Skip to content

Commit

Permalink
adds more changes
Browse files Browse the repository at this point in the history
  • Loading branch information
jscyo committed Mar 18, 2024
1 parent 2acf963 commit db15b13
Show file tree
Hide file tree
Showing 2 changed files with 24 additions and 1 deletion.
2 changes: 1 addition & 1 deletion content/phishing-attacks-in-2024/index.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: "Phishing Attacks in 2024"
description: "Over the years phishing attacks have become more sophisticated than ever. In this blog we break down how phishing attacks have evolved and how you can safeguard against them"
date: "2024-03-013"
date: "2024-03-13"
cover: "phishing-attacks-in-2024.png"
category: "programming"
author: "Sarah Sanders"
Expand Down
23 changes: 23 additions & 0 deletions static/blog-seo/config.json
Original file line number Diff line number Diff line change
Expand Up @@ -1008,5 +1008,28 @@
],
"title": "The difference between OTP, TOTP and HOTP",
"schema": "<script type=\"application/ld+json\">\n{\"@context\":\"https://schema.org\",\"@type\":\"Article\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"https://supertokens.com/blog/otp-vs-totp-vs-hotp\"},\"headline\":\"The difference between OTP, TOTP and HOTP\",\"image\":\"https://supertokens.com/blog-meta-images/otp-vs-totp-vs-hotp.png\",\"author\":{\"@type\":\"Organization\",\"name\":\"SuperTokens\",\"url\":\"https://supertokens.com\"},\"publisher\":{\"@type\":\"Organization\",\"name\":\"SuperTokens\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https://supertokens.com/static/assets/dark-home/logo.png\"}}}</script>"
},{
"path": "/blog/phishing-attacks-in-2024",
"metaTags": [
"<meta name=\"author\" content=\"Sarah Sanders\" /> ",
"<meta name=\"description\" content=\"Over the years phishing attacks have become more sophisticated than ever. In this blog we break down how phishing attacks have evolved and how you can safeguard against them\" />",
"",
"<meta name=\"keywords\" content=\"phishing, what are phishing attacks, types of phishing attacks, smishing and fishing, google deceptive site ahead\" />",
"<!--OG Tags-->",
"<meta property=\"og:title\" content=\"Phishing Attacks in 2024\" />",
"<meta property=\"og:type\" content=\"article\" />",
"<meta property=\"og:url\" content=\"https://supertokens.com/blog/phishing-attacks-in-2024\" />",
"<meta property=\"og:description\" content=\"Over the years phishing attacks have become more sophisticated than ever. In this blog we break down how phishing attacks have evolved and how you can safeguard against them\" /\"/>",
"<meta property=\"og:image\" content=\"https://supertokens.com/blog-meta-images/phishing-attacks-in-2024.png\" />",
"",
"<meta name=\"twitter:card\" content=\"summary_large_image\" />",
"<meta name=\"twitter:title\" content=\"Phishing Attacks in 2024\" />",
"<meta name=\"twitter:description\" content=\"Over the years phishing attacks have become more sophisticated than ever. In this blog we break down how phishing attacks have evolved and how you can safeguard against them\" />",
"<meta name=\"twitter:url\" content=\"https://supertokens.com/blog/phishing-attacks-in-2024\" />",
"<meta name=\"twitter:image\" content=\"https://supertokens.com/blog-meta-images/phishing-attacks-in-2024.png\" /> ",
"<!--OG Tags-->"
],
"title": "Phishing Attacks in 2024",
"schema": "<script type=\"application/ld+json\">\n{\"@context\":\"https://schema.org\",\"@type\":\"Article\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"https://supertokens.com/blog/phishing-attacks-in-2024\"},\"headline\":\"Phishing Attacks in 2024\",\"image\":\"https://supertokens.com/blog-meta-images/phishing-attacks-in-2024.png\",\"author\":{\"@type\":\"Organization\",\"name\":\"SuperTokens\",\"url\":\"https://supertokens.com\"},\"publisher\":{\"@type\":\"Organization\",\"name\":\"SuperTokens\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https://supertokens.com/static/assets/dark-home/logo.png\"}}}</script>"
}
]

0 comments on commit db15b13

Please sign in to comment.