{"id":4508,"date":"2022-08-29T10:50:39","date_gmt":"2022-08-29T08:50:39","guid":{"rendered":"https:\/\/cyberfunk-security.com\/?page_id=4508"},"modified":"2022-11-02T01:39:23","modified_gmt":"2022-11-01T23:39:23","slug":"home","status":"publish","type":"page","link":"https:\/\/cyberfunk-security.com\/en\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4508\" class=\"elementor elementor-4508\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d69aeb elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d69aeb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fe71b2\" data-id=\"3fe71b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3665b99 elementor-widget elementor-widget-image\" data-id=\"3665b99\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"170\" height=\"46\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cyberfunk-security_made-and-hosted-in-germany_new.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47d767b top_line elementor-widget elementor-widget-heading\" data-id=\"47d767b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">We will make <br>you  <span>cyberfit<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72f0875 elementor-widget elementor-widget-text-editor\" data-id=\"72f0875\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p style=\"font-weight: 400;\">We aim to explain IT security, cybercrime, and the darknet in simple terms and provide our customers with the security solutions they need.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6671dc check_btn elementor-widget elementor-widget-button\" data-id=\"e6671dc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjU4ODEiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Darknet Research for your company<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6606221 notify elementor-widget elementor-widget-text-editor\" data-id=\"6606221\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Find out about our Darknet Check-up <\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ee8cc21\" data-id=\"ee8cc21\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b1cd0a elementor-widget elementor-widget-image\" data-id=\"6b1cd0a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"696\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cyberfunk-security_composition.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca18431 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca18431\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-557e83c\" data-id=\"557e83c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4796b8 elementor-widget elementor-widget-heading\" data-id=\"e4796b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n\n    Products & Services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43ec0d6 services elementor-pagination-type-bullets elementor--star-style-star_fontawesome elementor-widget elementor-widget-reviews\" data-id=\"43ec0d6\" data-element_type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;4&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;slides_per_view_laptop&quot;:&quot;4&quot;,&quot;slides_per_view_tablet_extra&quot;:&quot;3&quot;,&quot;slides_per_view_tablet&quot;:&quot;2&quot;,&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;speed&quot;:2000,&quot;pagination&quot;:&quot;bullets&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cyberfunk-security.com\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-carousel.min.css\">\t\t<div class=\"elementor-swiper\">\n\t\t\t<div class=\"elementor-main-swiper swiper-container\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-d43230e\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/darknet-monitoring\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Darknet-Research.svg\" alt=\"Darknet Monitoring&lt;span&gt;Investigations in the &lt;\/br&gt;Deep- and Darkweb&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Darknet Monitoring<span>Investigations in the <\/br>Deep- and Darkweb<\/span><\/span><span class=\"elementor-testimonial__title\">More Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-b8854f4\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/24-7-incident-response\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Incident-Response.svg\" alt=\"24\/7 Incident Response &lt;span&gt;Emergency Hotline for  IT Security Incidents&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">24\/7 Incident Response <span>Emergency Hotline for  IT Security Incidents<\/span><\/span><span class=\"elementor-testimonial__title\">More Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-1f135ac\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/red-team-assessment\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Red-Team-Assessment.svg\" alt=\"Red Team Assessment &lt;span&gt;Realistic attack  simulation&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Red Team Assessment <span>Realistic attack  simulation<\/span><\/span><span class=\"elementor-testimonial__title\">More Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-acc21f3\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/threat-intelligence\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Threat-Intelligence.svg\" alt=\"CYBER&gt;WATCH&lt;\/br&gt;Threat Intelligence &lt;span&gt;Customer-specific Threat Analysis&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">CYBER&gt;WATCH<\/br>Threat Intelligence <span>Customer-specific Threat Analysis<\/span><\/span><span class=\"elementor-testimonial__title\">More Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-0143a65\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/secure-dns\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Secure-DNS.svg\" alt=\"Secure DNS &lt;span&gt;Secure and legitimate  Internet traffic&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Secure DNS <span>Secure and legitimate  Internet traffic<\/span><\/span><span class=\"elementor-testimonial__title\">More Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-a366fd2\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/active-directory-hardening\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Active-Directory-Hardening.svg\" alt=\"Active