{"id":54814,"date":"2025-12-11T14:30:51","date_gmt":"2025-12-11T14:30:51","guid":{"rendered":"https:\/\/www.cyberguru.it\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/"},"modified":"2025-12-19T16:02:00","modified_gmt":"2025-12-19T16:02:00","slug":"when-digital-crime-targets-the-most-vulnerable-the-human-factor","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/","title":{"rendered":"When digital crime targets the most vulnerable: the human factor"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-due-attacchi-cyber-che-rivelano-la-fragilita-delle-nostre-difese-digitali\"><strong>Two cyber attacks that reveal the fragility of our digital defenses<\/strong><\/h2>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>In the increasingly connected world of cybersecurity, the most vulnerable are often the most appealing targets.<\/em> <em>Digital security is only as strong as its weakest link. And that link is almost always human. <\/em><\/p>\n<\/blockquote>\n\n<h3 class=\"wp-block-heading\" id=\"h-il-furto-del-bonus-cultura-500mila-euro-sottratti-ai-diciottenni-e-allo-stato\"><strong>The culture bonus theft: 500,000 euros stolen from eighteen-year-olds and the State<\/strong><\/h3>\n\n<p>Imagine turning eighteen, finally receiving the long-awaited culture bonus \u2013 that little digital treasure of 500 euros meant to open the doors of knowledge \u2013 and discovering that someone stole it before you could even spend it. <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>This is what happened to hundreds of young Italians registered on the <a href=\"https:\/\/cartegiovani.cultura.gov.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">18app<\/a> platform that distributes the bonuses. <strong>A massive scam against the youngsters but, in fact, against the State<\/strong>. <\/p>\n<\/blockquote>\n\n<p>An operation that involved at least fifteen people in different Italian regions, all investigated for conspiracy in computer fraud and aggravated fraud. <strong>The criminals acted with surgical precision, posing as reliable entities like digital identity providers or banks<\/strong>. They cloned the SPID credentials of the newly adults to create parallel SPIDs with which they accessed the platform and cashed in the bonus, which was then spent in <strong>fictitious businesses linked to the same fraudsters.<\/strong> <\/p>\n\n<p>The next step of the scam involved producing fake invoices to request and obtain refunds from the <strong><a href=\"https:\/\/cultura.gov.it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ministry of Culture<\/a><\/strong>, thus turning the vouchers into cash.<\/p>\n\n<p>It was not a random attack, but a targeted operation that exploited the relative digital inexperience of those entering the world of official digital identity for the first time.<\/p>\n\n<p>The <strong>SPID, Public Digital Identity System<\/strong>, should be our secure passkey for online public services. Yet, this breach shows that <strong>even the most robust systems can collapse when the weak link is human<\/strong>: phishing, <em>credential stuffing<\/em>, social engineering; the tools of digital crime are many and constantly evolving. <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-l-innocenza-violata-8-000-volti-di-bambini-nel-dark-web\"><strong>Innocence violated: 8,000 children&#8217;s faces on the dark web<\/strong><\/h3>\n\n<p>If the culture bonus theft affected young adults, the second case takes us to an even more disturbing territory: that of digitally violated childhood. The British educational platform <a href=\"https:\/\/www.famly.co\/\" target=\"_blank\" rel=\"noreferrer noopener\">Famly<\/a>, used by nurseries and kindergartens to share photos and updates with parents, was the scene of a breach that exposed images of about 8,000 children. <\/p>\n\n<p>The <strong>Radiant hacker group claimed the attack<\/strong>, and in a gesture as unusual as it is controversial, later apologized for spreading the children&#8217;s photos on the dark web. <br\/>A digital mea culpa that raises more questions than it resolves: can one really apologize after exposing thousands of children to the risks of the dark web? <br\/>Without taking any concrete action to restore the damage?<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p id=\"h-una-cosa-pero-e-certa-la-dinamica-dell-attacco-rivela-ancora-una-volta-il-tallone-d-achille-della-cybersicurezza-moderna-il-fattore-umano\">One thing is certain: the dynamics of the attack once again reveal the Achilles&#8217; heel of modern cybersecurity: the human factor. <\/p>\n<\/blockquote>\n\n<p>The breach occurred through <strong>the compromise of a single employee&#8217;s password<\/strong>. <strong>It took just one weak credential, the result of poor knowledge, carelessness, or perhaps outright corruption, to bring down the entire digital fortress<\/strong> like a house of cards and open the gates to unscrupulous criminals. <br\/>Moreover, the Famly platform itself was guilty of much negligence by not obscuring the faces of all those children captured. <strong>Two human errors combined to create irreparable damage.<\/strong><br\/>The apologies from the Radiant group sound hollow in the face of the gravity of what happened. Once a child&#8217;s images end up on the dark web, there is no combination of keys or rewind that can erase that breach. <\/p>\n\n<p>Similarly, the young Italians robbed of their culture bonus lost not only money and the opportunity to acquire new tools of knowledge but also a bit of trust in the digital system that should protect them.<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-il-fattore-umano-la-falla-piu-importante-da-colmare\"><strong>The human factor: the most important gap to fill<\/strong><\/h3>\n\n<p>These two cases, seemingly distinct, tell the same story: technology can be as sophisticated as we want, but digital security is only as strong as its weakest link. And that link is almost always human. <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>In the case of the cloned SPID, it was probably the young users \u2013 inexperienced in managing digital credentials \u2013 who fell into the fraudsters&#8217; traps. In the Famly case, it took just one employee to inadvertently open the doors to a group of unscrupulous criminals. <\/p>\n<\/blockquote>\n\n<p>The lesson is clear and always the same: it&#8217;s not enough to build secure systems if people are not adequately trained to use them consciously. <strong>Complex passwords, multi-factor authentication, constant vigilance against phishing \u2013 these, in the digital age, are no longer options, but necessities<\/strong>.