutherland/#how-have-cyber-attacks-evolved-over-the-past-12-months?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"How have cyber attacks evolved over the past 12 months?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-kimberly-sutherland/#what-lessons-can-be-learned-from-the-biggest-security-breaches-over-the-past-12-months?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What lessons can be learned from the biggest security breaches over the past 12 months?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-kimberly-sutherland/#what-will-cyber-attacks-look-like-in-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What will cyber attacks look like in the future?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-kimberly-sutherland/#what-are-three-pieces-of-advice-for-organizations-looking-to-get-ahead-of-the-cyber-attacks-of-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?\"})})]})]});export const richText9=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.The following is an interview we recently had with Bruce Young, Graduate Cybersecurity Program Lead, \",/*#__PURE__*/e(a,{href:\"https://www.harrisburgu.edu/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Harrisburg University of Science and Technology\"})}),\" and GRC Security Services Practice Lead at \",/*#__PURE__*/e(a,{href:\"https://www.pcn-inc.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"PCN Inc\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/MFZiUyPeZtqqlFBMyCE6XtznNI0.png\",srcSet:\"https://framerusercontent.com/images/MFZiUyPeZtqqlFBMyCE6XtznNI0.png?scale-down-to=512 512w,https://framerusercontent.com/images/MFZiUyPeZtqqlFBMyCE6XtznNI0.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber-attacks evolved over the past 12months? \"}),/*#__PURE__*/e(\"p\",{children:\"An interesting phenomenon over the last 12 months is that cyber-attackers are now using Denial-of-Service (DoS) attacks to extract ransom (not ransomware) from organizations. The successful ransomware attack that caused the Colonial Pipeline to stop operations as they shut down their systems due to a computer breach had far reaching consequences. The Wall Street Journal reported that the Colonial Pipeline CIO authorized the ransomware payment of $4.4 million to be paid the same day of the attack.  From the information provided, it would seem the ransom was paid before cybersecurity experts were able to investigate the type and extent of the impact from the attack. When ransomware attacks happen, its become so commonplace for organizations to just pay the ransom. They dont even understand the type of cyber attack they have experienced. Organizations most likely have the tools or can work with service providers to prevent DoS attacks, as well as other forms of cyber-attacks. Lack of knowledge and understanding of cybersecurity, organizations are just paying the ransom! \"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber-attacks in recent history? \"}),/*#__PURE__*/t(\"p\",{children:[\"One of the biggest cyber-breaches that was initially reported in July 2019 was the Capital One financial company. It was not well publicized that up to 100 million credit card applications were stolen and posted on Github. Capital One is a financial institution that is known to aggressively utilize technology services, such as cloud computing. The reason it was not well publicized is that Capital One was utilizing Amazon Web Service (AWS) cloud environment to host the systems containing the credit card applications. An AWS contracted employee, Paige A. Thompson, breached security controls to extract the credit card applications from Capital Ones database systems. The reason this is one of the biggest cyber-attacks is that it included one of the top five largest financial institutions and one of the largest Cloud Service Providers. Many people are not aware of the breach as it went quietly away! More details of the FBI Investigation report, \",/*#__PURE__*/e(a,{href:\"https://www.justice.gov/usao-wdwa/press-release/file/1198481/download\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"HERE\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber-attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"Cyber-attacks, such as ransomware, will persist as they do today, as long as they continue to be successful. Why change what is working, ransomware is proven to be successful, why build something different. What does change, is the ransomware itself, as it is updated and modified to continue to be effective. The new trend, which was experienced by the Colonial Pipeline cyber-attack, is that the bad actors are well organized. The type of ransomware attack launched against Colonial Pipeline is known as Ransomware-as-a-Service (RaaS). Which means that the attack was coordinated by a group of bad actors that used the ransomware service developed by another group. This is an indication that ransomware cyber-attacks are only going to get more sophisticated.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber-attacks of the future?\"}),/*#__PURE__*/e(\"p\",{children:\"The cyber-threat landscape is only going to continue to get worse. As long as organizations continue to pay the ransom, the bad actors will continue to attack them. Below are three pieces of advice for organizations to defend against future cyber-attacks.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Invest in cyber security controls to protect against todays threats. Ransomware is detectable, preventable, and recoverable  invest in the technology...do not pay the ransom.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/t(\"p\",{children:[\"Security awareness training for all staff...\",/*#__PURE__*/e(\"em\",{children:\"at all levels\"}),\". That includes you Executives!\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Implement secure access control just as Multi-Factor Authentication  specifically when conducting the digital transformation to the Cloud.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Table of Contents\",/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-bruce-young/#how-have-cyber-attacks-evolved-over-the-past-12months?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"How have cyber-attacks evolved over the past 12months?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-bruce-young/#what-lessons-can-be-learned-from-the-biggest-cyber-attacks-in-recent-history?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What lessons can be learned from the biggest cyber-attacks in recent history?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-bruce-young/#what-will-cyber-attacks-look-like-in-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What will cyber-attacks look like in the future?\"})}),/*#__PURE__*/e(a,{href:\"https://panther.com/blog/the-future-of-cyber-attacks-insights-from-bruce-young/#what-are-three-pieces-of-advice-for-organizations-looking-to-get-ahead-of-the-cyber-attacks-of-the-future?\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber-attacks of the future?\"})})]})]});export const richText10=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Morgan Hill, Director of Support, \",/*#__PURE__*/e(a,{href:\"https://cinchit.