Directory Hardening &lt;span&gt;Securing Windows  Server Permissions&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Active Directory Hardening <span>Securing Windows  Server Permissions<\/span><\/span><span class=\"elementor-testimonial__title\">More Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9959a38 elementor-widget elementor-widget-heading\" data-id=\"9959a38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">COMING SOON<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-690999e cmsoon elementor-pagination-type-bullets elementor--star-style-star_fontawesome elementor-widget elementor-widget-reviews\" data-id=\"690999e\" data-element_type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;2&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;slides_per_view_laptop&quot;:&quot;4&quot;,&quot;slides_per_view_tablet_extra&quot;:&quot;3&quot;,&quot;slides_per_view_tablet&quot;:&quot;2&quot;,&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;space_between_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t<div class=\"elementor-main-swiper swiper-container\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-d43230e\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjIyMjUiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/icon_Services_Coming-Soon.svg\" alt=\"MDR, XDR &amp; Managed SOC\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">MDR, XDR &amp; Managed SOC<\/span><span class=\"elementor-testimonial__title\">Coming Soon<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-b8854f4\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjIyMjUiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/icon_Services_Coming-Soon.svg\" alt=\"Cybersecurity Awareness &amp; C-Level Training\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Cybersecurity Awareness &amp; C-Level Training<\/span><span class=\"elementor-testimonial__title\">Coming Soon<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c2e579 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c2e579\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e68b50\" data-id=\"2e68b50\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-785d248 elementor-section-content-middle homectatxt elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"785d248\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ab0fed6\" data-id=\"ab0fed6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b371767 cta_txt elementor-widget elementor-widget-heading\" data-id=\"b371767\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verstehen Sie cyber? <br><span>Wir sprechen Klartext!<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8f5ea63\" data-id=\"8f5ea63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e9c7bb check_btn elementor-align-right elementor-widget elementor-widget-button\" data-id=\"7e9c7bb\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt Sprache auf Klartext umstellen<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-996334c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"996334c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45f3cdb\" data-id=\"45f3cdb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dc271fb elementor-section-content-middle elementor-reverse-mobile_extra elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc271fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3aee156\" data-id=\"3aee156\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e64bf3e img_border1 elementor-widget elementor-widget-image\" data-id=\"e64bf3e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"843\" height=\"843\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min.jpg 843w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-300x300.jpg 300w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-150x150.jpg 150w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-768x768.jpg 768w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-24x24.jpg 24w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-36x36.jpg 36w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-60x60.jpg 60w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bf561fb\" data-id=\"bf561fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6329d9b elementor-widget elementor-widget-heading\" data-id=\"6329d9b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We offer you an all-round protection for \nall areas of your IT.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c904f03 elementor-widget elementor-widget-text-editor\" data-id=\"c904f03\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">A cyber-attack does not have to be directed at you in order for you to become a victim. <strong>We advise you individually and confidentially<\/strong>, regardless of your sector or the applications you use.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88b62ba check_btn elementor-align-left elementor-mobile_extra-align-center elementor-widget elementor-widget-button\" data-id=\"88b62ba\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/en\/products-services\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"33px\" viewBox=\"0 0 34 33\"><title>1D23DB06-6094-4B1D-8480-8B266B467B29<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-1329.000000, -90.000000)\"><g id=\"Group-12\" transform=\"translate(1216.000000, 82.872205)\"><g id=\"arrow-right-copy-11\" transform=\"translate(113.527359, 7.127795)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#FDDC48\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">To our products & services<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98a90e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98a90e2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c67be7a\" data-id=\"c67be7a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d3a2a6 elementor-widget elementor-widget-heading\" data-id=\"3d3a2a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUR TEAM IN THE