{"643482":{"#nid":"643482","#data":{"type":"external_news","title":"\u0027Hidden Property Abusing\u0027 Allows Attacks on Node.js Applications","body":"","field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27255","created_gmt":"2021-01-27 16:11:33","changed_gmt":"2021-01-27 16:19:10","author":"Josie Giles","boilerplate_text":"","field_publication":"","publication":"calendy","field_article_url":"","publication_url":"https:\/\/www.darkreading.com\/vulnerabilities---threats\/hidden-property-abusing-allows-attacks-on-nodejs-applications\/d\/d-id\/1338509","dateline":{"date":"2021-07-31T00:00:00-04:00","iso_date":"2021-07-31T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"643483":{"id":"643483","type":"image","title":"Cyber-Hidden Property Abusing","body":null,"created":"1611764302","gmt_created":"2021-01-27 16:18:22","changed":"1611764438","gmt_changed":"2021-01-27 16:20:38","alt":"\u0027Hidden Property Abusing\u0027 Allows Attacks on Node.js Applications","file":{"fid":"244311","name":"hidden_property_abusing_banner_01.jpg","image_path":"\/sites\/default\/files\/images\/hidden_property_abusing_banner_01.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/hidden_property_abusing_banner_01.jpg","mime":"image\/jpeg","size":397978,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/hidden_property_abusing_banner_01.jpg?itok=yU8RawSU"}}},"media_ids":["643483"],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"344","name":"cyber"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}