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Cinch I.T.\"})})]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Morgan Hill\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/r1DTg11gu5HBWVavTpNvdUgfBGY.png\",srcSet:\"https://framerusercontent.com/images/r1DTg11gu5HBWVavTpNvdUgfBGY.png?scale-down-to=512 512w,https://framerusercontent.com/images/r1DTg11gu5HBWVavTpNvdUgfBGY.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber-attacks evolved over the past 12 months? \"}),/*#__PURE__*/e(\"p\",{children:\"Over the last 12-36 months there has been a major split in the types of malicious attacks weve seen targeting businesses. While everyone anticipated an exponential increase in these attacks, the evolution into two predominant categories many support systems and security teams did not necessarily expect.  \"}),/*#__PURE__*/e(\"p\",{children:\"The primary type of targeted attack which remains the most active and growing, a trend most certain to continue, are automated and script-based attacks initiated via email. These attacks are generally easiest to spot and prevent, however due to the ease of deployment across a vast many end users the malicious actors are employing a quantity versus quality approach in their attacks.\"}),/*#__PURE__*/e(\"p\",{children:\"While these attacks continue to target a massive audience, there has recently begun a trend of far more dedicated threat purveyors intelligently and actively targeting networks. These threats are far more dangerous as they are being enacted by a ruthless, and more importantly patient, intelligence.  Once the network or infrastructure has been actively analyzed and breached, the criminals do not immediately try to scam or send internal phishing attacks to company executives, but can remain in the network silently for hours, days, or even weeks to determine the best way to exploit and benefit financially through in-depth analysis.\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"What lessons can be learned from the biggest cyber-attacks in recent history? \"})}),/*#__PURE__*/e(\"p\",{children:\"Cyber criminals have been consistently evolving and improving their methods month over month. From the complexity of the attack vectors, to advanced social engineering, to the encryption methods and software they use, these criminals are always getting better at their practices and making it harder to defend against. The biggest takeaway I can see in recent experience is that businesses, vendors, and indeed the government are struggling to keep pace with the rapidly changing landscape. Some of this comes from an ignorance to the threats and their expansion, but other weaknesses come from a willful disregard for security measures being put in place and having them being actively upkept due to a perceived loss in convenience. \"}),/*#__PURE__*/e(\"p\",{children:\"Is multi-factor authentication an additional step to what people are accustomed to? Most definitely. Yet, I and others familiar with the threat landscape at the moment will argue for its mandatory use in all possible situations due to it being worth the slight trade-off.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber-attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"The complex multi-pronged approach will evolve and become more common for increasingly smaller business and service providers including MSPs.  Including complex social engineering attacks in combination to the traditional network and system assault.\"}),/*#__PURE__*/e(\"p\",{children:\"The future attacks will become more complex and dedicated as we are already seeing in the wild. Beginning with an information gathering phase and a detailed plan of attack including which employees and systems of an organization are the most vulnerable or at risk, then working to exploit these weaknesses in a near undetectable method until they are fully ready to strike where it causes the most damage, providing them the most profitable outcome.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber-attacks of the future? \"}),/*#__PURE__*/e(\"p\",{children:\"There are a multitude of techniques or services that can be involved here of course, so Ive narrowed down the below in my order of importance for my clients:\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1  Two/Multi Factor Authorization.  \"}),\"The first system I put in place and would recommend its enabled and enforced on all platforms; it can be for all users (scoped by location or VPN whenever possible).  This will protect from a great many attack vectors and prevent employee errors also to a large degree.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2  Employee Training. \"}),\"Continual employee training and updates on the latest threats. This can include many aspects such as phishing simulations, weekly or monthly training for new malicious trends, and dark web scans for password breaches.  Giving employees good habits and up to date knowledge is one of the best ways to ensure they can identify a potential malicious event.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3  Critical System Patching. \"}),\"Critical systems patching in place for any public facing systems such as email servers, external facing Firewalls, IIS or web servers, or any connected IOTs devices. Many systems are seeing exploits becoming more common due to both cyber-criminals as well as ethical hacking teams.  Keeping the latest security patches installed and current is a good way to close these exploits on your systems, as well as retiring older systems that are not being actively updated.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"4  Advanced Email Protection Services. \"}),\"Many providers have services not only for email encryption and archiving, but also advanced email threat protection services which are becoming more robust. Employing protection services that not only look for spam or phishing emails, but also employ impersonation prevention, Macro detection systems, and URL link scanning can greatly reduce the amount of bad email from even reaching the end users.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"5  Regular Security Audits. \"}),\"The final component after educating employees on detecting threats, protecting them via MFA, preventing them from receiving as many threats as possible, and protecting internet facing system security flaws, is all about the validation. At minimum, a quarterly or annual security audit including penetration testing is a great way to prove systems are protected, and that employees are practicing good behaviors to keep the organization safe.\"]})]});export const richText11=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Yaniv Masjedi, Marketing, \",/*#__PURE__*/e(a,{href:\"https://www.aura.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Aura\"})}),\". \"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Yaniv Masjedi\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/GN0HrfQXjeApuFewUPGQyV2vLrM.png\",srcSet:\"https://framerusercontent.com/images/GN0HrfQXjeApuFewUPGQyV2vLrM.png?scale-down-to=512 512w,https://framerusercontent.com/images/GN0HrfQXjeApuFewUPGQyV2vLrM.