{"id":1178,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail79-us4-mcsv-net\/"},"modified":"2021-12-30T11:38:54","modified_gmt":"2021-12-30T11:38:54","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail79-us4-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail79-us4-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail79.us4.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>\u200bOpen source encryption? Now Netherlands votes to help fund security projects<br \/>\nWhile November&#8217;s Paris attacks prompted US and European governments to revisit the debate over back-door policies to soften data encryption, the Netherlands lower house has voted to fund projects to strengthen it.<br \/>\nIn total, the Dutch lower house agreed to spend \u20ac500,000 ($547,000) to support the open-source OpenSSL, LibreSSL, and PolarSSL web-security projects.<br \/>\nSupporting work on alternative projects, such as LibreSSL and PolarSSL, can prevent Heartbleed-like attacks by preventing developers from using a homogeneous solution for protecting data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=28b8510e4e&#038;e=20056c7556<\/p>\n<p>Demand for new malicious programs reaches saturation point<br \/>\nAccording to Kaspersky Lab, the number of new malware files detected by its products in 2015 decreased to 310,000 a day, falling 15,000 from the 2014 number of 325,000.<br \/>\nHowever, despite the reduction in malware creation, in 2015 the number of users that were targets of attacks by cybercriminals increased by five percent.<br \/>\nKaspersky Lab experts believe the demand for new malicious programs has reached a saturation point, as coding new malware has become expensive and cybercriminals have realized the benefits of using intrusive advertising programs or legitimate digital signatures in their attacks.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6733a8623c&#038;e=20056c7556<\/p>\n<p>Shared Assessments Program Publishes New Best Practices Briefing Paper to Address Serious Need for Third-Party Incident Management.<br \/>\nSANTA FE, N.M., Dec. 8, 2015 \/PRNewswire\/ &#8212; Effective third-party due diligence demands a higher level of review than is presently being performed by most organizations.<br \/>\nYet, coordinated and active vendor involvement is lacking in many outsourcing organizations&#8217; incident event management programs.<br \/>\nEven in the 43 percent of organizations that report a formal incident program is in place, only 9 percent of incident management professionals deem theirs to be &#8220;very effective&#8221; (SANS Institute, 2014).<br \/>\nA new briefing paper by the Shared Assessments Program, developed in response to the need for improved third-party incident response management, will be released on December 9, 2015 in conjunction with a complimentary webinar taking place at 8:00 a.m. (PST).<br \/>\nThe briefing paper, titled Building Best Practices for Effective Monitoring of a Third Party&#8217;s Incident Event Management Program, will be made available to those individuals who attend the December 9 webinar.<br \/>\nThree of the paper&#8217;s co-authors, who are subject-matter experts in their respective fields, will serve as guest speakers during the 8:00 a.m. (PST) webinar.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=75160676c8&#038;e=20056c7556<\/p>\n<p>Canadian companies have a big new ally in the fight against cyber crime<br \/>\nTurns out a vulnerability discovered earlier this year in antivirus software from AVG also was present in AV software products from Intel McAfee and Kaspersky Lab.<br \/>\nThe security bug &#8212; which researchers at enSilo in March reported in AVG&#8217;s Internet Security 2015 build 5736 and virus database 8919 &#8212; centers around how the AV products in question allocate memory for read, write, and execute purposes.<br \/>\nThe AV products use &#8220;predictable&#8221; addresses that in turn could allow malware to exploit vulnerable, out-of-date third-party Windows applications for nefarious purposes.<br \/>\nThat effectively bypasses the AV system and makes it easier for bad guys to exploit vulnerable browsers or Adobe Reader, for example, to hack a Windows machine. enSilo today disclosed that this fall, it found the flaw in Kaspersky Lab&#8217;sKaspersky Total Security 2015 &#8211; 15.0.2.361 &#8211; kts15.0.2.361en_7342 and McAfee&#8217;s Virus Scan Enterprise version 8.8, including in its Anti Malware + Add-on Modules, Scan Engine version (32 bit) 5700.7163, DAT version 7827.0000, Buffer Overflow and Access Protection DAT version 659, after building its own tool to test AV products for the flaw.<br \/>\nBoth Kaspersky Lab and Intel McAfee have patched the flaw in their respective products &#8212; AVG fixed its bug just days after enSilo alerted the company &#8212; but enSilo says the vulnerability could well exist in other software such as data leak prevention and performance monitoring products.<br \/>\nThe flaw can only be exploited in Windows XP, Vista, and 7 machines. &#8220;The problem exists in Windows 8, but Microsoft saves them from the vulnerability because the \u2026 address is randomized,&#8221; says Tomer Bitton, co-founder and vice president of research at enSilo.<br \/>\nThe effect of cyber crime on Canadian GDP is lower than in the U.S. (0.17 per cent versus 0.64 per cent), but the reason for this gap may be underreporting and a lack of data, according to a Fraser Institute report.