{"id":174257374,"date":"2022-06-23T10:00:13","date_gmt":"2022-06-23T14:00:13","guid":{"rendered":"https:\/\/www.citrix.com\/blogs\/?p=174257374"},"modified":"2023-10-11T03:15:05","modified_gmt":"2023-10-11T03:15:05","slug":"netscaler-research-highlights-common-threats-across-industry-verticals","status":"publish","type":"post","link":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/","title":{"rendered":"NetScaler research highlights common threats across industry verticals"},"content":{"rendered":"<p>Unlike network firewalls, which operate at layer 3 and layer 4 of the network stack, web application firewalls sit in front of the applications and operate at the application layer (L7). Their job is to monitor HTTP\/S traffic to identify requests and responses that break protocol rules or application-specific policies, then filter or block that traffic and secure the application.<\/p>\n<p>Recent research by the NetScaler Cyberthreat Research Initiative team used attack metadata from NetScaler ADCs deployed in enterprise networks to generate insights into the application risks that customers were exposed to. The team\u2019s findings were consistent across most industry verticals and aligned with the threats highlighted in the OWASP Top 10.<\/p>\n<p>In this blog post, we\u2019ll share findings that highlight how pervasive these threats are across a range of industry verticals, from DDoS attacks against critical resources due to buffer overrun to the possibility of installing malware because of inconsistent cookie checks in applications.<\/p>\n<h2>The top 5 most prevalent application attacks<\/h2>\n<p>NetScaler used NetScaler Web App Firewall analytics to identify the top five attack types seen in customer environments. In conducting our research, we collected and de-identified data from a global customer base across a range of industry verticals during a one-year period (April 2021 to April 2022). The five most common application attack types detected by NetScaler Web App Firewall in customer environments during this period were:<\/p>\n<ol>\n<li>Direct request (forced browsing)<\/li>\n<li>Cross-site scripting<\/li>\n<li>SQL injection<\/li>\n<li>Buffer overflow<\/li>\n<li>Cookie consistency<\/li>\n<\/ol>\n<figure id=\"attachment_174257376\" aria-describedby=\"caption-attachment-174257376\" style=\"width: 797px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-174257376 size-full\" src=\"https:\/\/www.citrix.com\/blogs\/wp-content\/uploads\/2022\/06\/web-app-security-1.png\" alt=\"\" width=\"797\" height=\"423\" \/><figcaption id=\"caption-attachment-174257376\" class=\"wp-caption-text\">Figure 1. Percentage of customers who experienced each attack type<\/figcaption><\/figure>\n<p>Let\u2019s look at the basics of each attack type. In many scenarios, a web application firewall with the right policy sets configured and deployed in front of the application can help organizations detect and mitigate these attacks.<\/p>\n<p><strong><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/425.html\" target=\"_blank\" rel=\"noopener noreferrer\">Direct request (forced browsing) &#8211; CWE-425<\/a>:<\/strong> With direct request attacks, it\u2019s possible to bypass application authentication and authorization and breach or change corporate resources. If not mitigated, a direct request attack can have implications on the confidentiality and integrity of an organization\u2019s data.<\/p>\n<p><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/79.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cross-site scripting &#8211; CWE-79<\/a>: Unauthorized scripts injected into a response and executed on a user&#8217;s browser can have consequences including:<\/p>\n<ul>\n<li>Transfer of private information such as cookie session information from the victim to the attacker<\/li>\n<li>Enable the attacker to send malicious content to an application<\/li>\n<li>Takeover of the victim&#8217;s device<\/li>\n<\/ul>\n<p>Cross-site scripting attacks pose significant security risks for a business, and web application firewalls should be enabled to protect against this attack type by default.<\/p>\n<p><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/89.html\" target=\"_blank\" rel=\"noopener noreferrer\">SQL injection &#8211; CWE-89<\/a>: Exploiting SQL injection flaws allows attackers to change the parameters of SQL commands and gain unauthorized access to data. The growth of database-driven web applications makes this a popular attack type because the vulnerability is easy to detect and exploit and the rewards can be high. Because SQL injection attacks make a direct assault on the valuable data held behind an application, the implications of a SQL injection attack can be serious. Businesses should use a web application firewall that checks SQL grammar to mitigate the attack and reduce false positive ratios.