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months? \"}),/*#__PURE__*/t(\"p\",{children:[\"We recently published an article on Aura blog titled: \",/*#__PURE__*/e(a,{href:\"https://www.aura.com/learn/how-to-know-if-your-identity-has-been-stolen\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"How To know If Your Identity Has Been Stolen\"})}),\" where we share an alarming statistic: 47% of Americans experienced identity theft last year. If you think of that number  thats a lot of people.\"]}),/*#__PURE__*/t(\"p\",{children:[\"One of the biggest shifts that occurred over the last year was the growth in cyber attackers using manipulation to steal our private data. Research shows that \",/*#__PURE__*/e(a,{href:\"https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Internet crime\"})}),\" complaints soared by 69.4% in 2020, with the top three crimes reported being phishing scams, non-payment/non-delivery scams, and extortion. \"]}),/*#__PURE__*/e(\"p\",{children:\"A key reason for this increase is that cyber criminals recognize that as employees have moved their working lives onto their devices to collaborate, theyve also moved outside of their organizations perimeter defenses and are thus prime targets for fraud and phishing scams. \"}),/*#__PURE__*/e(\"p\",{children:\"In many ways, by using our own devices to work from home, weve not only traded away our privacy but also our safety and our security. Our devices are now a bigger target for cyber criminals, who can attempt to manipulate us into giving up information with fake email and SMS messages. \"}),/*#__PURE__*/e(\"p\",{children:\"Unfortunately, many organizations are struggling to get to grips with phishing and social engineering-style threats because traditional security solutions like antiviruses or network monitoring tools cant detect them. The only way to detect them is by educating employees on the latest techniques, which requires consistent training. \"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history? \"}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(a,{href:\"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Dark Halo\"})}),\" and \",/*#__PURE__*/e(a,{href:\"https://www.zdnet.com/article/updated-kaseya-ransomware-attack-faq-what-we-know-now/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Kaseya\"})}),\" ransomware attacks showed that no organization is too big to hack. It doesnt matter whether youre a multinational corporation or a government department; if an Advanced Persistent Threat (APT) actor wants to gain access to your data, its a matter of if, not when. \"]}),/*#__PURE__*/e(\"p\",{children:\"More and more APTs are launching supply chain attacks, so they can gain access to a third-party service providers internal systems and steal the data of multiple organizations. This means organizations can no longer blindly trust third-party providers to protect their data, as every piece of information they hold is at risk of exfiltration.\"}),/*#__PURE__*/e(\"p\",{children:\"The only way for organizations to defend against these types of attacks is to minimize third-party access to sensitive data and to use a mixture of continuous network monitoring and identity protection services to identify data leaks when they occur. \"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"In the future, were going to see more cyber criminals begin to emulate the techniques and coordinated attacks used by state-sponsored APTs. The reason for this change is that many less skilled attackers will try and replicate the techniques used in successful APT attacks. \"}),/*#__PURE__*/e(\"p\",{children:\"For example, when considering the techniques used in recent APT attacks like the Dark Halo and Kaseya breaches, it is likely that lower-level cyber criminals will start to use obfuscation techniques to avoid detection, so they have enough time to exfiltrate as much data as possible. \"}),/*#__PURE__*/e(\"p\",{children:\"In addition, cyber criminals will start to use a wider range of techniques to break into target organizations defenses, switching between manipulative phishing and social engineering attempts to brute force hacks, browser-based exploits, and cloud infrastructure modification. \"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of cyber attacks in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"Organizations looking to get ahead of cyber attacks need to develop a security strategy to protect interconnected devices from cyber criminals. At a high level, that means addressing human risk and increasing employee awareness of threats. \"}),/*#__PURE__*/t(\"p\",{children:[\"The CEO of Pango Group, owners of Hotspotshield VPN, Hamed Saeed recently put out a great video detailing the \",/*#__PURE__*/e(a,{href:\"https://www.youtube.com/watch?v=W9xh1c1S8t8&feature=emb_title\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"5 Things Every Company Needs to Know About Data Privacy & Cyber Security\"})}),\" with some practical tips:\"]}),/*#__PURE__*/e(\"p\",{children:\"The more users know about the risks of clicking on suspicious links or attachments, selecting weak passwords, and not updating devices, the more theyll be able to avoid those behaviors that put themselves, their families, and their organizations data at risk. \"}),/*#__PURE__*/e(\"p\",{children:\"Steps organizations can take today: \"}),/*#__PURE__*/e(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Educate your employees to mitigate human vulnerabilities  Provide employees with training on the techniques that cyber criminals are using to gather data, and educate them on how to protect themselves by selecting strong passwords and never clicking on links in emails from unknown senders. \"})})}),/*#__PURE__*/e(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Communicate and document  If your employees are working from home, its vital to communicate with them and document their level of security awareness to ensure that theyre following the latest best practices. \"})})}),/*#__PURE__*/e(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Start thinking ahead  Try to anticipate how cyber threats will evolve in the future, and commit to incrementally improving your security posture over time by onboarding tools like identity protection services, password managers, and vulnerability scanners. \"})})})]});export const richText12=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Haseeb Awan, Founder & CEO of \",/*#__PURE__*/e(a,{href:\"https://www.efani.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Efani\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Haseeb Awan\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/kd2ahCa2DqJjtSqX6Zfa6E08.png\",srcSet:\"https://framerusercontent.com/images/kd2ahCa2DqJjtSqX6Zfa6E08.png?scale-down-to=512 512w,https://framerusercontent.com/images/kd2ahCa2DqJjtSqX6Zfa6E08.