{"id":2277,"date":"2024-06-22T11:49:21","date_gmt":"2024-06-22T03:49:21","guid":{"rendered":"https:\/\/xenstar.xyz\/?p=2277"},"modified":"2024-06-22T11:49:21","modified_gmt":"2024-06-22T03:49:21","slug":"how-you-get-hacked-what-attackers-use-today","status":"publish","type":"post","link":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/","title":{"rendered":"How you get Hacked: what attackers use today"},"content":{"rendered":"

Think you’re safe from hackers? Think again. Modern attacks use social media, phishing, and even your own phone to bypass your defences.<\/strong> Watch to discover how hackers target you and learn to protect yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"

Think you’re safe from hackers? Think again. Modern attacks use social media, phishing, and even your own phone to bypass your defences. Watch to discover how hackers target you and learn to protect yourself.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[97],"tags":[],"yoast_head":"\nHow you get Hacked: what attackers use today - Xenstar Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How you get Hacked: what attackers use today\" \/>\n<meta property=\"og:description\" content=\"Think you’re safe from hackers? Think again. Modern attacks use social media, phishing, and even your own phone to bypass your defences. Watch to discover how hackers target you and learn to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\" \/>\n<meta property=\"og:site_name\" content=\"Xenstar Network\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-22T03:49:21+00:00\" \/>\n<meta name=\"author\" content=\"xenstar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"xenstar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\"},\"author\":{\"name\":\"xenstar\",\"@id\":\"https:\/\/xenstar.xyz\/#\/schema\/person\/5f0b20fc6eec882029fdbcada7a3c35f\"},\"headline\":\"How you get Hacked: what attackers use today\",\"datePublished\":\"2024-06-22T03:49:21+00:00\",\"dateModified\":\"2024-06-22T03:49:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\"},\"wordCount\":42,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xenstar.xyz\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\",\"url\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\",\"name\":\"How you get Hacked: what attackers use today - Xenstar Network\",\"isPartOf\":{\"@id\":\"https:\/\/xenstar.xyz\/#website\"},\"datePublished\":\"2024-06-22T03:49:21+00:00\",\"dateModified\":\"2024-06-22T03:49:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xenstar.xyz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How you get Hacked: what attackers use today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xenstar.xyz\/#website\",\"url\":\"https:\/\/xenstar.xyz\/\",\"name\":\"Xenstar Network\",\"description\":\"Technology | Privacy | Security\",\"publisher\":{\"@id\":\"https:\/\/xenstar.xyz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xenstar.xyz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xenstar.xyz\/#organization\",\"name\":\"Xenstar Network\",\"url\":\"https:\/\/xenstar.xyz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xenstar.xyz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xenstar.xyz\/wp-content\/uploads\/2021\/06\/Logo-2.png\",\"contentUrl\":\"https:\/\/xenstar.xyz\/wp-content\/uploads\/2021\/06\/Logo-2.png\",\"width\":960,\"height\":960,\"caption\":\"Xenstar Network\"},\"image\":{\"@id\":\"https:\/\/xenstar.xyz\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/xenstar.xyz\/#\/schema\/person\/5f0b20fc6eec882029fdbcada7a3c35f\",\"name\":\"xenstar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xenstar.xyz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/16cc0644a5c657a5787aaf0cfe25a7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/16cc0644a5c657a5787aaf0cfe25a7fe?s=96&d=mm&r=g\",\"caption\":\"xenstar\"},\"sameAs\":[\"https:\/\/xenstar.xyz\"],\"url\":\"https:\/\/xenstar.xyz\/author\/tanvir-imroz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How you get Hacked: what attackers use today - Xenstar Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/","og_locale":"en_US","og_type":"article","og_title":"How you get Hacked: what attackers use today","og_description":"Think you’re safe from hackers? Think again. Modern attacks use social media, phishing, and even your own phone to bypass your defences. Watch to discover how hackers target you and learn to protect yourself.","og_url":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/","og_site_name":"Xenstar Network","article_published_time":"2024-06-22T03:49:21+00:00","author":"xenstar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"xenstar","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#article","isPartOf":{"@id":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/"},"author":{"name":"xenstar","@id":"https:\/\/xenstar.xyz\/#\/schema\/person\/5f0b20fc6eec882029fdbcada7a3c35f"},"headline":"How you get Hacked: what attackers use today","datePublished":"2024-06-22T03:49:21+00:00","dateModified":"2024-06-22T03:49:21+00:00","mainEntityOfPage":{"@id":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/"},"wordCount":42,"commentCount":0,"publisher":{"@id":"https:\/\/xenstar.xyz\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/","url":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/","name":"How you get Hacked: what attackers use today - Xenstar Network","isPartOf":{"@id":"https:\/\/xenstar.xyz\/#website"},"datePublished":"2024-06-22T03:49:21+00:00","dateModified":"2024-06-22T03:49:21+00:00","breadcrumb":{"@id":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xenstar.xyz\/how-you-get-hacked-what-attackers-use-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xenstar.xyz\/"},{"@type":"ListItem","position":2,"name":"How you get Hacked: what attackers use today"}]},{"@type":"WebSite","@id":"https:\/\/xenstar.xyz\/#website","url":"https:\/\/xenstar.xyz\/","name":"Xenstar Network","description":"Technology | Privacy | Security","publisher":{"@id":"https:\/\/xenstar.xyz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xenstar.xyz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xenstar.xyz\/#organization","name":"Xenstar Network","url":"https:\/\/xenstar.xyz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xenstar.xyz\/#\/schema\/logo\/image\/","url":"https:\/\/xenstar.xyz\/wp-content\/uploads\/2021\/06\/Logo-2.png","contentUrl":"https:\/\/xenstar.xyz\/wp-content\/uploads\/2021\/06\/Logo-2.png","width":960,"height":960,"caption":"Xenstar Network"},"image":{"@id":"https:\/\/xenstar.xyz\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/xenstar.xyz\/#\/schema\/person\/5f0b20fc6eec882029fdbcada7a3c35f","name":"xenstar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xenstar.xyz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/16cc0644a5c657a5787aaf0cfe25a7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/16cc0644a5c657a5787aaf0cfe25a7fe?s=96&d=mm&r=g","caption":"xenstar"},"sameAs":["https:\/\/xenstar.xyz"],"url":"https:\/\/xenstar.xyz\/author\/tanvir-imroz\/"}]}},"_links":{"self":[{"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/posts\/2277"}],"collection":[{"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/comments?post=2277"}],"version-history":[{"count":1,"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/posts\/2277\/revisions"}],"predecessor-version":[{"id":2279,"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/posts\/2277\/revisions\/2279"}],"wp:attachment":[{"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/media?parent=2277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/categories?post=2277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xenstar.xyz\/wp-json\/wp\/v2\/tags?post=2277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}