<\/p>\n<p><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/119.html\" target=\"_blank\" rel=\"noopener noreferrer\">Buffer overflow &#8211; CWE-119<\/a>: A buffer overflow attack takes advantage of errors in software that enable attackers to execute code that alters the intended flow of an application. Businesses must mitigate this type of attack because it causes unpredictability and instability in application performance and is often used to orchestrate a DDoS attack against resources \u2014 or even expose sensitive information.<\/p>\n<p><a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/565.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cookie consistency &#8211; CWE-565<\/a>: When applications don\u2019t carry out validation and integrity checks for cookies, attackers can easily bypass authentication and launch unauthorized actions against the application. This can lead to input data being modified or can serve as a springboard for other attacks like cross-site scripting and SQL injection, seriously damaging a business&#8217;s data integrity and creating data breaches. Exploiting cookies is also a popular way to install ransomware. Ensuring cookie consistency is a basic protection of a web application firewall and should always be enabled.<\/p>\n<h2>Attack prevalence consistent across industry verticals<\/h2>\n<p>We also analyzed customers by industry vertical to identify any statistically significant patterns in attack type.<\/p>\n<figure id=\"attachment_174257377\" aria-describedby=\"caption-attachment-174257377\" style=\"width: 831px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-174257377 size-full\" src=\"https:\/\/www.citrix.com\/blogs\/wp-content\/uploads\/2022\/06\/web-app-security-2.png\" alt=\"\" width=\"831\" height=\"518\" \/><figcaption id=\"caption-attachment-174257377\" class=\"wp-caption-text\">Figure 2<\/figcaption><\/figure>\n<p>Figure 2 shows a breakdown of the customer base by industry vertical. Please note that his analysis does not reflect the total volume of attacks, but rather the percentage of customer environments in which each attack was seen.<\/p>\n<p>Our analysis found a remarkable consistency in the types of attacks across verticals, with only minor variations. Here is the breakdown by percentage of the attack types most frequently experienced by organizations within specific verticals:<\/p>\n<hr \/>\n<p><strong>Finance<\/strong><br \/>\nDirect request: 69 percent<br \/>\nCross-site scripting: 68 percent<br \/>\nSQL injection: 65 percent<br \/>\nBuffer overflow: 58 percent<br \/>\nCookie consistency: 48 percent<\/p>\n<p><strong>Technology<\/strong><br \/>\nDirect request: 65 percent<br \/>\nSQL injection: 59 percent<br \/>\nCross-site scripting: 56 percent<br \/>\nBuffer overflow: 47 percent<br \/>\nField consistency: 43 percent<\/p>\n<p><strong>Business services<\/strong><br \/>\nDirect request: 65 percent<br \/>\nCross-site scripting: 64 percent<br \/>\nSQL injection: 61 percent<br \/>\nBuffer overflow: 42 percent<br \/>\nCookie consistency: 42 percent<\/p>\n<p><strong>Healthcare<\/strong><br \/>\nDirect request: 62 percent<br \/>\nCross-site scripting: 56 percent<br \/>\nSQL injection: 52 percent<br \/>\nBuffer overflow: 52 percent<br \/>\nCross-site request forgery: 31 percent<\/p>\n<p><strong>Public sector<\/strong><br \/>\nDirect request: 69 percent<br \/>\nCross-site scripting: 68 percent<br \/>\nSQL injection: 68 percent<br \/>\nBuffer overflow: 60 percent<br \/>\nCookie consistency: 52 percent<\/p>\n<hr \/>\n<p>While there is some variance in the prevalence of the attacks, we did not observe a statistically significant variation in the types of attacks across verticals. From the data, we conclude that:<\/p>\n<ul>\n<li>The five most common attacks are not targeted efforts against a particular industry vertical but likely opportunistic and typify the environment in which organizations operate today<\/li>\n<li>Application architecture complexity and legacy technology at the back-end (such as C\/C++ based applications, which are more prone to buffer overflow attacks) may be a better indicator of an attack surface than an industry vertical<\/li>\n<li>Industry sectors like healthcare that tend to put additional checks (identity, for example) in place tend to experience a slightly lower than average number of attacks<\/li>\n<li>Sectors that have a range of public-facing applications tend to have a slightly higher risk of attack, such as public sector and finance<\/li>\n<\/ul>\n<p>Organizations must take these threats seriously and implement technologies to repel bad actors. The potential impact of one of these attacks can be severe, from loss of revenue and proprietary data to fines and damage to corporate reputation. The prevalence of these attack attempts across industries highlights the importance of having a web application firewall as one of the tools to help mitigate them.