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months? \"}),/*#__PURE__*/e(\"p\",{children:\"Cyberattacks have significantly evolved. Ransomware, phishing, and sim swaps cyberattacks have grown from a threat that many firms formerly dismissed as a minor annoyance to one that frequently causes extensive economic disruption, sensitive data disclosure, and reputational damage  all at the same time. \"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history? \"}),/*#__PURE__*/e(\"p\",{children:\"There are plenty of lessons that could be learned. For instance, never rely on SMS backed 2FA rather use MFA (multi-factor authentication). For phishing, never entertain malicious links at minimum and recognize such scams initially. Obtain basic cybersecurity training to secure your online presence.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"The widespread use of new tactics, methods, and procedures (TTPs) related to the deployment of cyberattacks on corporate and personal networks was one of the most significant trends of 2020, affecting companies all over the world.To maximise their attacks and drive influencers and the c-suite to pay their unsolicited demands, threat actors have increasingly employed new techniques such as big game hunting and double extortion in the last year. Future years will see a rise in interest in cybersecurity practices, raising awareness towards others, etc.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of cyber attacks in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"Today, many cyber-attacks are extremely targeted. Attackers spend a significant amount of time (typically months) acquiring information on their victim and watching for any opportunity to pounce.In the face of such attacks, organizations who do not invest in cyber threat intelligence are the most vulnerable. \"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"1. C-suit personal information should be secured from mobile-based attacks. \"}),\"This is a real loophole that is ignored and could be used to snoop in sensitive information related to the company. \"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"2. Endpoint Protection. \"}),\"If you strip cybersecurity down to its most basic components, youll discover that its all about endpoint protection. However, as more work is done remotely, endpoint security has grown more important. With Mr. A working from home, Mr B. from another city, and Mr. C from another nation, protecting entry points to prevent malware and other hostile entities from getting access to networks has never been more difficult. Not to mention the expanding impact of BYOD policies. Although some endpoint security solutions are supplied as SaaS, they typically function on a client-server approach. Although firewalls and VPNs are important for breach prevention, they are not the same as endpoint security. Both can, however, be featured on the platform. \"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"3. Response Plan (critical). \"}),\" In general, most firms might improve their response to cyber-attacks.The following are the most common cyber-breach responses:\"]}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Attempting to locate the source\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Assigning defined roles and tasks to individuals\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Evaluating the consequences\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Keeping a documented record of incidents \"})})]}),/*#__PURE__*/t(\"p\",{children:[\"Key Message: \",/*#__PURE__*/e(\"em\",{children:\"Thinking ahead of the attackers is the safest way to prepare your companys data protection for a future of advanced attacks.The three-pronged approach of intelligent analysis and defence, comprehensive endpoint security, and a proactive response plan in the event of an attack is the best way to ensure this.\"})]})]});export const richText13=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.The following is an interview we recently had with \",/*#__PURE__*/e(\"strong\",{children:\" \"}),\"Eric McGee, Senior Network Engineer at \",/*#__PURE__*/e(a,{href:\"https://www.trgdatacenters.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"TRG Datacenters\"})}),\".\"]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Eric McGee\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/zc2BMk9ieHJWWa3j8jLDnMShzI.png\",srcSet:\"https://framerusercontent.com/images/zc2BMk9ieHJWWa3j8jLDnMShzI.png?scale-down-to=512 512w,https://framerusercontent.com/images/zc2BMk9ieHJWWa3j8jLDnMShzI.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"The number of cyber attacks targeting individuals, businesses, and governments has increased exponentially over the last year. Moreover, these attacks have become increasingly sophisticated thanks to their use of more advanced technology such as 5G and AI.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"One major lesson from the recent Microsoft Exchange Server attack that happened in January 2021 is that businesses and governmental organizations need to invest heavily in prevention of attacks. Entities need to understand where their data is, who has access to it, and how data flows within the organization so as to identify vulnerable points and secure them before any attack occurs. This process needs to be iterative to ensure all the vulnerabilities in the data chain are taken care of at all times.\"}),/*#__PURE__*/e(\"p\",{children:\"A second lesson is that companies need to improve their detection capabilities to root out anomalous activity as early and as quickly as possible. Detection acts as a fail safe to mitigate against loss should prevention fail to achieve its purpose.\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"Cyber attacks are only going to get more sophisticated as they continue to employ advanced technology. AI, especially, will contribute to the growing sophistication and frequency of cyber attacks. As these attacks become more sophisticated, the ransom demands will also increase exponentially.\"}),/*#__PURE__*/e(\"p\",{children:\"We should also expect to see different varieties of cyber attacks emerging. For instance, state sponsored attacks as well as organized cyber criminal gangs will continue increasing in number in the years to come. Phishing attacks will also increase in variety and intensity.\"}),/*#__PURE__*/e(\"p\",{children:\"Furthermore, the majority of the political unrest we shall witness in the coming years will primarily be instigated by cyber criminals. This includes the use of fake news to interfere with electoral processes and to sway public opinion.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future? \"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Automation is crucial to protecting your business from cyber security threats. Automation reduces the chances of human error that can expose your business to security threats. Moreover, automated cyber security systems are easier to scale.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Ensure that you have a backup of everything stored in a secure place with limited access. Backups will help ensure you are not forced into paying ransomware once an attack has occurred.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Make sure all your software, including security software, is up to date, and regularly check for and install security updates.