{"id":20413,"date":"2022-03-28T11:07:01","date_gmt":"2022-03-28T09:07:01","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/uncategorized\/tibor-elias\/"},"modified":"2025-03-31T16:33:51","modified_gmt":"2025-03-31T14:33:51","slug":"tibor-elias","status":"publish","type":"post","link":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/","title":{"rendered":"Tibor \u00c9li\u00e1s"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-cd4508373f9c5adf7617351a2ce70720 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-dcbab7c4a63d51201b18857d09d92f97\">\n.flex_cell.av-junyesco-dcbab7c4a63d51201b18857d09d92f97{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-dcbab7c4a63d51201b18857d09d92f97{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-dcbab7c4a63d51201b18857d09d92f97 av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kznwza27-913f7eec7e6fc1222ccefcecf7197109\">\n#top .av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kznwza27-913f7eec7e6fc1222ccefcecf7197109 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Tibor \u00c9li\u00e1s<\/h1><div class='av_custom_color av-subheading av-subheading_below'><p>Senior Malware Analyst<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-4  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-5  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf\">\n.flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-7  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_fourth no_margin  avia-builder-el-8  el_before_av_cell_one_fourth  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>Going deep!<\/h1>\n<p>Tibor \u00c9li\u00e1s, Android Senior Malware Analyst at IKARUS Security Software, about malware, puzzle pieces and real successes.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-345c34048fe3649fedf2392333c02e62\">\n.flex_cell.av-3z0k63-345c34048fe3649fedf2392333c02e62{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-345c34048fe3649fedf2392333c02e62{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-345c34048fe3649fedf2392333c02e62 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-10  el_after_av_cell_one_fourth  el_before_av_cell_one_half  content-align-top av-zero-padding'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kx51xd8i-e66c9c420742b0c77b32cb97ed5c47c1\">\n.avia-image-container.av-kx51xd8i-e66c9c420742b0c77b32cb97ed5c47c1 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kx51xd8i-e66c9c420742b0c77b32cb97ed5c47c1 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kx51xd8i-e66c9c420742b0c77b32cb97ed5c47c1 av-styling-no-styling avia-align-center  avia-builder-el-11  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img fetchpriority=\"high\" class='wp-image-20378 avia-img-lazy-loading-not-20378 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2.jpg' alt='Tibor \u00c9li\u00e1s' title='Tibor \u00c9li\u00e1s'  height=\"1200\" width=\"1200\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-12  el_after_av_cell_one_fourth  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>For more than six years, Tibor \u00c9li\u00e1s has been disassembling Android malware. As a malware analyst, he has witnessed how mobile threats have evolved and spread over the last few years.<\/p>\n<p>&#8220;Not only the number of samples in the wild has increased, but also the variety,&#8221; says Tibor \u00c9li\u00e1s: &#8220;The first malware programs that sent masses of premium SMS for fast money were followed by classic Trojans and key loggers. In the meantime, we are also dealing with ransomware, banking trojans, cryptomers, adware, stalkerware and PUAs&#8221;.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-14  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-15  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-fc1fb7a25062f3a8946626f8c7fac3b9 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span style=\"font-size: 16px;\">After Windows, Android is the most popular target of cybercriminals. The advantages are obvious: our smartphones now contain just as valuable data, but are less secured \u2013 or not secured at all. It pays off to invest in new attack methods.<\/span><\/p>\n<blockquote>\n<p>&#8220;A good malware analyst keeps up with the rapid developments and always finds new ways to fend off attacks.\u201d<\/p>\n<\/blockquote>\n<p>The strong detection rates of the <a href=\"https:\/\/www.ikarussecurity.com\/en\/anti-malware-sdks-and-apis\/\">IKARUS Malware Scan Engine<\/a> are no coincidence and are not only due to the highly developed technology: It also contains a lot of ambition, know-how and creativity of the analysts.<\/p>\n<p>Reverse engineering is a large and exciting part of the virus laboratory&#8217;s everyday work but by far not all.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_half no_margin  avia-builder-el-17  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><blockquote>\n<p>One exciting task was to unlock a smartphone infected with a new type of ransomware that targeted and misused banking apps. To do this, we had to develop new software, find security gaps and crack the encryption. The task resembled a huge puzzle that had to be put together in the right order. It was exciting until the end&#8221;.<\/p>\n<\/blockquote>\n<p>Malware comes and goes &#8211; success stories like this one will be remembered.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-19  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_fourth no_margin  avia-builder-el-20  el_before_av_cell_three_fourth  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What did you want to be when you were little?<\/h3>\n<p>Scientists, physicists or geneticists<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_three_fourth no_margin  avia-builder-el-22  el_after_av_cell_one_fourth  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>When and how did you discover your interest in IT and\/or cyber security?<\/h3>\n<p>When I met IRC hackers like George Hotz, we worked together on GitHub projects like EDA and reverse-engineered proprietary hypervisor calls. Later, my professor at the University of Applied Sciences advertised a job advertisement for Smartphone Security, for which I applied right away. He also aroused my interest in how malware works on smartphones and how malware works, for example, camouflaged in front of antivirus software. Because I became more and more interested in the subject, I wrote my bachelor&#8217;s and master&#8217;s thesis with this professor and found my job as an Android malware analyst with his help.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-24  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-25  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>How did you become a Malware Analyst? What training, knowledge or experience was particularly helpful?<\/h3>\n<p>I have a Bachelor\u2019s degree in Electronics and a Master\u2019s degree in Telecommunications and Internet Technologies.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_half no_margin  avia-builder-el-27  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Which (professional and human) skills are particularly important in your current job?