{"id":1295,"date":"2026-04-01T08:47:01","date_gmt":"2026-04-01T07:47:01","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=1295"},"modified":"2026-04-16T14:56:14","modified_gmt":"2026-04-16T13:56:14","slug":"200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/","title":{"rendered":"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">For 200 consecutive weeks, we have published <em><a href=\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\">ThreatInsights<\/a><\/em>, our weekly, European\u2011focused newsletter sharing real\u2011world cybersecurity threats, how they work, and what defenders need to pay attention to.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Reaching 200 editions is not just a numerical milestone. It represents four years of continuous threat monitoring, analysis, and knowledge sharing with security professionals across industries. To mark the occasion, we searched the archive and identified the five most\u2011read articles featured in <em>ThreatInsights<\/em>.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Together, they provide a telling snapshot of the security concerns that matter most to our readers \u2013 and of the threat landscape organisations are navigating today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-five-most-read-threatinsights-articles\">The five most\u2011read ThreatInsights articles<\/h2>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-200-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading background-graphics--none spacing-before--0 has-heading-s-font-size\" id=\"h-1-diving-deep-how-to-detect-typosquatting\">1. Diving deep: how to detect typosquatting<\/h3>\n\n\n\n<p class=\" background-graphics--none wp-block-paragraph\">Typosquatting is a deceptively simple technique that continues to be highly effective. This article explores how threat actors register look\u2011alike domain names to impersonate legitimate organisations, distribute malware, or harvest credentials \u2013 and how defenders can proactively identify these domains before they are abused.<\/p>\n\n\n\n<p class=\" background-graphics--none spacing-after--7 wp-block-paragraph\">Its popularity highlights strong interest in early\u2011stage threat detection and in defending against attacks that often bypass traditional security controls by exploiting user trust rather than technical vulnerabilities.<\/p>\n\n\n\n<div class=\"wp-block-buttons  background-graphics--none is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-icon button-size--default\"><a class=\"wp-block-button__link has-white-color has-brand-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/conscia.com\/blog\/diving-deep-how-to-detect-typosquatting\/\">Read how to detect typosquatting and malicious look\u2011alike domains<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group  background-graphics--none is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading wp-block-paragraph spacing-before--0 has-heading-s-font-size\" id=\"h-2-diving-deep-malware-injection-techniques\">2. Diving deep: malware injection techniques<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Malware injection techniques are fundamental to how modern malware evades detection. This article explains why signature\u2011based security struggles against today\u2019s threats and how attackers abuse legitimate processes to execute malicious code.<\/p>\n\n\n\n<p class=\" spacing-after--7 wp-block-paragraph\">It offers technical insight into attacker tradecraft, going beyond what malware does to explain how it achieves execution and persistence in increasingly hostile defensive environments.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-icon button-size--default\"><a class=\"wp-block-button__link has-white-color has-brand-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/conscia.com\/blog\/diving-deep-malware-injection-techniques-part-1\/\">Explore common malware injection techniques and attacker tradecraft<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-200-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading wp-block-paragraph spacing-before--0 has-heading-s-font-size\" id=\"h-3-vulnerability-spotlight-how-to-detect-follina-windows-msdt-zero-day\">3. Vulnerability spotlight: how to detect Follina (Windows MSDT zero\u2011day)<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">When the Follina vulnerability (CVE\u20112022\u201130190) emerged, it quickly became an actively exploited zero\u2011day. This article focuses on the mechanics of the vulnerability and, crucially, how exploitation can be detected across different delivery methods \u2014 not just a single attack scenario.<\/p>\n\n\n\n<p class=\" spacing-after--7 wp-block-paragraph\">It provided actionable detection guidance at a time when immediate patching or mitigation was not always feasible.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button  button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/blog\/vulnerability-spotlight-how-to-detect-follina-the-windows-msdt-0-day\/\">Learn how to detect exploitation of the Follina Windows MSDT zero\u2011day<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group  background-graphics--none is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading wp-block-paragraph has-heading-s-font-size\" id=\"h-4-digital-forensics-discovering-threat-actors-traces-using-the-recycle-bin\">4. Digital forensics: discovering threat actors\u2019 traces using the Recycle Bin<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">This article demonstrates how seemingly mundane artefacts \u2013 such as the Windows Recycle Bin \u2013&nbsp;can provide valuable forensic evidence during incident response. It shows how attackers often unintentionally leave traces and how these can help reconstruct attacker activity.<\/p>\n\n\n\n<p class=\" spacing-after--7 wp-block-paragraph\">What resonates is the emphasis on forensic visibility and investigation \u2013 understanding what happened after access was gained, and how small details can make a critical difference.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button  button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/blog\/digital-forensics-discovering-threat-actors-traces-using-recycle-bin\/\">See how Windows Recycle Bin artefacts support digital forensics<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-200-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading wp-block-paragraph spacing-before--0 has-heading-s-font-size\" id=\"h-5-the-openclaw-security-crisis\">5. The OpenClaw security crisis<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">This article examines a large\u2011scale security issue rooted in exposed management interfaces and poor security hygiene, illustrating how systemic weaknesses can create widespread risk. Rather than focusing on a single vulnerability, it highlights how misconfigurations and exposure can be exploited at scale.<\/p>\n\n\n\n<p class=\" spacing-after--5 wp-block-paragraph\">It reflects growing concern about structural and operational security risks, where the issue is not a missing patch, but how systems are designed, exposed, and managed.