{"id":2669,"date":"2022-08-09T05:15:00","date_gmt":"2022-08-09T05:15:00","guid":{"rendered":"\/cybersecurity-blog\/?p=2669"},"modified":"2022-12-21T06:45:14","modified_gmt":"2022-12-21T06:45:14","slug":"how-to-avoid-cyberattacks-in-online-education","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/","title":{"rendered":"How to Avoid Cyberattacks in Online Education"},"content":{"rendered":"\n<p>Online education has become different after COVID-19. Schools and universities had to go to the virtual classroom and according to <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/en.unesco.org\/news\/13-billion-learners-are-still-affected-school-university-closures-educational-institutions\" target=\"_blank\">the UNESCO study<\/a>, more than one billion learners were forced to adapt to an online format at the beginning of the pandemic.<br><\/p>\n\n\n\n<p>Online learning has taken root as there are a bunch of perks that go with it like freedom of choosing time and place. But crooks also find this method quite advantageous, so there appeared new cyberattacks that throw education back.<br><\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Cyber attacks against K-12 schools are a common occurrence. The Ohio Department of Education created this interactive map that is a record of incidents reported since 2016. <a href=\"https:\/\/t.co\/gpK06l7DZo\">https:\/\/t.co\/gpK06l7DZo<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/BeCyberAware?src=hash&amp;ref_src=twsrc%5Etfw\">#BeCyberAware<\/a> <a href=\"https:\/\/t.co\/5WJoY6fuuh\">pic.twitter.com\/5WJoY6fuuh<\/a><\/p>&mdash; Ohio School Safety Center (@OHSchoolSafety) <a href=\"https:\/\/twitter.com\/OHSchoolSafety\/status\/1456368916998017025?ref_src=twsrc%5Etfw\">November 4, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Both lecturers and students need to be aware of possible threats and know how to avoid cyberattacks and stay safe during online training.&nbsp;<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Top Cybersecurity Threats for online education&nbsp;<\/h3>\n\n\n\n<p>While educators have been polishing and changing their online programs, hackers have adopted methods to get access to confidential data. Criminals intend to perform attacks on video conferencing and collaboration tools, for example, Zoom and Webex.&nbsp;<br><\/p>\n\n\n\n<p>Here are some in-famous threats that teachers and students can face:<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Ransomware<\/h4>\n\n\n\n<p>Cybercriminals use this type of malicious program to stop a lecturer from using their system. All data is threatened to be deleted until a ransom is paid.<a rel=\"noreferrer noopener\" aria-label=\"&nbsp;66% (opens in a new tab)\" href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/pgvqxjrfq4kf7njrncc7b9jp\/sophos-state-of-ransomware-education-2022-wp.pdf\" target=\"_blank\">&nbsp;66%<\/a> of education organizations were hit by ransomware in 2021. <br><\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Texas leads the nation in education sector ransomware attacks. The fallout in 2020 alone?<br> \u25fe\ufe0f 1.4M students&#39; data compromised<br> \u25fe\ufe0f Average 55 days to recover, per attack<br> \u25fe\ufe0f $6.62 billion overall cost<a href=\"https:\/\/twitter.com\/hashtag\/FundCyberSummit21?src=hash&amp;ref_src=twsrc%5Etfw\">#FundCyberSummit21<\/a> <a href=\"https:\/\/t.co\/3nwbzrG2mt\">pic.twitter.com\/3nwbzrG2mt<\/a><\/p>&mdash; TASB Risk Management Fund (@tasbrmf) <a href=\"https:\/\/twitter.com\/tasbrmf\/status\/1458477849799712780?ref_src=twsrc%5Etfw\">November 10, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. DDoS attacks&nbsp;<\/h4>\n\n\n\n<p>Distributed Denial of Service is an attack when attackers flood servers with junk traffic, preventing students from getting access to a website. It can slow down the education process as DDoS attacks may last up to 50 minutes. According to the NetSCOUT report,<a href=\"https:\/\/www.netscout.com\/threatreport\"> 5.4 million attacks<\/a> happened only in the first half of 2021, including at least 120,000 known incidents in education.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. Phishing<\/h4>\n\n\n\n<p>Email scam, <a href=\"https:\/\/www.irs.gov\/newsroom\/irs-warns-university-students-and-staff-of-impersonation-email-scam\">staff impersonation<\/a>, spoon websites \u2013&nbsp;phishing tactics never seize to surprise. A goal of the targeted attack is to get access to intellectual property or pre-publication writings belonging to the school. Staff is also in danger: credentials theft guarantees criminals access into the university\u2019s financial systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What can educators do?<\/h3>\n\n\n\n<p>During training, the only thing you want to worry about is the exams, homework, qualitative material to give and take. But secure online education is a task for schools, students, and teachers. Here is what can be done to avoid cyberattacks:&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Manage User Privileges.<\/strong> Only trusted users should have access to the system. Make sure the security privileges of dismissed employees are revoked.<\/li><li><strong>Vet Third-Party Providers. <\/strong>Check software and platforms that you work on, and whether they meet security measures, what data is shared, etc.<\/li><li><strong>Educate the staff, students, parents. <\/strong>Organize<strong> <\/strong>training to raise cybersecurity awareness.<\/li><li><strong>Update Content Filters<\/strong>. Work out the policy of what kind of sources can\u2019t be reached by students<\/li><li><strong>Back up data.&nbsp;<\/strong><\/li><li><strong>Use VPN and secure WiFi<\/strong>.