<\/h3>\n<p>Smartphone App Development and Reverse Engineering, Automation, Time Management and Teamwork.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-29  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f\">\n.flex_cell.av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f av-gridrow-cell av_one_half no_margin  avia-builder-el-30  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What would you have liked to know about your profession earlier?<\/h3>\n<p>I would have liked to learn more general skills like System Administration, DevOps, Machine Learning and Database Development.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-32  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What do you like most and least about your job?<\/h3>\n<p>I like the interaction with my colleagues and the idea that my job can protect clients from criminals.<\/p>\n<p>What I don\u2019t like is when we have too much to do in a limited time, and sometimes the goal of the task is not clear.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-8'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-34  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-35  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What is special about your role as Malware Analyst?<\/h3>\n<p>That I can do my job from anywhere, that is, my work itself is independent of location, and that I can protect our clients from fraud. Furthermore, I am mainly motivated by being able to guarantee the privacy and, in part, the financial security of our customers.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_half no_margin  avia-builder-el-37  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>What do you think are good ways to get a foothold in the IT and\/or cyber security industry?<\/h3>\n<p>Participate in open-source projects; try to build fundamental tools that analysts can use; a blog about various malware threats, write whitepapers, etc.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-9'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-39  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f\">\n.flex_cell.av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-7680e98ef12a68cfa3c44e3d7eada52f av-gridrow-cell av_one_half no_margin  avia-builder-el-40  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Why should someone apply to be your new colleague?<\/h3>\n<p>Because we have a good team where everyone gets along well, this is also important to me for the future: that we have colleagues who work well with others, but at the same time are also able to work well independently.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-42  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-43  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-10664 slide-entry-overview slide-loop-1 slide-parity-odd  post-entry-last  av_fullwidth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/mobile-overlay-attacks-on-android\/' data-rel='slide-1' class='slide-image' title='Mobile overlay attacks on Android'><img decoding=\"async\" fetchpriority=\"high\" width=\"225\" height=\"300\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2-225x300.png\" class=\"wp-image-10253 avia-img-lazy-loading-not-10253 attachment-medium size-medium wp-post-image\" alt=\"Figure 3: The landing page is visited using the mobile devices browser\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2-225x300.png 225w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2.png 365w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Mobile overlay attacks on Android\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/mobile-overlay-attacks-on-android\/' title='Mobile overlay attacks on Android'>Mobile overlay attacks on Android<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-11-12T16:47:59+01:00\" >12. November 2020<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >A short but deep insight into how malware works on Android. By Tibor \u00c9li\u00e1s, Android malware analyst at IKARUS Security Software.<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>487<\/span>\n\t\t\t\t\t\t<span itemprop='width'>365<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-28T11:07:01+02:00\" >2020-11-12 16:47:59<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-10-25 13:49:44<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Mobile overlay attacks on Android<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-10'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-44  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-45  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Mobile overlay attacks on Android<\/h3>\n<p>A short but deep insight into how malware works on Android &#8211; including expert tips and recommendations for securing your own apps.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-y9cs2-1d83bf0fdd0532ca0fafd5a91c695474-wrap avia-button-left  avia-builder-el-47  el_after_av_textblock  avia-builder-el-last '><a href='https:\/\/www.ikarussecurity.com\/mobile-device-management\/mobile-overlay-angriffe-auf-android\/'  class='avia-button av-y9cs2-1d83bf0fdd0532ca0fafd5a91c695474 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-dark'   aria-label=\"Mobile overlay attacks on Android\"><span class='avia_iconbox_title' >Mobile overlay attacks on Android<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_half no_margin  avia-builder-el-48  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>Join IKARUS!<\/h1>\n<\/div><\/section><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider2 avia-content-slider-even  avia-builder-el-50  el_after_av_textblock  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-43501 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/full-stack-engineer\/' data-rel='slide-2' class='slide-image' title='Full Stack Engineer'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-260x185.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Full Stack Engineer\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Full Stack Engineer\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/full-stack-engineer\/' title='Full Stack Engineer'>Full Stack Engineer<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>401<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-28T11:07:01+02:00\" >2025-10-20 10:48:30<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-27 13:49:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Full Stack Engineer<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-8917 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/senior-malware-analyst\/' data-rel='slide-2' class='slide-image' title='Senior Malware Analyst'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/06\/hacking-2903156_1280-2-260x185.jpg\" class=\"wp-image-15643 avia-img-lazy-loading-not-15643 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Malware Analyst\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Senior Malware Analyst\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/senior-malware-analyst\/' title='Senior