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b1afb0b29f&#038;e=20056c7556<\/p>\n<p>China security chief calls for better intelligence on terrorism<br \/>\nBEIJING (Reuters) &#8211; China needs to improve its intelligence gathering abilities and intelligence sharing between different departments it if wants to better deal with the threat of terrorism, its domestic security chief said, in a rare admission of the problems faced.<br \/>\nSpeaking in Xinjiang&#8217;s regional capital Urumqi, domestic security chief Meng Jianzhu said while some success had been achieved in the fight against terrorism, the situation remained serious.<br \/>\nMeng said intelligence gathering had to improve, in both what he called &#8220;hard and soft intelligence&#8221;, according to a government statement issued late on Friday.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3732044f0b&#038;e=20056c7556<\/p>\n<p>The role of automation in incident response<br \/>\nBEIJING (Reuters) &#8211; China needs to improve its intelligence gathering abilities and intelligence sharing between different departments it if wants to better deal with the threat of terrorism, its domestic security chief said, in a rare admission of the problems faced.<br \/>\nSpeaking in Xinjiang&#8217;s regional capital Urumqi, domestic security chief Meng Jianzhu said while some success had been achieved in the fight against terrorism, the situation remained serious.<br \/>\nMeng said intelligence gathering had to improve, in both what he called &#8220;hard and soft intelligence&#8221;, according to a government statement issued late on Friday.<br \/>\nWhen creating IR procedures, automation is a tool.<br \/>\nIt needs to be deployed thoughtfully and carefully to speed and enrich the human response \u2013 not replace it.<br \/>\nThere are four components of incident response \u2013 preparation, assessment, management, and mitigation \u2013 and, when used appropriately, automation can play a critical role in each phase.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8f2067642f&#038;e=20056c7556<\/p>\n<p>Risk Management receives increased focus in the UAE<br \/>\nIn collaboration with MENA Strategies, the RIMS Risk Forum Middle East, held on December 7 &#038; 8 at the Conrad in Dubai attracted government officials, media representatives, and renowned risk managers from MENA based and international corporations; Associated Insurance Consultants, Control Risks, Du, Emirates Insurance Association, Emirates Nuclear Energy Corporation (ENEC), Emirates National Oil Company (ENOC), Emirates Transport, Kuwait Petroleum Corporation, MENA Strategies, Middle East Insurance Review, Nesma &#038; Partners, New Dawn Risk Group, New York University, and Zain Group. &#8211; See more at: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=22913be714&#038;e=20056c7556<br \/>\n\u201cThe UAE is ahead of other countries in the GCC area in terms of risk management understanding, and after getting encouraging feedback from attendees and speakers, MENA Strategies will continue to cooperate with key regional and international corporations in order to initiate further events that focus on risk management\u201d remarked Melissa Aoun. &#8211; See more at: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=64c1d4de6d&#038;e=20056c7556<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6fad2f6f8e&#038;e=20056c7556<\/p>\n<p>POS Malware and Loyalty Card Fraud Growing in Popularity<br \/>\nThere has been a spike in POS malware over the past couple of years.<br \/>\nIn 2014, such malware came to be associated with botnet capabilities, increasing its attraction to criminals.<br \/>\nThen, from the beginning of 2014 to mid-2015, 15 new families of POS malware were identified, all with more powerful capabilities than previous strains, targeting industries including retail, hospitality, food and beverage and travel.<br \/>\nAccording to Trustwave, around 40 percent of breaches in 2014 were POS-related.<br \/>\nABI Research estimated that the number of POS-related security incidents with confirmed data breaches will reach 600 by the end of 2015.<br \/>\nThere has also been an uptick in security incidents involving loyalty cards.<br \/>\nAccording to the \u201c2015 Colloquy Loyalty Census,\u201d there has been a 26 percent increase in loyalty card scheme memberships in the U.S. since 2013.<br \/>\nAdditionally, the average household now belongs to 29 loyalty programs, of which 17 are inactive.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7e7d199618&#038;e=20056c7556<\/p>\n<p>Kaspersky Lab on Business Threats: 2015 Saw the Number of Cryptolocker Attacks Double<br \/>\nThe tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab&#8217;s review of corporate threats in the last twelve months.<br \/>\nThey included greater exploitation of legitimate software programs and malware being signed with valid digital signatures to keep malicious files hidden for longer.<br \/>\nKaspersky Lab&#8217;s experts also observed a steady rise in the number of corporate users attacked by ransomware.<br \/>\nKaspersky Lab&#8217;s experts found that in 2015 well over half (58 per cent) of corporate PCs were hit with at least one attempted malware infection, up three percentage points on 2014.