{"id":2202,"date":"2021-09-14T15:28:13","date_gmt":"2021-09-14T19:28:13","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=2202"},"modified":"2021-09-14T15:28:16","modified_gmt":"2021-09-14T19:28:16","slug":"new-windows-zero-day-rce-vulnerability-exploited","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/","title":{"rendered":"New Windows Zero-Day RCE Vulnerability Exploited"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-remote-work-era-created-a-haven-for-threat-actors-windows-announced-a-new-zero-day-rce-vulnerability-currently-being-exploited-in-the-wild\">The remote work era created a haven for threat actors. Windows announced a new zero-day RCE vulnerability currently being exploited in the wild.<\/h2>\n\n\n\n<p>As we fast approach the two-year mark of the coronavirus pandemic, numbers continue to rise in many parts of the world. New variants continue to emerge, vaccine resistance and a refusal to wear masks are combining to keep the pandemic alive. Still, some businesses continue their in-person returns while others remain hybrid or fully remote. The era of remote work bred an increase in cyberattacks, the discovery of new vulnerabilities, and put an emphasis on cybersecurity in general. Developers and security personnel can\u2019t keep up with all of the fixes before the next threat rises up, as is evidenced by a new zero-day RCE vulnerability in Windows that allows attackers to craft a malicious ActiveX control to be used by Microsoft Office documents.<\/p>\n\n\n\n<p>The vulnerability lies in MSHTML, and Microsoft says that it is \u201caware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents,\u201d according to the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noreferrer noopener\">advisory issued by Microsoft<\/a> on Tuesday. Because exploitation has happened and is still being actively pursued in the wild, CISA put out <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/09\/07\/microsoft-releases-mitigations-and-workarounds-cve-2021-40444\" target=\"_blank\" rel=\"noreferrer noopener\">its own advisory<\/a> to alert users and administrators to the problem.<\/p>\n\n\n\n<p>With this vulnerability, an attacker creates a malicious ActiveX control that can be used by an Office document that hosts the browser rendering engine. Then, the threat actor needs the user to open the document for the attack to work. Microsoft also said that users who have limited privileges on systems could be less impacted than those with admin privileges. This is another reason IAM controls matter, when a user doesn\u2019t need access to something, make sure they don\u2019t have it. Restricted access for certain employees means less surface area for a hacker to target. Current mitigations and workarounds can be found on the Microsoft advisory.<\/p>\n\n\n\n<p>It would be nice if that was the end of it, but it isn&#8217;t. Microsoft is still investigating this vulnerability to see if anything else could be impacted. This is MSHTML, which is used by many applications today, not just Office. Any application that automatically detects your proxy settings is likely to use MSHTML under the hood. Now that\u2019s not to say that this vulnerability affects any of those applications, but it is something to keep in mind as Microsoft continues to investigate.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/threatpost.com\/microsoft-zero-day-rce-flaw-in-windows\/169273\/\">ThreatPost<\/a>, \u201cMalicious Office documents are a popular tactic with cybercriminals and state-sponsored threat actors, and the vulnerability give them \u201cmore direct exploitation of a system and the usual tricking users to disable security controls,\u201d observed John Bambenek, principal threat hunter at digital IT and security operations firm Netenrich.<\/p>\n\n\n\n<p>\u201cAs this is already being exploited, immediate patching should be done,\u201d he advised. \u201cHowever, this is a stark reminder that in 2021, we still can\u2019t send documents from point A to point B securely.\u201d\u201d<\/p>\n\n\n\n<p>A stark reminder, indeed. It should also serve as a reminder that developers in general are already overworked and burning out. Those who deal with security are inching ever closer to the brink. It\u2019s not just securing critical vulnerabilities, though. It\u2019s dealing with the critical vulnerabilities on top of the other patches that have to be done. In August 2021 alone, Microsoft updated 44 flaws. That\u2019s just Microsoft. Most businesses use several vendors for various software, hardware, cloud and storage solutions. Every single piece of technology requires updating in order to remain secure. Remember, too, that patches don\u2019t just fix security bugs, they fix bugs that cause problems with other pieces of software and make updates for user experience, which can be anything from design to new\/upgraded features.