{"id":1343,"date":"2021-01-21T14:38:59","date_gmt":"2021-01-21T19:38:59","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1343"},"modified":"2021-01-21T14:39:01","modified_gmt":"2021-01-21T19:39:01","slug":"open-source-vulnerabilities-continue-with-dnsmasq","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/","title":{"rendered":"Open-Source Vulnerabilities Continue with Dnsmasq"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-recently-researchers-announced-a-vulnerability-discovered-in-dnsmasq-anything-your-company-uses-that-is-open-source-must-be-reviewed-for-security-and-configuration-problems\">Recently, researchers announced a vulnerability discovered in dnsmasq. Anything your company uses that is open-source must be reviewed for security and configuration problems.<\/h2>\n\n\n\n<p>Open-source tools are a huge resource for developers, engineers, DevOps teams, designers, architects, anyone who touches code. We\u2019ve talked in the past about how all <a href=\"https:\/\/www.pwvconsultants.com\/blog\/all-open-sourced-code-should-be-reviewed\/\" target=\"_blank\" rel=\"noreferrer noopener\">open-source code should be reviewed<\/a>, especially after <a href=\"https:\/\/www.pwvconsultants.com\/blog\/open-sourced-code-attacks-continue\/\" target=\"_blank\" rel=\"noreferrer noopener\">a string of malware was found in npm libraries<\/a>. While the latest discovery isn\u2019t an attack or a string of malicious code, it\u2019s still a vulnerability in an open-source platform. This time, researchers uncovered seven flaws in dnsmasq, an open-source software program used for caching DNS responses for home and commercial routers and servers.<\/p>\n\n\n\n<p>The discovered vulnerabilities have been named \u201cDNSpooq\u201d by researchers, combining the DNS spoofing and the \u201cq\u201d at the end of dnsmasq, plus adding the concept of a \u201cspook\u201d spying on internet traffic. According to <a rel=\"noreferrer noopener\" href=\"https:\/\/threatpost.com\/dnspooq-flaws-allow-dns-hijacking-of-millions-of-devices\/163163\/\" target=\"_blank\">Threat Post<\/a>, \u201cThe set of even flaws are comprised of buffer overflow issues and flaws allowing for DNS cache-poisoning attacks (also known as DNS spoofing). If exploited, these flaws could be chained together to allow remote code execution, denial of service and other attacks.\u201d<\/p>\n\n\n\n<p>Dnsmasq is widely popular, used on many home and commercial routers. So far, there have been at least 40 vendors identified which use dnsmasq in their products. Cisco routers. Android phones. Aruba devices. Technicolor, Red Hat, Siemens and more. Researchers believe there to be \u201cmillions\u201d of devices affected.<\/p>\n\n\n\n<p>\u201cDNSpooq is a series of vulnerabilities found in the ubiquitous open-source software dnsmasq, demonstrating that DNS is still insecure, 13 years after the last major attack was described,\u201d said researchers with the JSOF research lab, <a href=\"https:\/\/www.jsof-tech.com\/disclosures\/dnspooq\/\">in a recent analysis<\/a>.<\/p>\n\n\n\n<p>While the flaws have varying degrees of severity, if chained together, they could lead to a variety of multi-stage attacks.<\/p>\n\n\n\n<p>\u201cThis is because exploiting some of the vulnerabilities makes it easier to exploit others,\u201d said researchers. \u201cFor example, we found that combining CVE-2020-25682, CVE-2020-25684, and CVE-2020-25685 would result in CVE-2020-25682 having a lower attack complexity (with the same impact) and result in a combined CVSS of 9.8 according to our analysis.\u201d<\/p>\n\n\n\n<p>This information was disclosed in August, but only publicly announced this month. Several companies are working together to find and employ a fix that is well-documented and communicated to anyone or any company using an affected device.<\/p>\n\n\n\n<p>One, always review anything open-sourced. Open-source platforms are a fabulous place for programmers and developers and coders to find answers to problems they have been unable to fix, or it\u2019s a place they know they can go find code that fits whatever project they are addressing. But it\u2019s also a place that threat actors can go and manipulate things to cause a problem. That is not what happened here, this is a configuration issue, with dnsmasq as the at-fault party. Nothing bad has happened with this information. Yet. But it points to why anything external has to be reviewed for security and configuration.