\"})})]})]});export const richText14=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Steve Tcherchian, CISO and Chief Product Officer at \",/*#__PURE__*/e(a,{href:\"http://www.xypro.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"XYPRO\"})}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:\"How have cyber attacks evolved over the past 12months?\"}),/*#__PURE__*/e(\"p\",{children:\"The SolarWinds and Kaseya incidents showed us what types of multifaceted attacks are being used. Its not a matter of if theyre going to get into your network. Theyre going to get in. In the SolarWinds attack, once the attackers gained access to the network with compromised credentials, they moved laterally by capturing and using multiple, different, insecure credentials. Our efforts should focus on shoring up internal systems to limit their ability to move laterally using insecure credentials and passwords once theyre in. Proper password management and multi-factor authentication would have prevented this from happening.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"This is counterintuitive to traditional methods of security where locking the front door was once considered to be good enough. But time after time weve seen that it is no longer sustainable. Defense in depth is required. We need to treat locking up all the valuable systems and information inside of our network as being just as important as hardening our perimeter. ZERO TRUST SECURITY!\"}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber attacks look like in the future?\"}),/*#__PURE__*/e(\"p\",{children:\"The proliferation of Internet of Things (IoT) devices, an expanding remote workforce due to the pandemic and the need for automation has put smart devices into the spotlight. Weve all heard the stories of attacks on IoT devices. Remote attackers viewing baby monitors and home security cameras. Estranged couples trying to annoy each other by remotely adjusting the thermostat. Even instances where a smart switch was hacked and all the attacker did was turn the switch on and off rapidly where it generated a spark and started a house fire. These are extreme examples but IoT security is a real problem.\"}),/*#__PURE__*/e(\"p\",{children:\"The functionality and simplicity of IoT devices is great. These conveniences come at a steep price. The tradeoff is often security and personal data. For an IoT device to be quick to market, affordable, easy to set up and useful usually important, non-valuable functions like security are cast aside. Off the shelf IoT devices usually have hardcoded default passwords. These passwords can be located by a simple Google search. Manufacturers often post their device passwords online to aid in the setup of their device. Some of these devices have passwords like admin/admin. Multiple devices from the same provider or chip maker may all share the same password. Some devices have hard coded passwords that cannot be changed. Ive even seen devices with no passwords. Securing these devices needs to start at the source.\"}),/*#__PURE__*/e(\"p\",{children:\"This vulnerability, connected to the internet via the same Wi-Fi were all using to do remote school, play video games and work from home during a pandemic creates a big threat to the remote workforce. These insecure devices provide an easy entry point into home networks and given time will allow attackers to move laterally into corporate networks. I dont see this risk going away. In fact, as the remote workforce gets more comfortable working from home and the market continues to be flooded with smart devices and automation, this problem will get much worse.\"}),/*#__PURE__*/e(\"p\",{children:\"Unfortunately, unless required by compliance or by government legislation, I predict that we will see very little from the business community in this regard. That is not to say there arent software vendors and IoT manufacturers who want to do the right thing, but unfortunately without external pressure, most wont.\"}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future?  \"}),/*#__PURE__*/e(\"p\",{children:\"One of the most critical security risks to any organization are passwords, especially default passwords and passwords to privileged accounts, which have elevated access to perform administrative functions. These can be administrator accounts, service accounts, database connection accounts, application accounts and others. Most of these accounts were set up ages ago when an application or system was initially deployed. They have multiple integration points and because of the risk of breaking something, the passwords for these accounts are rarely rotated, likely shared and often improperly stored.\"}),/*#__PURE__*/e(\"p\",{children:\"Privileged account abuse is the most common way for hackers to compromise a system. Proper credential storage and accountability is paramount to risk mitigation. Relying on manual methods is resource-intensive, error-prone and leaves gaps.\"}),/*#__PURE__*/e(\"p\",{children:\"According to a Varonis report, nearly 40% of all users sampled have passwords that have never been rotated! These passwords have a higher likelihood of showing up in online password dumps and being used to infiltrate networks. Simply put  theyre a cyber criminals best friend. This is how hackers walk in right through the front door. Not because theyre clever, rather because we make it too easy for them.\"})]});export const richText15=/*#__PURE__*/t(n.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"This article is part of Panthers new \",/*#__PURE__*/e(a,{href:\"https://panther.com/blog/future-of-cyber-attacks/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!0,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:/*#__PURE__*/e(\"em\",{children:\"Future of Cyber Attacks Series\"})})}),\" which features interviews with cyber security experts, thought leaders, and practitioners with a goal of better understanding what organizations can do to prepare themselves for the future of cyber attacks.\"]}),/*#__PURE__*/t(\"p\",{children:[\"The following is an interview we recently had with Purandar Das, Chief Security Evangelist and Co-founder of \",/*#__PURE__*/e(a,{href:\"https://www.soterosoft.com/\",motionChild:!0,nodeId:\"YHdMp3byK\",openInNewTab:!1,relValues:[],scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(r.a,{children:\"Sotero\"})})]}),/*#__PURE__*/e(\"img\",{alt:\"The Future of Cyber Attacks  Insights From Purandar Das\",className:\"framer-image\",height:\"341\",src:\"https://framerusercontent.com/images/TzgnSk6acI6mnTvzrB9EUdTnK5Q.png\",srcSet:\"https://framerusercontent.com/images/TzgnSk6acI6mnTvzrB9EUdTnK5Q.png?scale-down-to=512 512w,https://framerusercontent.com/images/TzgnSk6acI6mnTvzrB9EUdTnK5Q.png 1024w\",style:{aspectRatio:\"1024 / 683\"},width:\"512\"}),/*#__PURE__*/e(\"h3\",{children:\"How have cyberattacks evolved in the past 12 months?\"}),/*#__PURE__*/e(\"p\",{children:\"Cyber-attacks have both stayed constant and evolved simultaneously. The traditional style attacks of attacking perimeter weaknesses, software bugs, unpatched servers and phishing attacks have continued. However, these vectors are now also being used as a staging platform for far more sophisticated attacks.