{"id":1203,"date":"2025-10-14T17:18:39","date_gmt":"2025-10-14T15:18:39","guid":{"rendered":"https:\/\/addyet.xyz\/it-security\/threat-hunting"},"modified":"2025-12-22T12:03:02","modified_gmt":"2025-12-22T11:03:02","slug":"threat-hunting","status":"publish","type":"page","link":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting","title":{"rendered":"Threat Hunting"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb033b76d{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:1.2em;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h1 vcex_69dcfb033b76d\"><span class=\"vcex-heading-inner wpex-inline-block\">Threat Hunting - Detecting and eliminating vulnerabilities early on<\/span><\/h1>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]Threats to your IT infrastructure are omnipresent. And attackers are constantly developing their methods in a professional manner. Instead of repairing damage after the fact, proactive and systematic action is vital for your company.<\/p>\n<p>Threat Hunting is a method that goes far beyond traditional defense measures. With this approach, @-yet security experts search for hidden threats in your IT systems. They use methods specially adapted to your individual needs to search for signs of potential attacks and vulnerabilities. By using the latest technologies and interdisciplinary knowledge, they identify and neutralize threats before they can cause any damage. We ensure that you remain operational. You can focus on your business success.[\/vc_column_text]<style>.vcex-button.vcex_69dcfb033d10c{font-size:1.2rem;}<\/style><a href=\"#form\" class=\"vcex-button theme-button inline header-button vcex_69dcfb033d10c\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Get free advice now<\/span><\/a> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb033dfaa{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-center vc_custom_1765955546444 vcex_69dcfb033dfaa\"><span class=\"vcex-heading-inner wpex-inline-block\">Threat Hunting: Why choose @-yet?<\/span><\/h2>[vc_row_inner gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dcfb033ee9e .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dcfb033ee9e .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dcfb033ee9e .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dcfb033ee9e .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dcfb033ee9e\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">More than 20 years of experience<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Our experts have been conducting threat hunting analyses since @-yet was founded in 2002.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dcfb0340c83 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dcfb0340c83 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dcfb0340c83 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dcfb0340c83 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dcfb0340c83\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Interdisciplinary approach<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>The @-yet teams draw on extensive knowledge of IT forensics, penetration testing and security assessments.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dcfb0342127 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dcfb0342127 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dcfb0342127 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dcfb0342127 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dcfb0342127\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">All industries and company sizes<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>@-yet \u00a0serves hundreds of customers from all sectors of the economy \u2013 from medium-sized family businesses to large corporations.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_family=&#8221;Open Sans&#8221;]Proactively improving the safety level[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb0343861{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb0343861\"><span class=\"vcex-heading-inner wpex-inline-block\">Recognizing and resolving threats early on<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]\u201cThe attacker has already penetrated the infrastructure.\u201d<\/p>\n<p>Our security experts start their analysis with this hypothesis. Threat hunting is a proactive method for identifying hidden threats and the legacy of possible active attackers in your IT infrastructure. It often identifies traces and dangers that traditional security solutions such as virus scanners or intrusion prevention systems cannot recognize.<\/p>\n<p>The results of the analysis give you the opportunity to quickly fix the vulnerabilities found. With @-yet Threat Hunting, we detect potential security incidents before a potential attacker can actually cause significant damage. Our security experts effectively and sustainably minimize the risk of data loss and financial damage to your company.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765955623001{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Effectively protecting business processes[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb034417c{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb034417c\"><span class=\"vcex-heading-inner wpex-inline-block\">Improve resilience<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]The results of @-yet Threat Hunting give you a better understanding of the threat landscape and the vulnerabilities within your IT infrastructure. This enables you to improve your security measures in a targeted manner and increases the overall resilience of your company against cyber-attacks. By regularly conducting threat hunting, you can turn this analysis into a process of continuous improvement. This allows you to continuously develop your security measures and adapt your security strategy to changing threats.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765955689293{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Back to work quickly[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb03449fa{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb03449fa\"><span class=\"vcex-heading-inner wpex-inline-block\">Reduce response times<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Implement the insights gained from threat hunting to significantly reduce the response time to security incidents. By identifying and analyzing threats at an early stage, your IT teams can respond faster and more effectively. This leads to a rapid containment and resolution of security incidents, minimizing the impact on your business and ensuring business continuity. Your company will become more resilient to cyberattacks and your employees will be able to resume work more quickly in the event of an emergency.