{"blog_url":"https://foxsecurity.hatenablog.com/","provider_name":"Hatena Blog","height":"190","url":"https://foxsecurity.hatenablog.com/entry/2020/03/05/090000","author_url":"https://blog.hatena.ne.jp/foxcafelate/","categories":["\u3064\u3076\u3084\u3044\u3066\u307f\u305f\u3002"],"published":"2020-03-05 09:00:00","type":"rich","version":"1.0","description":"\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30b5\u30a4\u30c8\u306e3/4\u306fHTTPS\u306e\u30b5\u30a4\u30c8\u306b\u306a\u3063\u3066\u3044\u308b\u3002\u305d\u3093\u306a\u6c17\u306b\u306a\u308b\u30c7\u30fc\u30bf\u304cAPWG\u306e\u6700\u65b0\u30ec\u30dd\u30fc\u30c8\u306b\u51fa\u3066\u3044\u307e\u3057\u305f\u3002 www.helpnetsecurity.com \u5143\u30bd\u30fc\u30b9\uff08APWG) Phishing Activity Trends Report 4th Quarter 2019 (2/24) \u30ad\u30bf\u304d\u3064\u306d\u306e\u6240\u611f \u30ec\u30dd\u30fc\u30c8\u306e\u4e3b\u306a\u4e2d\u8eab\u3092\u898b\u3066\u307f\u308b\u3068\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u306e\u6a19\u7684\u30bb\u30af\u30bf\u30fc\u306f\u3001\uff08\u6d77\u5916\u3067\u306f\uff09\u30d3\u30b8\u30cd\u30b9\u30e1\u30fc\u30eb\u8a50\u6b3a\uff08BEC\uff09\u7d4c\u7531\u3067\u306e\u4f01\u696d\u306eSaaS\u30a2\u30ab\u30a6\u30f3\u30c8\u4fb5\u5165\u3068\u306a\u3063\u3066\u3044\u308b\u70b9\u306b\u306f\u3001\u3053\u3046\u3057\u305f\u6d77\u5916\u653b\u6483\u624b\u6cd5\u304c\u65e5\u672c\u306b\u3082\u6765\u308b\u304b\u306f\u5225\u306b\u3057\u3066\u3001\u65e5\u672c\u4f01\u696d\u3082\u6ce8\u610f\u304c\u5fc5\u8981\u304b\u3082\u77e5\u308c\u307e\u305b\u3093\u3002 \u65e5\u672c\u3067\u3082\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u5831\u544a\u4e8b\u4f8b\u304c\u591a\u3044\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ffoxsecurity.hatenablog.com%2Fentry%2F2020%2F03%2F05%2F090000\" title=\"\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30b5\u30a4\u30c8\u304cHTTPS\u5316\u3092\u52a0\u901f\u3057\u3066\u3044\u308b - Fox on Security\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":"\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30b5\u30a4\u30c8\u304cHTTPS\u5316\u3092\u52a0\u901f\u3057\u3066\u3044\u308b","provider_url":"https://hatena.blog","image_url":"https://2.bp.blogspot.com/-AkWRINxBgVw/XHS8ud5DEyI/AAAAAAABRvo/u4_gU1whNRksKu-8vO-8DjasGQr4WllCgCLcBGAs/s180-c/website_phishing.png","blog_title":"Fox on Security","author_name":"foxcafelate","width":"100%"}