<\/p>\n\n\n\n<p>Cybersecurity is going to be on the minds of business owners for a long time. Attacks are not slowing down, criminals are emboldened by successful ransomware attacks and there are not enough people to keep pace with it. This is where your team, your business, needs a third party. Bring in some outside help, an expert to help tighten up your security and apply patches and ensure you are compliant. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.<\/p>\n","protected":false},"author":1,"featured_media":2213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5,27,555],"tags":[2408,36,1910,31,1507,2405,2407,1997,2406],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Windows Zero-Day RCE Vulnerability Exploited - PWV Consultants<\/title>\n<meta name=\"description\" content=\"A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Windows Zero-Day RCE Vulnerability Exploited\" \/>\n<meta property=\"og:description\" content=\"A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-14T19:28:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-14T19:28:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1656\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"New Windows Zero-Day RCE Vulnerability Exploited\",\"datePublished\":\"2021-09-14T19:28:13+00:00\",\"dateModified\":\"2021-09-14T19:28:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\"},\"wordCount\":693,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg\",\"keywords\":[\"ActiveX control\",\"Business\",\"CyberSec\",\"Cybersecurity\",\"Microsoft\",\"Microsoft Office\",\"MSHTML\",\"vulnerability\",\"Windows\"],\"articleSection\":[\"Business\",\"Cyber Security\",\"Malware\",\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\",\"name\":\"New Windows Zero-Day RCE Vulnerability Exploited - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg\",\"datePublished\":\"2021-09-14T19:28:13+00:00\",\"dateModified\":\"2021-09-14T19:28:16+00:00\",\"description\":\"A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg\",\"width\":2560,\"height\":1656,\"caption\":\"Microsoft Office icon apps on the display notebook closeup. Microsoft Office is an office suite of applications created by Microsoft. Moscow, Russia - August 24, 2019\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Windows Zero-Day RCE Vulnerability Exploited\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New Windows Zero-Day RCE Vulnerability Exploited - PWV Consultants","description":"A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/","og_locale":"en_US","og_type":"article","og_title":"New Windows Zero-Day RCE Vulnerability Exploited","og_description":"A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-09-14T19:28:13+00:00","article_modified_time":"2021-09-14T19:28:16+00:00","og_image":[{"width":2560,"height":1656,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"New Windows Zero-Day RCE Vulnerability Exploited","datePublished":"2021-09-14T19:28:13+00:00","dateModified":"2021-09-14T19:28:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/"},"wordCount":693,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg","keywords":["ActiveX control","Business","CyberSec","Cybersecurity","Microsoft","Microsoft Office","MSHTML","vulnerability","Windows"],"articleSection":["Business","Cyber Security","Malware","Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/","url":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/","name":"New Windows Zero-Day RCE Vulnerability Exploited - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg","datePublished":"2021-09-14T19:28:13+00:00","dateModified":"2021-09-14T19:28:16+00:00","description":"A new zero-day RCE vulnerability is being exploited in the wild. The bug in Windows allows attackers to craft a malicious ActiveX control.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/09\/New-Windows-RCE-Being-Exploited-scaled.jpeg","width":2560,"height":1656,"caption":"Microsoft Office icon apps on the display notebook closeup. Microsoft Office is an office suite of applications created by Microsoft. Moscow, Russia - August 24, 2019"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/new-windows-zero-day-rce-vulnerability-exploited\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New Windows Zero-Day RCE Vulnerability Exploited"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2202"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=2202"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2202\/revisions"}],"predecessor-version":[{"id":2214,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/2202\/revisions\/2214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/2213"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=2202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=2202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=2202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}