Malware Analyst'>Senior Malware Analyst<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/06\/hacking-2903156_1280-2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>853<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1280<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-28T11:07:01+02:00\" >2025-06-18 09:44:50<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-27 13:51:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Senior Malware Analyst<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-31554 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/product-and-it-support-engineer\/' data-rel='slide-2' class='slide-image' title='Product &#038; IT Support Engineer'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2019\/08\/Fotolia_71780801_M-260x185.jpg\" class=\"wp-image-3208 avia-img-lazy-loading-not-3208 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS Support\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Product &amp; IT Support Engineer\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/product-and-it-support-engineer\/' title='Product &#038; IT Support Engineer'>Product &#038; IT Support Engineer<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2019\/08\/Fotolia_71780801_M.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>667<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1000<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-28T11:07:01+02:00\" >2025-06-17 18:06:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-27 13:53:02<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Product &#038; IT Support Engineer<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43424 slide-entry-overview slide-loop-4 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/speculative-application\/' data-rel='slide-2' class='slide-image' title='Speculative application'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Initiativbewerbung-260x185.jpg\" class=\"wp-image-43421 avia-img-lazy-loading-not-43421 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Initiativbewerbung\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Speculative application\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/speculative-application\/' title='Speculative application'>Speculative application<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Initiativbewerbung.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-28T11:07:01+02:00\" >2025-06-16 16:30:35<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-10-16 16:31:04<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Speculative application<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p>\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":20381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[183],"tags":[],"class_list":["post-20413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-portrait-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tibor \u00c9li\u00e1s - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tibor \u00c9li\u00e1s - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-28T09:07:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-31T14:33:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-blau2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IKARUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IKARUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/\"},\"author\":{\"name\":\"IKARUS\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/19cc5cb758c73750a975662a88135e57\"},\"headline\":\"Tibor \u00c9li\u00e1s\",\"datePublished\":\"2022-03-28T09:07:01+00:00\",\"dateModified\":\"2025-03-31T14:33:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/\"},\"wordCount\":3083,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Tibor-1200-blau2.jpg\",\"articleSection\":[\"Portrait\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/\",\"name\":\"Tibor \u00c9li\u00e1s - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Tibor-1200-blau2.jpg\",\"datePublished\":\"2022-03-28T09:07:01+00:00\",\"dateModified\":\"2025-03-31T14:33:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Tibor-1200-blau2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Tibor-1200-blau2.jpg\",\"width\":1200,\"height\":1200,\"caption\":\"Tibor \u00c9li\u00e1s\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/portrait-en\\\/tibor-elias\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tibor \u00c9li\u00e1s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/19cc5cb758c73750a975662a88135e57\",\"name\":\"IKARUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"caption\":\"IKARUS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tibor \u00c9li\u00e1s - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/","og_locale":"en_US","og_type":"article","og_title":"Tibor \u00c9li\u00e1s - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_published_time":"2022-03-28T09:07:01+00:00","article_modified_time":"2025-03-31T14:33:51+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-blau2.jpg","type":"image\/jpeg"}],"author":"IKARUS","twitter_card":"summary_large_image","twitter_creator":"@ikarusantivirus","twitter_site":"@ikarusantivirus","twitter_misc":{"Written by":"IKARUS","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#article","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/"},"author":{"name":"IKARUS","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57"},"headline":"Tibor \u00c9li\u00e1s","datePublished":"2022-03-28T09:07:01+00:00","dateModified":"2025-03-31T14:33:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/"},"wordCount":3083,"publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-blau2.jpg","articleSection":["Portrait"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/","url":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/","name":"Tibor \u00c9li\u00e1s - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-blau2.jpg","datePublished":"2022-03-28T09:07:01+00:00","dateModified":"2025-03-31T14:33:51+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-blau2.jpg","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-blau2.jpg","width":1200,"height":1200,"caption":"Tibor \u00c9li\u00e1s"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Tibor \u00c9li\u00e1s"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]},{"@type":"Person","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57","name":"IKARUS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","caption":"IKARUS"}}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/20413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=20413"}],"version-history":[{"count":16,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/20413\/revisions"}],"predecessor-version":[{"id":40582,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/20413\/revisions\/40582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media\/20381"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=20413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/categories?post=20413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=20413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}