\"}),/*#__PURE__*/e(\"p\",{children:\"Cyber-attacks have evolved along multiple dimensions. They have increased in volume as well as complexity and sophistication. The interesting thing about the evolution is that only one of the attack vectors is a new one, while the rest of them are either enhancements or combinations of existing attack vectors. The other point on note is that the new attacks have not slowed down the old attack vectors. Ransomware has evolved into a long play both in its sophistication and the ability to monitor traffic patterns while exfiltrating data. The data as well the systems are being held hostage. Ransomware has also evolved from the old social engineering approach to piggy backing on legal third-party software deployment mechanisms and vulnerabilities. Automation and sophistication both in the attack methods as skills are now the hallmarks of cyber-attacks. \"}),/*#__PURE__*/e(\"p\",{children:\"The combination attacks are having the effect of overcoming security mechanisms as one weakness is being used to mount more sophisticated and widespread attacks. Using third party software vulnerabilities to monitor email or to deliver malicious payloads is a recent development.\"}),/*#__PURE__*/e(\"h3\",{children:\"What lessons can be learned from the biggest cyber-attacks in recent history?\"}),/*#__PURE__*/e(\"p\",{children:\"Some of the areas that are being highlighted relate to a legacy mindset in security defensive postures. The traditional approach of network & perimeter security coupled with at rest data protection is being exposed. Another weakness that is being exposed is the traditional focus on internal systems and leaving third party platform and software security to the providers and vendors. Yet another area that is being exposed is the lack of security skills and knowledge of cloud security. Traditional approaches of migrating on premise security systems to the cloud is being exposed as inadequate. Every area of integration and collaboration involving data and applications are being exposed as points of weakness.\"}),/*#__PURE__*/e(\"p\",{children:\"The lessons that are evident are the obvious ones. \"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Security is not a static practice. It has to constantly evolve to keep ahead of emerging threats. \"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Data protection techniques and practices are lagging\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"The attackers are bringing to bear highly skilled talent that is exposing the limitations and skills of enterprise security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Assuming that you will suffer an intrusion and planning for to defend an organization post intrusion is key\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"What will cyber-attacks look like in the future? \"}),/*#__PURE__*/e(\"p\",{children:\"While it is hard to accurately predict what attacks will look like in the future some trends are obvious. In addition, traditional assumptions around security no longer hold true. Starting with the basic assumptions that will no longer hold true.\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"On premise security approaches dont travel well, whether it is the cloud or other provider platforms.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Assuming a service, platform or application provider can and will protect your data will no longer hold true.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"You are secure if you have a strong policy for patching. You cant control third party software, nor can you trust them.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Patchwork of security products that dont talk to each other will work.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Data protected at rest is sufficient.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Underinvesting in security will be ok.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Some areas that will continue to evolve as it relates to cyber-attacks:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Consolidation of resources for mounting attacks will continue.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Sophistication of skill sets, on the part of the criminals and specialization skills, as well as technology and skills for hire will evolve.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Consolidation of attack vectors and mechanisms will continue\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Weaknesses in defense posture as well vulnerabilities along every step of the information journey will be exploited and exposed.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"A very profitable economy related to theft of data and IP has evolved and will continue to grow and attract more criminals.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Legacy software weaknesses will continue to be exposed for many years.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"What are three pieces of advice for organizations looking to get ahead of the cyber attacks of the future? \"}),/*#__PURE__*/e(\"p\",{children:\"Needleless to say this is a time of reckoning for most organizations. As evidenced by recent developments the federal government along with some of the largest private technology companies have committed to investing billions of dollars in improving cyber security. Motivations range from existential threats to severely impacted earning abilities. Regardless of the motivation, the underlying message is clear: Cyber threats have grown in scale to a point where they are threatening the very existence of a countrys security & economy.\"}),/*#__PURE__*/e(\"p\",{children:\"Getting ahead of this threat(s) will require basic reassessment towards how this is addresses:\"}),/*#__PURE__*/t(\"ol\",{style:{\"--framer-font-size\":\"16px\",\"--framer-text-alignment\":\"start\",\"--framer-text-color\":\"rgb(21, 22, 25)\",\"--framer-text-stroke-width\":\"0px\",\"--framer-text-transform\":\"none\",\"--list-style-type\":\"none\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Reassess security postures and mindsets.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"A pragmatic and holistic view of todays security.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Siloed, fragmented approaches will not work.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Trusting of third-party software and platforms will not work.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Emphasizing process and process alone will not work.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Reassessing security with a critical eye towards action and constant improvement has to be a key part of security.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Allocation of resources and budgets towards cyber security. This is critical. Every decision made to save money will have an adverse impact.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Owing security, meaning not relying on other parties to keep your information secure.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Acknowledgement of limitations in todays legacy deployment and limited investment in security.