<\/p>\n<p>NetScaler Web App Firewall works the same across physical, virtual, bare metal, and containerized form factors to simplify application delivery through operational consistency. Learn more about <a href=\"https:\/\/www.netscaler.com\/platform\/web-application-firewall-waf\">NetScaler Web App Firewall<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unlike network firewalls, which operate at layer 3 and layer 4 of the network stack, web application firewalls sit in front of the applications and operate at the application layer (L7). Their job is to monitor HTTP\/S traffic to identify requests and responses that break protocol rules or application-specific policies, then filter or block that [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":174259377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[8],"tags":[41,90,48],"class_list":{"0":"post-174257374","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-application-security","9":"tag-trends","10":"tag-web-application-firewall","11":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NetScaler research highlights common threats across industry verticals<\/title>\n<meta name=\"description\" content=\"NetScaler research found that the most common types of application attacks are consistent across a range of industry verticals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NetScaler research highlights common threats across industry verticals\" \/>\n<meta property=\"og:description\" content=\"NetScaler research found that the most common types of application attacks are consistent across a range of industry verticals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\" \/>\n<meta property=\"og:site_name\" content=\"NetScaler Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-23T14:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-11T03:15:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1290\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pantelis Theocharakis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:site\" content=\"@NetScaler\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pantelis Theocharakis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\"},\"author\":{\"name\":\"Pantelis Theocharakis\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/d3e4c935091febaf71a675e64bfda470\"},\"headline\":\"NetScaler research highlights common threats across industry verticals\",\"datePublished\":\"2022-06-23T14:00:13+00:00\",\"dateModified\":\"2023-10-11T03:15:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\"},\"wordCount\":1088,\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png\",\"keywords\":[\"Application security\",\"Trends\",\"Web application firewall\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\",\"name\":\"NetScaler research highlights common threats across industry verticals\",\"isPartOf\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png\",\"datePublished\":\"2022-06-23T14:00:13+00:00\",\"dateModified\":\"2023-10-11T03:15:05+00:00\",\"description\":\"NetScaler research found that the most common types of application attacks are consistent across a range of industry verticals.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png\",\"width\":1290,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.netscaler.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NetScaler research highlights common threats across industry verticals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#website\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"name\":\"NetScaler Blog\",\"description\":\"Application delivery and security blog\",\"publisher\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#organization\",\"name\":\"NetScaler Blog\",\"url\":\"https:\/\/www.netscaler.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"contentUrl\":\"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png\",\"width\":2032,\"height\":486,\"caption\":\"NetScaler Blog\"},\"image\":{\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NetScaler\",\"https:\/\/www.linkedin.com\/company\/netscaler\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/d3e4c935091febaf71a675e64bfda470\",\"name\":\"Pantelis Theocharakis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2b12906b46d1be6c7bdcd366a3dccb200c05ffe94af27580726008a0f67e0808?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b12906b46d1be6c7bdcd366a3dccb200c05ffe94af27580726008a0f67e0808?