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765955703255{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #00056E !important;}&#8221; el_class=&#8221;info-text-section&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb0345277{color:#ffffff;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dcfb0345277\"><span class=\"vcex-heading-inner wpex-inline-block\">About 80% of cyberthreats<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;1.2rem&#8221;]can be discovered and averted if a company has professionally implemented security measures. The remaining 20% are the target of @-yet Threat Hunting. With the experience gained from thousands of analyses over the last 20 years, our teams use sophisticated methods to search for and find unknown gaps and highly complex threats in your IT infrastructure. They are supported by the knowledge and experience gained from security assessments, IT forensics and other analytical methods.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765955744310{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]@-yet Threat Hunting[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb03458f9{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb03458f9\"><span class=\"vcex-heading-inner wpex-inline-block\">What can @-yet do for you?<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Threat Hunting is a proactive approach to identifying undetected active threats in the corporate network. With the help of targeted manual searches, @-yet finds hidden threats and traces of possible active attackers in your IT infrastructure. This applies in particular to threats that are not detected by traditional solutions such as anti-virus programs or intrusion detection systems. Early detection significantly minimizes the risk of data loss and financial damage.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765955780638{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Methodology of @-yet Threat Hunting[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb03460aa{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb03460aa\"><span class=\"vcex-heading-inner wpex-inline-block\">How @-yet works<\/span><\/h2><style>.vcex-bullets.vcex_69dcfb034667a .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69dcfb034667a{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69dcfb034667a\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Proactive search for threats in the internal company network and the cloud<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Via existing SIEM\/XDR platform or rollout of agents to all servers and clients<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Search for suspicious behavior below the detection threshold of AV and EDR<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Structure based on the MITRE ATT&amp;CK\u00ae Enterprise Framework<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765955863587{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Threat Hunting with @-yet[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb0346d39{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb0346d39\"><span class=\"vcex-heading-inner wpex-inline-block\">These are your advantages<\/span><\/h2><style>.vcex-bullets.vcex_69dcfb03471ba .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69dcfb03471ba{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69dcfb03471ba\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Extensive experience with attack strategies from hundreds of incidents handled<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Product and manufacturer-independent, individually adapted to your IT environment<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Immediate incident response by @-yet\u00a0if a threat is identified<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1759848861664{margin-bottom: 4rem !important;}&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-bottom-width:1px;border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row local_scroll_id=&#8221;form&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<header class=\"ce_contact__header\">\n<p class=\"overline\">With @-yet, you can protect what is most valuable.<\/p>\n<\/header>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-heading.vcex_69dcfb034a9c3{color:#00056e;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl vcex_69dcfb034a9c3\"><span class=\"vcex-heading-inner wpex-inline-block\">Arrange your free, no-obligation consultation now.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Arrange your personal appointment now for a non-binding and free consultation. Our security and data protection experts will be happy to answer your questions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Direct contact:<\/strong><\/p>\n<p>Phone: +49 2175 16 55 0<br \/>\nEmail: info@at-yet.de<\/p>\n<p>Or via this form.<\/p>\n<p>We look forward to hearing from you!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2' ><form method='post' enctype='multipart\/form-data'  id='gform_2'  action='\/en\/wp-json\/wp\/v2\/pages\/1203' data-formid='2' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2_5\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_5'>Salutation<\/label><div class='ginput_container ginput_container_select'><select name='input_5' id='input_2_5' class='large gfield_select'     aria-invalid=\"false\" ><option value='' >Please select<\/option><option value='Herr' >Mr.<\/option><option value='Frau' >Mrs.<\/option><\/select><\/div><\/div><fieldset id=\"field_2_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_2_1'>\n                            \n                            <span id='input_2_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_2_1_3' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_3' class='gform-field-label gform-field-label--type-sub '>First name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_2_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_2_1_6' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_6' class='gform-field-label gform-field-label--type-sub '>Last name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_2_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_6'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_2_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_7\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_7'>Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_2_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_2_3' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2_4\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_4'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_2_4' type='tel' value='' class='large'    aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_8\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_8'>Your message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_2_8' class='textarea medium'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_2_10\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Further information<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_2_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_10_1' >Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.