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"18px\",\"--framer-line-height\":\"27px\"},children:/*#__PURE__*/e(\"p\",{children:\"Constant review of security approach and policies.\"})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAAmEE,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,2DAAwEA,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,2DAA2D,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,qKAAqK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6gBAA6gB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qaAAqa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8zBAA8zB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8aAA8a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uVAAuV,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,6TAA0UA,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,iEAAiE,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,qKAAqK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2hCAA2hC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4VAA4V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sdAAsd,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8aAA8a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kTAAkT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wUAAwU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+PAA+P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kJAAkJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,wKAAwK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,2IAA2I,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,qMAAqM,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qDAAkEE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAE,+CAA+C,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,0DAA0D,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,uKAAuK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uVAAuV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,iQAAiQ,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sUAAsU,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,kbAAkb,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,sWAAsW,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2YAA2Y,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iUAAiU,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,8nBAA8nB,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2oBAA2oB,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sDAAmEE,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,uDAAoEA,EAAEC,EAAE,CAAC,KAAK,4BAA4B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,0DAA0D,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,uKAAuK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0oBAA0oB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ojBAAojB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,43BAA43B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gYAAgY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0aAA0a,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qaAAqa,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,ySAAsTA,EAAEC,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,0DAA0D,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,uKAAuK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,w+BAAw+B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gFAAgF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ojCAAojC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,28BAA28B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iuCAAiuC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,2IAA2I,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,iKAAiK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,oIAAoI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,8LAA8L,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,4UAAyVA,EAAEC,EAAE,CAAC,KAAK,+BAA+B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,2DAA2D,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,yKAAyK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qPAAkQE,EAAEC,EAAE,CAAC,KAAK,2MAA2M,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,mEAAgFF,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,0BAA0B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qLAAkME,EAAEC,EAAE,CAAC,KAAK,2DAA2D,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,gPAA6PF,EAAEC,EAAE,CAAC,KAAK,yEAAyE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAE,uDAAoEF,EAAE,KAAK,CAAC,SAAS,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2LAAwME,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAE,yMAAsNA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,oTAAoT,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2GAAwHE,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAE,uWAAoXA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAE,+LAA+L,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iFAAiF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,SAAsBA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAE,OAAoBA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAE,IAAI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,iBAA8BE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,mBAAgCA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAE,2IAAwJA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAE,iRAAiR,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,8GAA2HE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,iQAAiQ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,oIAAoI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,uHAAuH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ueAAue,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,oBAAoB,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,sEAAmFE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,8EAA2FE,EAAEC,EAAE,CAAC,KAAK,kGAAkG,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,4WAA4W,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gEAAgE,CAAC,EAAE,8gCAA8gC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,oWAAoW,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,6FAA0GA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4EAAyFA,EAAE,KAAK,CAAC,SAAS,gEAAgE,CAAC,EAAE,IAAiBA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,8IAA8I,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,oKAAoK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,uIAAuI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,iMAAiM,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sFAAmGE,EAAEC,EAAE,CAAC,KAAK,0BAA0B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,yDAAyD,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,uKAAuK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4mBAA4mB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,muBAAmuB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2hBAA2hB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,wFAAwF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sFAAmGE,EAAEC,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,wDAAwD,UAAU,eAAe,OAAO,MAAM,IAAI,qEAAqE,OAAO,qKAAqK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oZAAoZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,keAAke,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gJAAgJ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