<br \/>\nOne in three (29 per cent) business computers were exposed at least once to an Internet-based attack; with the exploitation of standard office applications seen three times as often as in consumer attacks.<br \/>\nFurther, 41 per cent of business computers faced local threats, such as from infected USB sticks or other compromised removable media.<br \/>\nThe experts also noted a seven per cent increase in the share of exploits targeting the Android platform, confirming hackers&#8217; growing interest in data stored on employees&#8217; mobile devices.<br \/>\nThese attacks included Carbanak, which penetrated the networks of banks, seeking out critical systems that would allow it to withdraw money.<br \/>\nOne successful attack alone would bring in as much as \u00a31.6 &#8211; \u00a36.6 million.<br \/>\nThe cyber-espionage group, Wild Neutron also spent much of 2015 hunting down investment companies as well as organisations working with the cryptocurrency Bitcoin and companies involved in mergers and acquisitions.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=f7e994c9ea&#038;e=20056c7556<\/p>\n<p>Malware Hides, Except When It Shouts<br \/>\nTwo new malware reports &#8211; one from security researchers at technology giant Cisco, another from cybersecurity firm FireEye &#8211; demonstrate how developers continue to refine their malicious code to maximize its information-stealing and extortion potential.<br \/>\nMalware that&#8217;s tailored to steal money has usually been designed for maximum stealth, and FireEye has just detailed a malware family called &#8220;Nemesis,&#8221; which is programmed to run when a PC starts up, before the operating system gets loaded.<br \/>\nThat makes the malware especially difficult to either detect or eliminate, and the longer the malware stays undetected, the greater the amount of sensitive data attackers can potentially exfiltrate.<br \/>\nOne of the most notorious types of ransomware is CryptoWall, which is used by multiple criminal groups, and which its developer continues to refine.<br \/>\nThe new version of CryptoWall &#8211; version 4 &#8211; was first spotted Nov. 2, attached to malicious spam (see Refined Ransomware Streamlines Extortion).<br \/>\nBy the end of November, however, security researchers were warning that multiple exploit kits that had been installing CryptoWall version 3 on victims&#8217; computers had upgraded to CryptoWall 4.<br \/>\nResearchers from the Cisco Talos security intelligence and research group say in a Dec. 10 blog post that CryptoWall 4 includes several major changes:<br \/>\n&#8211; Streamlined crypto<br \/>\n&#8211; Disabling backups<br \/>\n&#8211; Disabling backups<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0ee8634a67&#038;e=20056c7556<\/p>\n<p>Cybercriminals will target Apple in 2016, say experts<br \/>\nAccording to security firm Symantec, the amount of malware aimed at Apple&#8217;s mobile operating system (iOS) has more than doubled this year, while threats to Mac computers also rose.<br \/>\nSecurity firm FireEye also expects 2016 to be a bumper year for Apple malware.<br \/>\nLast year, it was seeing a monthly average of between 10,000 and 70,000 Mac computers infected with malware.<br \/>\nThe number of unique OS X computers infected with malware in the first nine months of 2015 was seven times higher than in all of 2014, its research found.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=51fc57c72d&#038;e=20056c7556<\/p>\n<p>Vormetric Survey: Data Breaches Threaten Americans&#8217; Loyalty to Their Favorite Retailer<br \/>\nSAN JOSE, Calif., Dec. 10, 2015 \/PRNewswire\/ &#8211;Vormetric, a leader in enterprise data security for physical, virtual, big data and cloud environments, today announced in conjunction with Wakefield the results of its survey on how Americans&#8217; would change their shopping behaviors if their favorite retailer was hit by a data breach.<br \/>\nThe survey revealed that for 85% of Americans, significant personal consequences that can result from a breach would cause them to find a new place to shop.<br \/>\nAccording to the Wakefield survey, Americans would take their business elsewhere after a data breach at their favorite retailer:<br \/>\n&#8211; If money was taken from their checking account (67%)<br \/>\n&#8211; If unauthorized charges appeared on their credit card (62%)<br \/>\n&#8211; If personal information were leaked (57%)<br \/>\n&#8211; If their credit score was damaged (54%)<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3428c36c20&#038;e=20056c7556<\/p>\n<p>Piracy sites make up to &#8216;$70m per year by spreading malware&#8217;<br \/>\n&#8220;Baiting internet users, stealing their personal information, and taking control of their computers is becoming big business \u2014 an estimated $70m (\u00a346.2m) per year just from peddling malware,&#8221; according to a study that goes by the name Digital Bait, conducted by the cybersecurity firm, RiskIQ and commissioned by non-profit organisation Digital Citizens Alliance.<br \/>\nAfter probing 800 sites that distribute stolen movies and television series, the study, published in December, states one out of every three theft sites contain malware.<br \/>\nIt poses a big threat to consumers subscribing to the content, as the malware threat is 28 times more than genuine sites.<br \/>\nEven their computers are at risk, as 45% of malware is delivered through &#8220;drive-by-download&#8221;, without users&#8217; knowledge.