<\/p>\n\n<p>Thus, a cultural revolution in cybersecurity involving individuals, companies, and institutions is increasingly necessary. <\/p>\n\n<p>Individuals must become aware that they are part of a complex and connected system and can no longer afford severe knowledge gaps in the IT world. <strong>Companies and institutions, especially those handling sensitive data, must adopt security protocols that go well beyond the bare minimum<\/strong> and commit to training their employees and collaborators accurately, extensively, continuously, personally, interactively. It is precisely these individuals who must transform from the weak link in the chain to the main sentinel. <\/p>\n\n<p><strong>Today, in this connected world, there are no spectators<\/strong>: we are all potential victims, or unwitting accomplices, of digital crime that can endanger the lives of individuals, the economy of a company, the reputation of an institution, and even the security of an entire State&#8230;<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two cyber attacks that reveal the fragility of our digital defenses In the increasingly connected world of cybersecurity, the most vulnerable are often the most appealing targets. Digital security is only as strong as its weakest link. And that link is almost always human. The culture bonus theft: 500,000 euros stolen from eighteen-year-olds and the [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":54730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[487,467],"class_list":["post-54814","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-awareness-en-2","tag-cyber-crime-en-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Human factor and cyber fraud in Italy<\/title>\n<meta name=\"description\" content=\"The human factor is crucial in cyber scams. Discover how it was exploited to steal the culture bonus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When digital crime targets the most vulnerable: the human factor\" \/>\n<meta property=\"og:description\" content=\"The human factor is crucial in cyber scams. Discover how it was exploited to steal the culture bonus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T14:30:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T16:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/12\/truffe-ai-giovani.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"When digital crime targets the most vulnerable: the human factor\",\"datePublished\":\"2025-12-11T14:30:51+00:00\",\"dateModified\":\"2025-12-19T16:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/\"},\"wordCount\":870,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/truffe-ai-giovani.webp\",\"keywords\":[\"Cyber Awareness\",\"Cyber Crime\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/\",\"name\":\"Human factor and cyber fraud in Italy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/truffe-ai-giovani.webp\",\"datePublished\":\"2025-12-11T14:30:51+00:00\",\"dateModified\":\"2025-12-19T16:02:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"The human factor is crucial in cyber scams. Discover how it was exploited to steal the culture bonus.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/truffe-ai-giovani.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/truffe-ai-giovani.webp\",\"width\":1200,\"height\":688,\"caption\":\"truffe ai giovani\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2025\\\/12\\\/11\\\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When digital crime targets the most vulnerable: the human factor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Human factor and cyber fraud in Italy","description":"The human factor is crucial in cyber scams. Discover how it was exploited to steal the culture bonus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/","og_locale":"en_US","og_type":"article","og_title":"When digital crime targets the most vulnerable: the human factor","og_description":"The human factor is crucial in cyber scams. Discover how it was exploited to steal the culture bonus.","og_url":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2025-12-11T14:30:51+00:00","article_modified_time":"2025-12-19T16:02:00+00:00","og_image":[{"width":1200,"height":688,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/12\/truffe-ai-giovani.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"When digital crime targets the most vulnerable: the human factor","datePublished":"2025-12-11T14:30:51+00:00","dateModified":"2025-12-19T16:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/"},"wordCount":870,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/12\/truffe-ai-giovani.webp","keywords":["Cyber Awareness","Cyber Crime"],"articleSection":["Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/","url":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/","name":"Human factor and cyber fraud in Italy","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/12\/truffe-ai-giovani.webp","datePublished":"2025-12-11T14:30:51+00:00","dateModified":"2025-12-19T16:02:00+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"The human factor is crucial in cyber scams. Discover how it was exploited to steal the culture bonus.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/12\/truffe-ai-giovani.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/12\/truffe-ai-giovani.webp","width":1200,"height":688,"caption":"truffe ai giovani"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2025\/12\/11\/when-digital-crime-targets-the-most-vulnerable-the-human-factor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"When digital crime targets the most vulnerable: the human factor"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/54814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=54814"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/54814\/revisions"}],"predecessor-version":[{"id":54815,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/54814\/revisions\/54815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/54730"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=54814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=54814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=54814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}