sIAAsI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,4TAAyUA,EAAEC,EAAE,CAAC,KAAK,+BAA+B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,yKAAyK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAsBA,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,6kBAA6kB,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yFAAyF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAsBA,EAAE,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,8yBAA8yB,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ugBAAugB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,q1BAAq1B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,kJAAkJ,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,kLAAkL,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,yFAAyF,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,2IAA2I,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,qMAAqM,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,uTAAoUA,EAAEC,EAAE,CAAC,KAAK,+BAA+B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,EAAE,+CAA4DF,EAAEC,EAAE,CAAC,KAAK,2BAA2B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,GAAG,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,yKAAyK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8jCAA8jC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gFAAgF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,67BAA08BE,EAAEC,EAAE,CAAC,KAAK,wEAAwE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2vBAA2vB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4GAA4G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,+CAA4DE,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAE,iCAAiC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAEC,EAAE,CAAC,KAAK,yIAAyI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,gKAAgK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,mIAAmI,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeF,EAAEC,EAAE,CAAC,KAAK,6LAA6L,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,4GAA4G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,wFAAqGE,EAAEC,EAAE,CAAC,KAAK,uBAAuB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,yDAAyD,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,yKAAyK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8nBAA8nB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,gFAAgF,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,guBAAguB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mcAAmc,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sCAAsC,CAAC,EAAE,+QAA+Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mWAAmW,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,odAAod,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yCAAyC,CAAC,EAAE,kZAAkZ,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,2bAA2b,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gFAA6FE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,2DAA2D,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,yKAAyK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,yDAAsEE,EAAEC,EAAE,CAAC,KAAK,0EAA0E,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAE,mJAAmJ,CAAC,CAAC,EAAeJ,EAAE,IAAI,CAAC,SAAS,CAAC,kKAA+KE,EAAEC,EAAE,CAAC,KAAK,kKAAkK,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAE,+IAA+I,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gVAAgV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gFAAgF,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAEC,EAAE,CAAC,KAAK,8GAA8G,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAE,QAAqBF,EAAEC,EAAE,CAAC,KAAK,uFAAuF,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAE,2QAA2Q,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,wVAAwV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6PAA6P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,iHAA8HE,EAAEC,EAAE,CAAC,KAAK,gEAAgE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,EAAE,4BAA4B,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAsBA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,oFAAiGE,EAAEC,EAAE,CAAC,KAAK,yBAAyB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,yDAAyD,UAAU,eAAe,OAAO,MAAM,IAAI,oEAAoE,OAAO,mKAAmK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oTAAoT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gFAAgF,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8SAA8S,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6iBAA6iB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yGAAyG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8EAA8E,CAAC,EAAE,sHAAsH,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,8uBAA8uB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,iIAAiI,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gBAA6BE,EAAE,KAAK,CAAC,SAAS,sTAAsT,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,qQAAkRA,EAAE,SAAS,CAAC,SAAS,GAAG,CAAC,EAAE,0CAAuDA,EAAEC,EAAE,CAAC,KAAK,kCAAkC,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,wDAAwD,UAAU,eAAe,OAAO,MAAM,IAAI,sEAAsE,OAAO,uKAAuK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2fAA2f,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oRAAoR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,0GAAuHE,EAAEC,EAAE,CAAC,KAAK,wBAAwB,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,snBAAsnB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sYAAsY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8lBAA8lB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mzBAAmzB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qjBAAqjB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6TAA6T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8GAA8G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4lBAA4lB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,wCAAqDE,EAAEC,EAAE,CAAC,KAAK,oDAAoD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAsBF,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,iNAAiN,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,gHAA6HE,EAAEC,EAAE,CAAC,KAAK,8BAA8B,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,UAAU,CAAC,EAAE,QAAQ,oBAAoB,aAAa,GAAG,SAAsBD,EAAEE,EAAE,EAAE,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,MAAM,CAAC,IAAI,0DAA0D,UAAU,eAAe,OAAO,MAAM,IAAI,uEAAuE,OAAO,yKAAyK,MAAM,CAAC,YAAY,YAAY,EAAE,MAAM,KAAK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qTAAqT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,81BAA81B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+EAA+E,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2sBAA2sB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,yHAAyH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6GAA6G,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0hBAA0hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,qBAAqB,OAAO,0BAA0B,QAAQ,sBAAsB,kBAAkB,6BAA6B,MAAM,0BAA0B,OAAO,oBAAoB,MAAM,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,0CAA0C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+DAA+D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,uFAAuF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,uBAAuB,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EACjilHkB,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "Link", "motion", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "__FramerMetadata__"]
}