<br \/>\nXtreme Rat, Bifrost, Back Orifice, Njrat, Adwind, Darkcomet, Blackshades, SBU7, Poison Ivy and Cerberus are the top 10 RATs RiskIQ found through its scans.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dab089dabb&#038;e=20056c7556<\/p>\n<p>New Dutch Breach Notification Rules in Effect as of January 1, 2016<br \/>\nAn update to the Dutch Data Protection Act enacted earlier this year goes into effect January 1, 2016, and extends data breach notification requirements in the Netherlands to all data controllers (as opposed to just those in the financial, healthcare, or telecom fields).<br \/>\nUnder the new rules, such data controllers must notify the Dutch Data Protection Authority of any breach of personal data that has (or creates a significant chance of) serious adverse consequences for the protection of personal data.<br \/>\nNotices have to be given \u201cwithout delay.\u201d The draft implementation guidelines prepared by the Dutch Data Protection Authority suggest this means no later than two business days after the data controller becomes aware of the data breach, although commentators have noted that this may change when the Guidelines are finalized.<br \/>\nAffected individuals will also need to be notified if the breach is likely to have negative consequences for their privacy, unless the data was encrypted or otherwise unintelligible to third parties.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5c745b3b2b&#038;e=20056c7556<\/p>\n<p>Geneva security remains high amid terror alert<br \/>\n(CNN)Heavily armed guards watched over the United Nations building in Geneva and a security scare briefly shut down the international airport Friday, signs of heightened security amid a terror alert and a hunt for suspects.<br \/>\nThe Swiss alert came after a tip from U.S. intelligence officials, who told their Swiss counterparts that they had intercepted communications among extremists discussing the idea of attacking Geneva, as well as Chicago and Toronto, a source close to the investigation told CNN.<br \/>\nGeneva police Chief Monica Bonfanti told radio broadcaster RTS that there is &#8220;the possibility of the presence of an Islamic State (ISIS) terror cell in Geneva.&#8221; Bonfanti said police were searching for terror suspects, but wouldn&#8217;t comment on the number of people involved in the hunt.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0a73cf3374&#038;e=20056c7556<\/p>\n<p>NIST framework update en route<br \/>\nFIRST IN MC: NIST EYES UPDATE \u2014 In a request for comments set for publication in the Federal Register by Friday, the National Institute of Standards and Technology is asking companies how the technology lab\u2019s voluntary cybersecurity framework \u201cis being used, if it\u2019s a good time for an update, what\u2019s working, what\u2019s not working,\u201d NIST senior adviser Adam Sedgewick told MC.<br \/>\nSome of the framework\u2019s cybersecurity controls likely need updating, said Sedgewick.<br \/>\nIt\u2019ll be up to industry whether it also wants to use this opportunity to initiate a larger rewrite of the framework. \u201cThere\u2019s a lot of discussion about how do we make sure this is keeping up with the threat space and technological innovation,\u201d he said.<br \/>\nThe public will have 60 days to respond to NIST, which plans to hold an April workshop to discuss next steps.<br \/>\nMore on the framework: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dcbb6d83e4&#038;e=20056c7556<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ef97f36313&#038;e=20056c7556<\/p>\n<p>EFF Launches Open Source Code Security Program to Improve User Privacy<br \/>\nThe Electronic Frontier Foundation (EFF) has launched a new security initiative aimed at identifying vulnerabilities in open source code.<br \/>\nThe move is another sign of the open source world&#8217;s increasing interest in leveraging the the community to shore up software security in the wake of embarrassments like Heartbleed, the bug found in the popular OpenSSL cryptographic software library that led to so much trouble last year.<br \/>\nThe EFF announced the initiative, called the Security Vulnerability Disclosure Program, on Dec. 3.<br \/>\nThe organization, which advocates for online freedom and openness, describes the program as &#8220;a set of guidelines on how to report bugs in software EFF develops,&#8221; as well as in third-party software that the EFF uses.<br \/>\nThe EFF maintains several security tools that are popular among users interested in protecting their privacy, such as HTTPS Everywhere, a browser extension that provides SSL encryption for all Web traffic.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b850692793&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=163ff4ebd1)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: \u200bOpen source encryption? Now Netherlands votes to help fund security projects While November&#8217;s Paris attacks prompted US and European governments to revisit the debate over back-door policies to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1178","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1178"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1178\/revisions"}],"predecessor-version":[{"id":3665,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1178\/revisions\/3665"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}