{"id":44633,"date":"2022-06-20T06:01:41","date_gmt":"2022-06-20T10:01:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine-episode&#038;p=44633"},"modified":"2023-05-16T05:48:25","modified_gmt":"2023-05-16T09:48:25","slug":"target-the-supply-chain","status":"publish","type":"emagazine-episode","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/target-the-supply-chain\/44633\/","title":{"rendered":"Target the supply chain"},"content":{"rendered":"<p>In hacker:HUNTER Behind the Screens Episode 2, we look at a data theft from US retail giant Target that happened through the most unlikely machine, with cybercrime expert Eliza-May Austin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In hacker:HUNTER Behind the Screens Episode 2, we look at a data theft from US retail giant Target that happened through the most unlikely machine, with cybercrime expert Eliza-May Austin.<\/p>\n","protected":false},"author":2521,"featured_media":45757,"template":"","coauthors":[3452],"class_list":["post-44633","emagazine-episode","type-emagazine-episode","status-publish","has-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine-episode\/44633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine-episode"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine-episode"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/45757"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=44633"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=44633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}