{"id":3412,"date":"2026-03-10T16:04:34","date_gmt":"2026-03-10T16:04:34","guid":{"rendered":"https:\/\/im-cybersec.com\/?page_id=3412"},"modified":"2026-03-10T19:38:13","modified_gmt":"2026-03-10T19:38:13","slug":"webinars-events","status":"publish","type":"page","link":"https:\/\/im-cybersec.com\/de\/webinars-events\/","title":{"rendered":"WEBINARS &#038; EVENTS"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-ffc1542d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-0f41bedb wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-1024x256.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-scaled.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-scaled.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-1024x256.png\" alt=\"\" class=\"uag-image-3416\" width=\"1024\" height=\"256\" title=\"IM CyberSec \u2013 kopija (7)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bc9d6916 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:49px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-dfb3575d\"><h2 class=\"uagb-heading-text\"><strong>Seien Sie jeder Bedrohung einen Schritt voraus \u2013 mit unseren Webinaren<\/strong> &amp; Events<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-51c25cac alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-ef635b2d\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-72e73318\"><h3 class=\"uagb-heading-text\">Webinar: 5 Experten gegen 1 Bedrohung \u2013 AI-gesteuerte Cyberangriffe <\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: 5 Experts, 1 Threat - Defending Endpoints Against AI Hacks (IM CyberSec, Huntress, Action1)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/m03gUN5xTmw?start=3489&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-9f7f1fec\"><p class=\"uagb-heading-text\">In dieser Session untersuchen IM CyberSec gemeinsam mit Huntress und Action1, wie KI Cyberangriffe beschleunigt und sie schneller sowie ausgefeilter als je zuvor macht. Unsere Experten teilen die neuesten Angriffstechniken und geben praktische Empfehlungen, wie Unternehmen Bedrohungen erkennen, sich verteidigen und in dieser sich st\u00e4ndig weiterentwickelnden Bedrohungslandschaft einen Schritt voraus bleiben k\u00f6nnen. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d63c0b81\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-36ad275e\"><h2 class=\"uagb-heading-text\">Unser YouTube Kanal<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-024c482d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-99799248 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/www.youtube.com\/@IM-CyberSec\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">SUBSCRIBE<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-1084ff69 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-89f63b6c\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6f86f1ec\"><h3 class=\"uagb-heading-text\">Cybersicherheit trifft auf Wasen<\/h3><\/div>\n\n\n\n<div class=\"wp-block-uagb-image uagb-block-673e5f5a wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58-1024x576.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58-1024x576.png\" alt=\"\" class=\"uag-image-3430\" width=\"1024\" height=\"576\" title=\"Nenaslovljeni dizajn (58)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-4ef26cc8\"><p class=\"uagb-heading-text\">Am 1. Oktober 2025 brachte IM CyberSec Kunden und Partner auf dem beliebten Wasen-Event in Stuttgart zusammen. W\u00e4hrend wir diese bekannte deutsche Tradition genossen, teilten wir Einblicke, diskutierten die neuesten Herausforderungen im Bereich Cybersicherheit und tauschten Ideen dar\u00fcber aus, wie Unternehmen den sich entwickelnden Bedrohungen einen Schritt voraus bleiben k\u00f6nnen \u2013 alles in einer entspannten und festlichen Atmosph\u00e4re. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6dfd7c13\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-76e28012\"><h3 class=\"uagb-heading-text\">Webinar: KACE SMA Update 15.00<\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Quest KACE SMA Update 15.0 \u2013 Live Demo Webinar\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1E1ofhJyvLE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-be516487\"><p class=\"uagb-heading-text\">In diesem Webinar stellen wir die wichtigsten Updates der KACE Systems Management Appliance 15.0 vor und zeigen, wie Administratoren die neuen Funktionen in ihren t\u00e4glichen Arbeitsabl\u00e4ufen nutzen k\u00f6nnen. Wir pr\u00e4sentieren moderne, anpassbare Dashboards, eine intelligentere Patch-Priorisierung mit CVSS\/EPSS-Scores, erweiterten Remote-Zugriff mit Splashtop sowie verbesserte sichere Protokollierung und Navigation \u2013 mit praktischen Tipps zur Optimierung des Ger\u00e4temanagements und zur St\u00e4rkung der Endpoint-Sicherheit. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c658460f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-85787955\"><h3 class=\"uagb-heading-text\">Webinar: Was ist Zero Trust Method?