<\/label><input type='hidden' name='input_10.2' value='Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_2_9\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Privacy protection<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_9.1' id='input_2_9_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_9_1' >Yes, I have read and understood the contents of the <a href=\"\/en\/privacy-policy\">privacy policy<\/a>.<\/label><input type='hidden' name='input_9.2' value='Yes, I have read and understood the contents of the &lt;a href=&quot;\/en\/privacy-policy&quot;&gt;privacy policy&lt;\/a&gt;.' class='gform_hidden' \/><input type='hidden' name='input_9.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_2_11\" class=\"gfield gfield--type-frcaptcha gfield--input-type-frcaptcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_11'>Ohne Titel<\/label><div class='ginput_container ginput_container_frcaptcha'><div class=\"frc-captcha \" data-sitekey=\"FCMKBD0ANB8C39IQ\" data-lang=\"en\" ><\/div>\n\t\t<noscript>You need to enable Javascript for the anti-spam check.<\/noscript><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_2' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit now'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2' id='gform_theme_2' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2' id='gform_style_settings_2' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='EUR' value='cZqXvbuOlDgUo+DdKw4NUWJlFIUx4Lho8ZQbOyO75VCMqaj+0Wf+hmXISjFy0agpr1pOIZIKpGk4MtYuL+3JMLZsrEEzOKT2f2aF3TPzXNPexTM=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2' value='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' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2' id='gform_target_page_number_2' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2' id='gform_source_page_number_2' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_2').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_2').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2').val();gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2, current_page]);window['gf_submitting_2'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [2]);window['gf_submitting_2'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2').text());}else{jQuery('#gform_2').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Threat Hunting - Detecting and eliminating vulnerabilities early on Threats to your IT infrastructure are omnipresent. And attackers are constantly developing their methods in a professional manner. Instead of repairing damage after the fact, proactive and systematic action is vital for your company. Threat Hunting is a method that goes far beyond traditional defense measures.&hellip;","protected":false},"author":2,"featured_media":0,"parent":887,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1203","page","type-page","status-publish","hentry","entry","no-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Threat Hunting - @-yet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Hunting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting\" \/>\n<meta property=\"og:site_name\" content=\"@-yet\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T11:03:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/threat-hunting\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/threat-hunting\",\"name\":\"Threat Hunting - @-yet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\"},\"datePublished\":\"2025-10-14T15:18:39+00:00\",\"dateModified\":\"2025-12-22T11:03:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/threat-hunting#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/threat-hunting\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/threat-hunting#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat Hunting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"name\":\"@-yet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.at-yet.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\",\"name\":\"@-yet\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"caption\":\"@-yet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/at-yet\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Hunting - @-yet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting","og_locale":"en_US","og_type":"article","og_title":"Threat Hunting","og_url":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting","og_site_name":"@-yet","article_modified_time":"2025-12-22T11:03:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting","url":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting","name":"Threat Hunting - @-yet","isPartOf":{"@id":"https:\/\/www.at-yet.de\/en#website"},"datePublished":"2025-10-14T15:18:39+00:00","dateModified":"2025-12-22T11:03:02+00:00","breadcrumb":{"@id":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.at-yet.de\/en\/it-security\/threat-hunting#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.at-yet.de\/en"},{"@type":"ListItem","position":2,"name":"IT security","item":"https:\/\/www.at-yet.de\/en\/it-security"},{"@type":"ListItem","position":3,"name":"Threat Hunting"}]},{"@type":"WebSite","@id":"https:\/\/www.at-yet.de\/en#website","url":"https:\/\/www.at-yet.de\/en","name":"@-yet","description":"","publisher":{"@id":"https:\/\/www.at-yet.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.at-yet.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.at-yet.de\/en#organization","name":"@-yet","url":"https:\/\/www.at-yet.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/","url":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","contentUrl":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","caption":"@-yet"},"image":{"@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/at-yet\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/comments?post=1203"}],"version-history":[{"count":4,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1203\/revisions"}],"predecessor-version":[{"id":1794,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1203\/revisions\/1794"}],"up":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/887"}],"wp:attachment":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/media?parent=1203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}