&nbsp;<\/li><li><strong>Check suspicious files and links. <\/strong>Try to use a sandbox, suck as<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=online_education\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> ANY.RUN<\/a>. It\u2019s a fast and easy tool, plus it\u2019s free.<\/li><\/ul>\n\n\n\n<p>For example, you can open a document sent to you from a so-called colleague or a student: and here you are \u2013&nbsp;all files are encrypted, stolen, or deleted. But if you checked a file in a secured environment, like a user that ran <a href=\"https:\/\/app.any.run\/tasks\/335fcff8-5d2b-4152-99b3-f78f93ce44d9\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">the following task,<\/a> you could stay safe.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/_MgVf8laru78SbD029_peMEXpMUCa-oFVR6ObPB4XV1SNqRM7gIRCip8JAPwPt7vGvpFY36fexC_eSER_hUXNxoekeXTScQvh72qbOsH7bnUcAn2m1QvOp4THAf1biw5ayxRFoek405TuKhpAlRVxQ\" alt=\"\"\/><\/figure>\n\n\n\n<p>Watch a video on how to check files and URLs in ANY.RUN online sandbox:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to run a new task on ANY.RUN malware analysis tool 2020\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/dLSvbLQmF_A?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>These rules are essential but sometimes students and lecturers tend to forget about them. We advise you to take a look at them from another side, what happens if you don\u2019t follow the rules? Here are our Harmful Tips for Cybersecurity, just for laughs. But we hope you can download it and remember what to do in a suspicious situation.&nbsp;<\/p>\n\n\n\n<p>The poster is available here: <a href=\"https:\/\/any.run\/media-files\/articles\/harmful-tips.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/any.run\/media-files\/articles\/harmful-tips.pdf<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/teNPdXAESWRtLBYKt3e2fDCXlDdKkILJEz6ElAuPqwt7Rdsy8naoEWBtEMAM2tnrdQel8y2hnOqIy2xuVt2YCVGuJJPI0ONFNLKrG-tULdewi-abBRaPUhy5AuHQbLxZJP9ZGf6WTIWxLMzeTjL3vA\" alt=\"\" width=\"724\" height=\"1024\"\/><\/figure>\n\n\n\n<p>The modern world allows different kinds of sources for learning, and online education is a great way but full of risk. It\u2019s essential for all participants in learning to be aware of cybersecurity dangers and how to avoid them.&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online education has become different after COVID-19. Schools and universities had to go to the virtual classroom and according to the UNESCO study, more than one billion learners were forced to adapt to an online format at the beginning of the pandemic. Online learning has taken root as there are a bunch of perks that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2980,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[58,31],"class_list":["post-2669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-cybersecurity-training","tag-threat"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Avoid Cyberattacks in Online Education - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Online education has become a regular thing in our lives, and staying safe during training is a number one priority for both students and educators.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Avoid Cyberattacks in Online Education\",\"datePublished\":\"2022-08-09T05:15:00+00:00\",\"dateModified\":\"2022-12-21T06:45:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/\"},\"wordCount\":678,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity training\",\"threat\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/\",\"name\":\"How to Avoid Cyberattacks in Online Education - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-08-09T05:15:00+00:00\",\"dateModified\":\"2022-12-21T06:45:14+00:00\",\"description\":\"Online education has become a regular thing in our lives, and staying safe during training is a number one priority for both students and educators.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Avoid Cyberattacks in Online Education\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid Cyberattacks in Online Education - ANY.RUN&#039;s Cybersecurity Blog","description":"Online education has become a regular thing in our lives, and staying safe during training is a number one priority for both students and educators.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Avoid Cyberattacks in Online Education","datePublished":"2022-08-09T05:15:00+00:00","dateModified":"2022-12-21T06:45:14+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/"},"wordCount":678,"commentCount":3,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity training","threat"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/","url":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/","name":"How to Avoid Cyberattacks in Online Education - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-08-09T05:15:00+00:00","dateModified":"2022-12-21T06:45:14+00:00","description":"Online education has become a regular thing in our lives, and staying safe during training is a number one priority for both students and educators.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-avoid-cyberattacks-in-online-education\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"How to Avoid Cyberattacks in Online Education"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2669"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2669"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2669\/revisions"}],"predecessor-version":[{"id":2981,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2669\/revisions\/2981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/2980"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}