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b12906b46d1be6c7bdcd366a3dccb200c05ffe94af27580726008a0f67e0808?s=96&d=mm&r=g\",\"caption\":\"Pantelis Theocharakis\"},\"url\":\"https:\/\/www.netscaler.com\/blog\/author\/pantelist\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NetScaler research highlights common threats across industry verticals","description":"NetScaler research found that the most common types of application attacks are consistent across a range of industry verticals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/","og_locale":"en_US","og_type":"article","og_title":"NetScaler research highlights common threats across industry verticals","og_description":"NetScaler research found that the most common types of application attacks are consistent across a range of industry verticals.","og_url":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/","og_site_name":"NetScaler Blog","article_published_time":"2022-06-23T14:00:13+00:00","article_modified_time":"2023-10-11T03:15:05+00:00","og_image":[{"width":1290,"height":526,"url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png","type":"image\/png"}],"author":"Pantelis Theocharakis","twitter_card":"summary_large_image","twitter_creator":"@NetScaler","twitter_site":"@NetScaler","twitter_misc":{"Written by":"Pantelis Theocharakis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#article","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/"},"author":{"name":"Pantelis Theocharakis","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/d3e4c935091febaf71a675e64bfda470"},"headline":"NetScaler research highlights common threats across industry verticals","datePublished":"2022-06-23T14:00:13+00:00","dateModified":"2023-10-11T03:15:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/"},"wordCount":1088,"publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png","keywords":["Application security","Trends","Web application firewall"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/","url":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/","name":"NetScaler research highlights common threats across industry verticals","isPartOf":{"@id":"https:\/\/www.netscaler.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png","datePublished":"2022-06-23T14:00:13+00:00","dateModified":"2023-10-11T03:15:05+00:00","description":"NetScaler research found that the most common types of application attacks are consistent across a range of industry verticals.","breadcrumb":{"@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#primaryimage","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1.png","width":1290,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.netscaler.com\/blog\/news\/netscaler-research-highlights-common-threats-across-industry-verticals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netscaler.com\/blog\/"},{"@type":"ListItem","position":2,"name":"NetScaler research highlights common threats across industry verticals"}]},{"@type":"WebSite","@id":"https:\/\/www.netscaler.com\/blog\/#website","url":"https:\/\/www.netscaler.com\/blog\/","name":"NetScaler Blog","description":"Application delivery and security blog","publisher":{"@id":"https:\/\/www.netscaler.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netscaler.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.netscaler.com\/blog\/#organization","name":"NetScaler Blog","url":"https:\/\/www.netscaler.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","contentUrl":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2023\/06\/NetScaler_Logo_2color_Negative.png","width":2032,"height":486,"caption":"NetScaler Blog"},"image":{"@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NetScaler","https:\/\/www.linkedin.com\/company\/netscaler\/"]},{"@type":"Person","@id":"https:\/\/www.netscaler.com\/blog\/#\/schema\/person\/d3e4c935091febaf71a675e64bfda470","name":"Pantelis Theocharakis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2b12906b46d1be6c7bdcd366a3dccb200c05ffe94af27580726008a0f67e0808?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b12906b46d1be6c7bdcd366a3dccb200c05ffe94af27580726008a0f67e0808?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b12906b46d1be6c7bdcd366a3dccb200c05ffe94af27580726008a0f67e0808?s=96&d=mm&r=g","caption":"Pantelis Theocharakis"},"url":"https:\/\/www.netscaler.com\/blog\/author\/pantelist\/"}]}},"featured_image_src":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1-600x400.png","featured_image_src_square":"https:\/\/www.netscaler.com\/blog\/wp-content\/uploads\/2022\/06\/security-priorities-hero-1290x526-1-600x526.png","author_info":{"display_name":"Pantelis Theocharakis","author_link":"https:\/\/www.netscaler.com\/blog\/author\/pantelist\/"},"_links":{"self":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174257374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/comments?post=174257374"}],"version-history":[{"count":0,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/posts\/174257374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media\/174259377"}],"wp:attachment":[{"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/media?parent=174257374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/categories?post=174257374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netscaler.com\/blog\/wp-json\/wp\/v2\/tags?post=174257374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}