{"id":6345,"date":"2022-07-15T09:49:14","date_gmt":"2022-07-15T09:49:14","guid":{"rendered":"https:\/\/adarma.wpengine.com\/cloud-security-6-key-security-monitoring-concepts-copy\/"},"modified":"2023-08-16T15:32:37","modified_gmt":"2023-08-16T15:32:37","slug":"top-3-cloud-attacks-you-should-know-about","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/top-3-cloud-attacks-you-should-know-about\/","title":{"rendered":"Top 3 Cloud Attacks You Should Know About"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":6346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[249,231,222,211],"acf":[],"yoast_head":"\n