{"componentChunkName":"component---src-templates-video-js","path":"/videos/what-is-a-watering-hole/","result":{"pageContext":{"node":{"title":"What is a Watering Hole?","path":"/videos/what-is-a-watering-hole/","slug":"what-is-a-watering-hole","categories":[{"id":"d459187f-046d-562c-9229-0f0162fe2282","name":"Videos"}],"featured_media":{"source_url":"https://staging.circadence.com/wp-content/uploads/2019/05/wateringhole.jpg"},"content":"<p>Cyber criminals are clever and know how to evolve. They’ve proven this once again with their latest cyber-attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisticated enterprises and government agencies.</p>\n<p>Recognizing a watering hole attack and how it works is valuable in managing risk, as it poses a significant threat to network security.</p>\n","excerpt":"<p>GUQw4R3QGJ8</p>\n"}}}}