<\/p>\n\n\n\n<p>The second point to make is that users of this service need to not only follow the appropriate threads for updates on mitigation, but they also need to make sure that the fix is made as soon as possible. A configuration problem that creates a weakness, especially one that is now known, is like lighting a Christmas tree in the dark. It\u2019s going to attract attention, only that attention isn\u2019t going to be the \u201cOooh\u2019s\u201d and \u201cAaah\u2019s\u201d of something beautiful. It\u2019s going to attract the kind of attention that makes security teams swear like sailors as they scramble to stop whatever is happening.<\/p>\n\n\n\n<p>Knowing about the vulnerability isn\u2019t enough. It\u2019s only the first step. Once you know about it, you have to mitigate. Then, when the fix is ready, you must deploy the patch, install the fix, whatever remediation is given has to be applied immediately. Security is a major concern for businesses worldwide, especially those who raced through digital transformation and couldn&#8217;t keep  security tight along the way. Don\u2019t wait until later. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.<\/p>\n","protected":false},"author":1,"featured_media":1353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1948,14,2073],"tags":[1569,1949,600,2076,2075,2074,1905,17,1603,1972],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Open-Source Vulnerabilities Continue with Dnsmasq - PWV Consultants<\/title>\n<meta name=\"description\" content=\"All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open-Source Vulnerabilities Continue with Dnsmasq\" \/>\n<meta property=\"og:description\" content=\"All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-21T19:38:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-21T19:39:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Open-Source Vulnerabilities Continue with Dnsmasq\",\"datePublished\":\"2021-01-21T19:38:59+00:00\",\"dateModified\":\"2021-01-21T19:39:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg\",\"keywords\":[\"code\",\"Configuration\",\"DevOps\",\"DNS Cache Poisoning\",\"DNS Spoofing\",\"DNSmasq\",\"open-source\",\"Security\",\"software\",\"Software Development\"],\"articleSection\":[\"Configuration\",\"Security\",\"Vulnerability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\",\"name\":\"Open-Source Vulnerabilities Continue with Dnsmasq - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg\",\"datePublished\":\"2021-01-21T19:38:59+00:00\",\"dateModified\":\"2021-01-21T19:39:01+00:00\",\"description\":\"All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open-Source Vulnerabilities Continue with Dnsmasq\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Open-Source Vulnerabilities Continue with Dnsmasq - PWV Consultants","description":"All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/","og_locale":"en_US","og_type":"article","og_title":"Open-Source Vulnerabilities Continue with Dnsmasq","og_description":"All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-21T19:38:59+00:00","article_modified_time":"2021-01-21T19:39:01+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Open-Source Vulnerabilities Continue with Dnsmasq","datePublished":"2021-01-21T19:38:59+00:00","dateModified":"2021-01-21T19:39:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/"},"wordCount":677,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg","keywords":["code","Configuration","DevOps","DNS Cache Poisoning","DNS Spoofing","DNSmasq","open-source","Security","software","Software Development"],"articleSection":["Configuration","Security","Vulnerability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/","url":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/","name":"Open-Source Vulnerabilities Continue with Dnsmasq - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg","datePublished":"2021-01-21T19:38:59+00:00","dateModified":"2021-01-21T19:39:01+00:00","description":"All open-source tools must be reviewed, including software. Researchers announce seven flaws in dnsmasq configuration.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/DNSmasq-scaled.jpeg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/open-source-vulnerabilities-continue-with-dnsmasq\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Open-Source Vulnerabilities Continue with Dnsmasq"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1343"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1343"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1343\/revisions"}],"predecessor-version":[{"id":1357,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1343\/revisions\/1357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1353"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}