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button  button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/blog\/the-openclaw-security-crisis\/\">Understand the OpenClaw security crisis and large\u2011scale exposure risks<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-threatinsights-readers-enjoy\">What ThreatInsights readers enjoy<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Our readers engage most with articles that go beyond headlines. From typosquatting to zero-day vulnerabilities and digital forensics, the most popular pieces reveal common patterns in what resonates with them. The following highlights the themes our readers value most.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>How attacks actually work<\/strong><br>All top five articles explain attacker techniques, execution paths, and artefacts, showing interest in understanding adversary behaviour \u2013 not just consuming alerts.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>Detection and visibility over prevention alone<\/strong><br>Whether detecting malicious domains, zero-day exploits, malware execution, or forensic traces, visibility is key. The top articles reflect a reality most security teams recognise: prevention alone is not enough.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>Concern about systemic and repeatable risk<\/strong><br>Rather than one-off exploits, readers focus on issues that scale \u2013 phishing infrastructure, malware techniques, misconfigurations, and exposed services affecting many organisations.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Together, they show a threat landscape where attacks are persistent, technically mature, and often enabled by visibility gaps rather than exotic exploits.<\/p>\n\n\n\n<section id=\"block_acf-block-69ccce19333c7\" class=\"yell  yell--size-small has-green-pale-background-color\">\n\t<div class=\"yell__inner\">\n\t\t\n\n<h3 class=\"wp-block-heading\" id=\"h-what-is-threatinsights\">What is ThreatInsights?<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>ThreatInsights<\/strong> is Conscia\u2019s weekly cybersecurity newsletter, delivering concise, technically grounded analysis of emerging threats, vulnerabilities, and real-world incidents, with a special focus on Europe.<br><br>Each edition is designed to help security leaders and practitioners stay informed about how attacks unfold in practice, what to look for from a detection and response perspective, and how the threat landscape is evolving \u2014 without hype or speculation.<\/p>\n\n\n\n<p class=\" spacing-after--6 wp-block-paragraph\">Two hundred weeks on, the mission remains unchanged: to provide clarity, context, and practical insight in a constantly shifting security environment.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-accent button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/ie\/conscia-threatinsights\/\">Subscribe here now<\/a><\/div>\n<\/div>\n\n\n\t<\/div>\n<\/section>\n\n\n<p class=\" wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-1295","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape - Conscia Ireland<\/title>\n<meta name=\"description\" content=\"For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape\" \/>\n<meta property=\"og:description\" content=\"For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-01T07:47:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T13:56:14+00:00\" \/>\n<meta name=\"author\" content=\"Matjaz Jausovec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matjaz Jausovec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/\"},\"author\":{\"name\":\"Matjaz Jausovec\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/292aa3e8e384381360fde9aab83d9e54\"},\"headline\":\"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape\",\"datePublished\":\"2026-04-01T07:47:01+00:00\",\"dateModified\":\"2026-04-16T13:56:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/\",\"url\":\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/\",\"name\":\"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"datePublished\":\"2026-04-01T07:47:01+00:00\",\"dateModified\":\"2026-04-16T13:56:14+00:00\",\"description\":\"For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/292aa3e8e384381360fde9aab83d9e54\",\"name\":\"Matjaz Jausovec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9f56943dbd3362d0c71c2b83409ef15e387461e7ce428c696b352e843b0abca8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9f56943dbd3362d0c71c2b83409ef15e387461e7ce428c696b352e843b0abca8?s=96&d=mm&r=g\",\"caption\":\"Matjaz Jausovec\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mjausovecnil-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape - Conscia Ireland","description":"For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/","og_locale":"en_US","og_type":"article","og_title":"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape","og_description":"For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.","og_url":"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/","og_site_name":"Conscia Ireland","article_published_time":"2026-04-01T07:47:01+00:00","article_modified_time":"2026-04-16T13:56:14+00:00","author":"Matjaz Jausovec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matjaz Jausovec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/"},"author":{"name":"Matjaz Jausovec","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/292aa3e8e384381360fde9aab83d9e54"},"headline":"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape","datePublished":"2026-04-01T07:47:01+00:00","dateModified":"2026-04-16T13:56:14+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/"},"wordCount":765,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/200-weeks-of-threatinsights-what-our-most%e2%80%91read-articles-tell-us-about-todays-threat-landscape\/","url":"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/","name":"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"datePublished":"2026-04-01T07:47:01+00:00","dateModified":"2026-04-16T13:56:14+00:00","description":"For 200 consecutive weeks, Threat Insights has analysed real\u2011world cyber threats facing European organisations. To mark the milestone, we revisited the archive to identify the five most\u2011read articles \u2014 revealing the attack techniques, risks, and visibility gaps security teams care about most.","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/200-weeks-of-threat-insights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"200 weeks of ThreatInsights: what our most\u2011read articles tell us about today\u2019s threat landscape"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/292aa3e8e384381360fde9aab83d9e54","name":"Matjaz Jausovec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9f56943dbd3362d0c71c2b83409ef15e387461e7ce428c696b352e843b0abca8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f56943dbd3362d0c71c2b83409ef15e387461e7ce428c696b352e843b0abca8?s=96&d=mm&r=g","caption":"Matjaz Jausovec"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mjausovecnil-com\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=1295"}],"version-history":[{"count":7,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1295\/revisions"}],"predecessor-version":[{"id":1311,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1295\/revisions\/1311"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=1295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=1295"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=1295"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=1295"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=1295"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=1295"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=1295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}