<\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: Zero Trust - How Secure Are Your Endpoints\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/GXvXftnn1oQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-db090cdb\"><p class=\"uagb-heading-text\">In dieser Session leitet IM CyberSec die Diskussion dar\u00fcber, warum das traditionelle \u201eBurg-und-Graben\u201c-Sicherheitsmodell in modernen Cloud-Umgebungen nicht mehr wirksam ist. Wir stellen den Zero-Trust-Ansatz vor und zeigen, wie jeder Benutzer und jedes Ger\u00e4t \u00fcberpr\u00fcft, Endpoints gesichert und Daten in einer perimaterlosen Welt gesch\u00fctzt werden k\u00f6nnen. Unsere Gast-Experten von Action1 schlie\u00dfen sich am Ende an, um zus\u00e4tzliche Einblicke und praktische Tipps zur Umsetzung von Zero-Trust-Strategien zu geben. <\/p><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-24cc8c16 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Be Ahead of Every Threat With Our Webinars &amp; Events Webinar: 5 Experts against 1 Threat &#8211; AI-Driver Cyber Attacks In this session, IM CyberSec together with Huntress and Action1, explore how AI is accelerating cyber attacks, making them faster and more sophisticated than ever. Our experts share the latest attack techniques and provide practical [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3153,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3412","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WEBINARS &amp; EVENTS - IM CyberSec<\/title>\n<meta name=\"description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/im-cybersec.com\/de\/webinars-events\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WEBINARS &amp; EVENTS - IM CyberSec\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/im-cybersec.com\/de\/webinars-events\/\" \/>\n<meta property=\"og:site_name\" content=\"IM CyberSec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T19:38:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/\",\"url\":\"https:\/\/im-cybersec.com\/webinars-events\/\",\"name\":\"WEBINARS & EVENTS - IM CyberSec\",\"isPartOf\":{\"@id\":\"https:\/\/im-cybersec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"datePublished\":\"2026-03-10T16:04:34+00:00\",\"dateModified\":\"2026-03-10T19:38:13+00:00\",\"description\":\"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity\",\"breadcrumb\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/im-cybersec.com\/webinars-events\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\",\"url\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"contentUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/im-cybersec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WEBINARS &#038; EVENTS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/im-cybersec.com\/#website\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"IM CyberSec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/im-cybersec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WEBINARS & EVENTS - IM CyberSec","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/im-cybersec.com\/de\/webinars-events\/","og_locale":"de_DE","og_type":"article","og_title":"WEBINARS & EVENTS - IM CyberSec","og_description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","og_url":"https:\/\/im-cybersec.com\/de\/webinars-events\/","og_site_name":"IM CyberSec","article_modified_time":"2026-03-10T19:38:13+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/im-cybersec.com\/webinars-events\/","url":"https:\/\/im-cybersec.com\/webinars-events\/","name":"WEBINARS & EVENTS - IM CyberSec","isPartOf":{"@id":"https:\/\/im-cybersec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage"},"image":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage"},"thumbnailUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","datePublished":"2026-03-10T16:04:34+00:00","dateModified":"2026-03-10T19:38:13+00:00","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","breadcrumb":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/im-cybersec.com\/webinars-events\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage","url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","contentUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/im-cybersec.com\/"},{"@type":"ListItem","position":2,"name":"WEBINARS &#038; EVENTS"}]},{"@type":"WebSite","@id":"https:\/\/im-cybersec.com\/#website","url":"https:\/\/im-cybersec.com\/","name":"IM CyberSec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/im-cybersec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"uagb_featured_image_src":{"full":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png",2560,2560,false],"thumbnail":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-150x150.png",150,150,true],"medium":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-300x300.png",300,300,true],"medium_large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-768x768.png",768,768,true],"large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1024x1024.png",1024,1024,true],"1536x1536":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1536x1536.png",1536,1536,true],"2048x2048":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-2048x2048.png",2048,2048,true],"trp-custom-language-flag":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"anita.xd@yahoo.com","author_link":"https:\/\/im-cybersec.com\/de\/author\/anita-xdyahoo-com\/"},"uagb_comment_info":0,"uagb_excerpt":"Be Ahead of Every Threat With Our Webinars &amp; Events Webinar: 5 Experts against 1 Threat &#8211; AI-Driver Cyber Attacks In this session, IM CyberSec together with Huntress and Action1, explore how AI is accelerating cyber attacks, making them faster and more sophisticated than ever. Our experts share the latest attack techniques and provide practical&hellip;","_links":{"self":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages\/3412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/comments?post=3412"}],"version-history":[{"count":13,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages\/3412\/revisions"}],"predecessor-version":[{"id":3446,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages\/3412\/revisions\/3446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/media\/3153"}],"wp:attachment":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/media?parent=3412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}