PRESS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa283b press elementor-skin-carousel elementor-pagination-type-bullets elementor-pagination-position-outside elementor-widget elementor-widget-media-carousel\" data-id=\"8aa283b\" data-element_type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;5&quot;,&quot;slides_per_view_laptop&quot;:&quot;5&quot;,&quot;slides_per_view_tablet&quot;:&quot;3&quot;,&quot;slides_per_view_mobile&quot;:&quot;2&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;space_between_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;skin&quot;:&quot;carousel&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;space_between_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"media-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t<div class=\"elementor-main-swiper swiper-container\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.beobachter.ch\/digital\/handel-mit-kinderpornografie-in-den-sozialen-medien-gibt-es-praktisch-keine-hurden-mehr\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_1.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.welt.de\/wirtschaft\/plus238479523\/Erpressung-von-Firmen-Sensible-Daten-als-Geisel-Loesegeld-gegen-Code-Unterwegs-mit-dem-Cyberjaeger.html\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_2.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.inside-it.ch\/post\/bericht-kriminelle-haben-in-einem-jahr-daten-von-2700-schweizer-firmen-geklaut-20211008\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_3.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.blick.ch\/schweiz\/cyberkriminalitaet-boomt-jetzt-kann-jeder-mit-hacken-geld-machen-id17495294.html\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_4.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/10\/vb2020-tips-presentations-cybercrime-dach-region-and-ransomware-latam\/\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_5.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d753468 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d753468\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-199fd15\" data-id=\"199fd15\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3dd20f1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3dd20f1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a720423\" data-id=\"a720423\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a4597d elementor-widget elementor-widget-heading\" data-id=\"4a4597d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The top professionals in Germany for your cyber security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06627fd elementor-widget elementor-widget-text-editor\" data-id=\"06627fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">The best minds work with us and come from the exclusive networks: C3, ISACA &amp; SANS.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d14af8 check_btn elementor-align-left elementor-mobile_extra-align-center elementor-widget elementor-widget-button\" data-id=\"8d14af8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/en\/uber-uns\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">More about Cyberfunk Security<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-be7f273\" data-id=\"be7f273\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-006fb30 img_border elementor-widget elementor-widget-image\" data-id=\"006fb30\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"843\" height=\"843\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min.jpg 843w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-300x300.jpg 300w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-150x150.jpg 150w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-768x768.jpg 768w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-24x24.jpg 24w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-36x36.jpg 36w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-60x60.jpg 60w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-63236ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63236ce\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-716ba86\" data-id=\"716ba86\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf48541 elementor-widget elementor-widget-heading\" data-id=\"bf48541\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">FAQ CYBERCRIME <\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fa4028 elementor-widget elementor-widget-heading\" data-id=\"9fa4028\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What you always wanted to know about cybersecurity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2db6c9 faqs elementor-widget elementor-widget-accordion\" data-id=\"b2db6c9\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>.elementor-accordion{text-align:left}.elementor-accordion .elementor-accordion-item{border:1px solid #d4d4d4}.elementor-accordion .elementor-accordion-item+.elementor-accordion-item{border-top:none}.elementor-accordion .elementor-tab-title{margin:0;padding:15px 20px;font-weight:700;line-height:1;cursor:pointer;outline:none}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{display:inline-block;width:1.5em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon svg{width:1em;height:1em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-right{float:right;text-align:right}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-left{float:left;text-align:left}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-closed{display:block}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-opened,.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-closed{display:none}.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-opened{display:block}.elementor-accordion .elementor-tab-content{display:none;padding:15px 20px;border-top:1px solid #d4d4d4}@media (max-width:480px){.elementor-accordion .elementor-tab-title{padding:12px 15px}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{width:1.2em}.elementor-accordion .elementor-tab-content{padding:7px 15px}}.e-container>.elementor-widget-accordion{width:var(--container-widget-width,100%)}<\/style>\t\t<div class=\"elementor-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1871\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1871\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is cybersecurity?