{"acf":{"ig_featuredimage":false,"article-type":"translated","source-title-1":"Cyber Security News","source-url-1":"https:\/\/cybersecuritynews.com\/cybersecurity-newsletter-october-week-two\/#google_vignette","source-title-2":"","source-url-2":"","source-title-3":"","source-url-3":"","readmoree-title-1":"\u624b\u6a5f\u300c\u5225\u5b584\u7a2e\u7167\u7247\u300d\u6050\u60f9\u5927\u798d\u3000\u8a18\u5f97\u5feb\u522a\u6389","readmoree-url-1":"https:\/\/www.teepr.com\/1686571\/karinalu\/%e5%88%a5%e5%ad%984%e7%a8%ae%e7%85%a7%e7%89%87\/","readmoree-title-2":"17\u4e16\u7d00\u5df2\u6ec5\u7d55\uff01\u751f\u7269\u6280\u8853\u516c\u53f8\u5ba3\u5e03\u300c\u6e21\u6e21\u9ce5\u300d\u6709\u671b\u5fa9\u6d3b\u3000\u5f15\u9053\u5fb7\u722d\u8b70","readmoree-url-2":"https:\/\/www.teepr.com\/1842616\/mollylin\/%e6%b8%a1%e6%b8%a1%e9%b3%a5%e5%be%a9%e6%b4%bb\/","readmoree-title-3":"\u96fb\u52d5\u8eca\u300c\u50c550\u516c\u5206\u5bec\u300d\uff01\u99d5\u99db\u300c\u624b\u4f38\u51fa\u7a97\u5916\u958b\u8eca\u300d\u9a5a\u4eba\u756b\u9762\u66dd","readmoree-url-3":"https:\/\/www.teepr.com\/1827920\/mollylin\/%e5%85%a8%e7%90%83%e6%9c%80%e7%aa%84panda\/","editor-os":"","readmoree-url-4":""}}