{"id":358068,"date":"2026-01-30T00:24:51","date_gmt":"2026-01-29T14:24:51","guid":{"rendered":"https:\/\/www.telecomstechnews.com\/?p=108795"},"modified":"2026-01-30T00:24:51","modified_gmt":"2026-01-29T14:24:51","slug":"attackers-target-public-facing-applications-over-ransomware-in-2025","status":"publish","type":"post","link":"https:\/\/www.vibewire.com.au\/?p=358068","title":{"rendered":"\u200bAttackers target public-facing applications over ransomware in 2025"},"content":{"rendered":"<p>Exploitation of public-facing applications was the primary entry point for attackers in late 2025 amid a decrease in ransomware volume. \u200bEnterprise leaders managing digital transformation face a disappearing boundary between internal networks and the public internet. As organisations deploy new APIs and web services to generate revenue, they expand the attack surface. Data from the [&#8230;]<\/p>\n<p>The post <a href=\"https:\/\/www.telecomstechnews.com\/news\/attackers-target-public-facing-applications-over-ransomware-in-2025\/\">\u200bAttackers target public-facing applications over ransomware in 2025<\/a> appeared first on <a href=\"https:\/\/www.telecomstechnews.com\/\">Telecoms Tech News<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploitation of public-facing applications was the primary entry point for attackers in late 2025 amid a decrease in ransomware volume. \u200bEnterprise leaders managing digital transformation face a disappearing boundary between internal networks and the p&#8230;<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[15496,5716,5086,5056,5042,14232,3333,15470],"tags":[],"class_list":["post-358068","post","type-post","status-publish","format-standard","hentry","category-cisco","category-features","category-hacking","category-infosec","category-networks","category-ransomware","category-security","category-vulnerabilities"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts\/358068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=358068"}],"version-history":[{"count":1,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts\/358068\/revisions"}],"predecessor-version":[{"id":358070,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=\/wp\/v2\/posts\/358068\/revisions\/358070"}],"wp:attachment":[{"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=358068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=358068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vibewire.com.au\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=358068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}