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1871\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1871\"><p style=\"font-weight: 400;\">Cybersecurity is the practice of protecting internet-connected networks, computers, mobile devices, software, applications &#8211; and the sensitive data stored on or transmitted through a network &#8211; from malicious attack.<\/p><p style=\"font-weight: 400;\">The various technologies and procedures that make up the full range of cybersecurity measures are designed to close security gaps and block attackers who try to gain access to, alter, destroy or extort sensitive customer data. It is also an important means of protection to recover quickly and efficiently from attacks aimed at blocking, disrupting or disabling an organisation&#8217;s ability to operate its own systems.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1872\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1872\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Who needs cyber security?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1872\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1872\"><p style=\"font-weight: 400;\">Some industries are more vulnerable to cyber threats due to the nature of their business (e.g. healthcare, finance and education). However, all businesses should take steps to protect their networks and their customers&#8217; confidential data.<\/p><p style=\"font-weight: 400;\">Due to technological advancements, increased connectivity and criminal activity, cyber-attacks will continue to grow exponentially &#8211; and at a high cost. According to a recent study, cybercrime will cost the world more than $6 trillion by the end of 2021 and as much as $10.5 trillion annually by 2025.<\/p><p style=\"font-weight: 400;\">With such a high price tag, it would be easy to believe that cyber criminals are primarily targeting large businesses and corporations. However, criminals have found that small businesses (SMBs) &#8211; especially those that are part of a supply chain to larger companies &#8211; are more vulnerable targets.<\/p><p style=\"font-weight: 400;\">According to a report on the global state of security, 71% of SMBs worldwide have experienced at least one cyberattack since starting their business, and 66% have been attacked in the last year alone.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1873\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-1873\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Why is cyber security a priority?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1873\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1873\"><p style=\"font-weight: 400;\">Since the first known computer virus bounced between a number of affected computers in 1971, a whole series of well-documented attacks over the last 50 years have caused trillions of dollars of damage to businesses around the world. They are all strong reminders that cybersecurity is a necessity today.<\/p><p style=\"font-weight: 400;\">Now, after COVID-19, the expansion of remote working and the rise of the Internet of Things (IoT) in our ever-changing digital environment have significantly increased the potential for cyberattacks. Cybercriminals are adapting their attack methods to focus on the weakest link in the cybersecurity chain: human error.<\/p><p style=\"font-weight: 400;\">With a greater number of devices in more locations connected to more software, the need for advanced cybersecurity has never been greater for businesses of all sizes that need to protect sensitive customer data.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1874\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"tab\" aria-controls=\"elementor-tab-content-1874\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">What is a cyber-attack?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1874\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1874\"><p style=\"font-weight: 400;\">Whether it&#8217;s stealing data, disrupting network activity or damaging devices, cyberattacks often occur in several steps:<\/p><p style=\"font-weight: 400;\">1) by scanning for vulnerabilities;<\/p><p style=\"font-weight: 400;\">2) initiating the breach; and;<\/p><p style=\"font-weight: 400;\">3) Execution of an attack.<\/p><p style=\"font-weight: 400;\">While there is no way to completely protect against all attacks, knowing what your system is up against and the current threats can help you create a more comprehensive cyber security plan.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab07a5c check_btn elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ab07a5c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/en\/faq\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">More facts about cybercrime<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We will make you cyberfit We aim to explain IT security, cybercrime, and the darknet in simple terms and provide our customers with the security solutions they need. 7FEC8EAE-F46A-449A-A694-526BBB31DC9D Darknet Research for your company Find out about our Darknet Check-up Products &#038; Services Darknet MonitoringInvestigations in the Deep- and DarkwebMore Info Read More 24\/7 Incident [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-4508","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages\/4508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/comments?post=4508"}],"version-history":[{"count":40,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages\/4508\/revisions"}],"predecessor-version":[{"id":6208,"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/pages\/4508\/revisions\/6208"}],"wp:attachment":[{"href":"https:\/\/cyberfunk-security.com\/en\/wp-json\/wp\/v2\/media?parent=4508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}