{"id":2017,"date":"2021-06-09T15:24:09","date_gmt":"2021-06-09T19:24:09","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2017"},"modified":"2021-06-09T15:24:11","modified_gmt":"2021-06-09T19:24:11","slug":"solarwinds-hackers-back-for-more","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/","title":{"rendered":"SolarWinds Hackers Back For More"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-kremlin-backed-solarwinds-hackers-are-back-again-this-time-a-phishing-scheme-using-a-compromised-government-email-account-was-used-to-deliver-malware-to-organizations-in-24-countries\">The Kremlin-backed SolarWinds hackers are back again. This time, a phishing scheme using a compromised government email account was used to deliver malware to organizations in 24 countries.<\/h2>\n\n\n\n<p>Last December, the U.S. was the target of <a href=\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-fallout-continues-nasa-faa-breached\/\" target=\"_blank\" rel=\"noreferrer noopener\">a supply chain attack by Russia<\/a>. Known as the SolarWinds hack, the attack was stealthy, going undetected for months before it was discovered. Around 18,000 customers of SolarWinds were impacted, eventually compromising nine government agencies and 100 private-sector companies. The group responsible, backed by the Kremlin, is back again with a new attack. This time, the SolarWinds hackers are conducting a malicious email campaign to deliver malware to 150 government agencies, research institutions and other organizations in the U.S. and 23 other countries.<\/p>\n\n\n\n<p>The group responsible for this attack is part of Russia&#8217;s Foreign Intelligence Service. Their first step was compromising an account that belongs to USAID. USAID is a U.S. government agency which provides civilian foreign aid and development assistance. They ended up gaining control of the agency\u2019s online marketing account with Constant Contact, giving them the ability to send emails that looked legitimate.&nbsp;<\/p>\n\n\n\n<p>\u201cFrom there, the actor was able to distribute phishing emails that looked authentic but included a link that, when clicked, inserted a malicious file used to distribute a backdoor we call NativeZone,\u201d Microsoft Vice President of Customer Security and Trust Tom Burt <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/05\/27\/nobelium-cyberattack-nativezone-solarwinds\/\" target=\"_blank\" rel=\"noreferrer noopener\">wrote in a post<\/a> published on Thursday evening. \u201cThis backdoor could enable a wide range of activities from stealing data to infecting other computers on a network.\u201d<\/p>\n\n\n\n<p>Aside from the USAID content, FireEye said the group used other lures, including diplomatic notes and invitations from embassies. The Foreign Intelligence Service, known as SVR, is known to target governments, think-tanks and other organizations.<\/p>\n\n\n\n<p>&#8220;Though the SolarWinds activity was remarkable for its stealth and discipline, loud, broad spearphishing operations were once the calling card of SVR operators who often carried out noisy phishing campaigns,&#8221; John Hultquist, Vice President of Analysis at FireEye-owned Mandiant Threat Intelligence, said in an email. &#8220;Those operations were often effective, gaining access to major government offices among other targets. And while the spear phishing emails were quickly identified, we expect that any post-compromise actions by these actors would be highly skilled and stealthy.&#8221;<\/p>\n\n\n\n<p>Ars Technica has a <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/05\/microsoft-says-solarwinds-hackers-targeted-us-agencies-in-a-new-campaign\/\" target=\"_blank\" rel=\"noreferrer noopener\">great technical explanation<\/a> of how this attack works, along with a sample email that was used.<\/p>\n\n\n\n<p>That these same hackers are back with a new, successful, attack is indicative of the need for continued cybersecurity training. Social engineering is an incredibly real threat, and even with continued training, there will still be those who click those bad links. Which is what threat actors and nation states are counting on, it only takes one person to let in a bad actor.<\/p>\n\n\n\n<p>This is also indicative of needed regulations around cyber activity, and should serve as a warning sign to business owners. Governments and regulating bodies will get to legislation eventually, but they tend to work on their own timelines, not ours. In the meantime, businesses must take it upon themselves to ensure the security of their systems. Russia is deliberately targeting supply chain companies and government agencies, but they\u2019ll take anything they think will get them a leg up. It&#8217;s important to remember that the SolarWinds hackers aren&#8217;t the only group out there, and these attacks are on the rise.<\/p>\n\n\n\n<p>We\u2019ve said this many times, and will continue to do so: Security cannot wait. And it\u2019s important to remember that security isn\u2019t just code, firewalls and email filters. Security involves every employee, from the mailroom clerk to the CEO. Everyone must be trained on how to recognize phishing emails, that clicking links in emails is a bad idea, especially emails from unknown sources. Just because it passes the company\u2019s filter doesn\u2019t mean it\u2019s 100% safe. Every employee should also be trained on password safety and using passphrases and password managers.<\/p>\n\n\n\n<p>The absolute best thing you can do for your business is to hire an expert to review your security protocols and ensure that all of your systems and applications are updated with the most recent patches. And remember, they can help you with training programs, too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.<\/p>\n","protected":false},"author":1,"featured_media":2023,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5,1868],"tags":[36,25,1910,31,22,2340,17,2058,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SolarWinds Hackers Back For More - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds Hackers Back For More\" \/>\n<meta property=\"og:description\" content=\"The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-09T19:24:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-09T19:24:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"SolarWinds Hackers Back For More\",\"datePublished\":\"2021-06-09T19:24:09+00:00\",\"dateModified\":\"2021-06-09T19:24:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg\",\"keywords\":[\"Business\",\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"phishing\",\"Russia\",\"Security\",\"SolarWinds\",\"technology\"],\"articleSection\":[\"Business\",\"Cyber Security\",\"Software\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\",\"name\":\"SolarWinds Hackers Back For More - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg\",\"datePublished\":\"2021-06-09T19:24:09+00:00\",\"dateModified\":\"2021-06-09T19:24:11+00:00\",\"description\":\"The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Stafford, United Kingdom - January 2 2021: Solarwinds logo seen on the smartphone screen, with simple C attack code on the paper background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SolarWinds Hackers Back For More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SolarWinds Hackers Back For More - PWV Consultants","description":"The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds Hackers Back For More","og_description":"The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-06-09T19:24:09+00:00","article_modified_time":"2021-06-09T19:24:11+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"SolarWinds Hackers Back For More","datePublished":"2021-06-09T19:24:09+00:00","dateModified":"2021-06-09T19:24:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/"},"wordCount":698,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg","keywords":["Business","cyber attack","CyberSec","Cybersecurity","phishing","Russia","Security","SolarWinds","technology"],"articleSection":["Business","Cyber Security","Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/","url":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/","name":"SolarWinds Hackers Back For More - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg","datePublished":"2021-06-09T19:24:09+00:00","dateModified":"2021-06-09T19:24:11+00:00","description":"The SolarWinds hackers are back, compromising a USAID email account. Through it, they conducted a phishing scheme to implant malware.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/SolarWinds-Hackers-Back-for-More-scaled.jpeg","width":2560,"height":1707,"caption":"Stafford, United Kingdom - January 2 2021: Solarwinds logo seen on the smartphone screen, with simple C attack code on the paper background."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/solarwinds-hackers-back-for-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SolarWinds Hackers Back For More"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2017"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2017"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2017\/revisions"}],"predecessor-version":[{"id":2025,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2017\/revisions\/2025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2023"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}