{"id":4591,"date":"2023-03-23T06:53:10","date_gmt":"2023-03-23T06:53:10","guid":{"rendered":"\/cybersecurity-blog\/?p=4591"},"modified":"2023-03-23T06:54:07","modified_gmt":"2023-03-23T06:54:07","slug":"any-run-at-gisec-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/","title":{"rendered":"ANY.RUN at GISEC 2023\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>ANY.RUN malware sandbox was thrilled to join <a href=\"https:\/\/www.gisec.ae\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">GISEC 2023<\/a> from March 14-16, hosted at the Dubai World Trade Centre.\u00a0<\/p>\n\n\n\n<p>This exciting gathering united top cybersecurity experts from around the world, who showcased their cutting-edge solutions designed to keep us all protected in the digital realm.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-1024x683.jpeg\" alt=\"ANY.RUN stand at GISEC 2023 \" class=\"wp-image-4596\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-1024x683.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-300x200.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-768x512.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-1536x1024.jpeg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-370x247.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-270x180.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597-740x493.jpeg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/1679001525597.jpeg 1567w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Our stand at GISEC 2023 \u2014 designers did an incredible job this year\u00a0<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>We were beyond thrilled to chat with partners, colleagues, and clients who dropped by our booth at during the event. It was a blast to demo our product and delve into the current challenges and breakthroughs shaping our industry&#8217;s future. A massive shoutout to everyone who visited <a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=gisec2023_post_release&amp;utm_content=demo\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> at GISEC 2023 \u2014 your presence made it an unforgettable experience!&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"780\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-780x1024.png\" alt=\"Showcasing ANY.RUN service\u2019s malware detection capabilities. \" class=\"wp-image-4595\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-780x1024.png 780w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-228x300.png 228w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-768x1009.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-370x486.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-270x355.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6-740x972.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-6.png 868w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><figcaption class=\"wp-element-caption\">We had a blast showcasing <a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=gisec2023_post_release&amp;utm_content=demo\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN service\u2019s<\/a> malware detection capabilities.\u00a0<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>At the conference, we aimed to demonstrate how an interactive cloud sandbox can revolutionize the way SOC teams operate\u2014whether in expansive corporate settings or agile startups \u2014 by significantly accelerating detection and, especially, the analysis of malicious software.&nbsp;<\/p>\n\n\n\n<p>Dubai, the host city for GISEC, couldn&#8217;t have been a more suitable venue, given the Middle East&#8217;s vibrant culture of fostering growth through ceaseless innovation and embracing new technologies. We believe we accomplished our mission, and eagerly anticipate forging lasting and fruitful partnerships with companies in the region.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN: the presenter of ITP Security Leadership Awards&nbsp;<\/h2>\n\n\n\n<p>A standout feature of this year&#8217;s GISEC was the event-within-an-event\u2014<a href=\"https:\/\/www.itp.events\/ITPnetSecurityAwards?lang=en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ITP Security Leadership Awards<\/a>, a glamorous gala dinner designed to unite and celebrate exceptional security innovators from the MENA region. This prestigious gathering featured more than 100 nominees across 14 impressive categories.\u00a0<\/p>\n\n\n\n<p>The evening kicked off with a presentation by His Excellency Dr. Mohamed Al-Kuwaiti, Head of Cyber Security for the United Arab Emirates Government, who discussed the nation&#8217;s digital transformation strategy. After his enlightening keynote speech, the moment arrived to reveal the award winners.&nbsp;<\/p>\n\n\n\n<p>Aleksey Vialkov, ANY.RUN Head of Sales was honored to present two awards: The Government \u2013 Security Leader of the Year award went to Jasim Al Awadi at du, while the Construction and Real Estate \u2013 Security Leader of the Year category was awarded to Muhamed Noufel at EGYCO &amp; National Resource Group.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-1024x683.jpeg\" alt=\"ANY.RUN presenting the Security Leader of the Year\" class=\"wp-image-4593\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-1024x683.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-300x200.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-768x512.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-1536x1024.jpeg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-370x247.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-270x180.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1-740x493.jpeg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image-1.jpeg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Aleksey presenting the Security Leader of the Year \u2014 Construction and Real estate Award to Muhamed Noufel\u00a0<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Aleksey shared his insights in the interview, where he highlighted our exclusive solution for the Gulf region. This unique offering helps organizations comply with local regulations by securely storing all data locally, thereby ensuring privacy and protection. He also discussed the crucial role of an interactive malware sandbox within an organization&#8217;s security perimeter, emphasizing how it empowers businesses to stay ahead of cyber threats while saving valuable time and resources.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Interactive malware sandbox: An important piece in the cybersecurity puzzle, says ANY.RUN exec\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/4cHH9YcikLc?start=1&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>  \n<\/div><figcaption class=\"wp-element-caption\">ANY.RUN&#8217;s interview for ITP<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up&nbsp;<\/h2>\n\n\n\n<p>GISEC 2023 was an absolute blast this year. We want to extend a massive thank you to everyone who came to visit us\u2014chatting about cybersecurity with you was such a delight! And if you couldn&#8217;t make it this time, we hope to catch you at the next GISEC!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN malware sandbox was thrilled to join GISEC 2023 from March 14-16, hosted at the Dubai World Trade Centre.\u00a0 This exciting gathering united top cybersecurity experts from around the world, who showcased their cutting-edge solutions designed to keep us all protected in the digital realm.\u00a0 We were beyond thrilled to chat with partners, colleagues, and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4598,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,69,10],"class_list":["post-4591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-conference","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN at GISEC 2023\u00a0<\/title>\n<meta name=\"description\" content=\"ANY.RUN malware sandbox was thrilled to join GISEC 2023 from March 14-16, hosted at the Dubai World Trade Centre.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN at GISEC 2023\u00a0\",\"datePublished\":\"2023-03-23T06:53:10+00:00\",\"dateModified\":\"2023-03-23T06:54:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/\"},\"wordCount\":526,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"conference\",\"cybersecurity\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/\",\"name\":\"ANY.RUN at GISEC 2023\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-03-23T06:53:10+00:00\",\"dateModified\":\"2023-03-23T06:54:07+00:00\",\"description\":\"ANY.RUN malware sandbox was thrilled to join GISEC 2023 from March 14-16, hosted at the Dubai World Trade Centre.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN at GISEC 2023\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN at GISEC 2023\u00a0","description":"ANY.RUN malware sandbox was thrilled to join GISEC 2023 from March 14-16, hosted at the Dubai World Trade Centre.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN at GISEC 2023\u00a0","datePublished":"2023-03-23T06:53:10+00:00","dateModified":"2023-03-23T06:54:07+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/"},"wordCount":526,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","conference","cybersecurity"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/","name":"ANY.RUN at GISEC 2023\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-03-23T06:53:10+00:00","dateModified":"2023-03-23T06:54:07+00:00","description":"ANY.RUN malware sandbox was thrilled to join GISEC 2023 from March 14-16, hosted at the Dubai World Trade Centre.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/any-run-at-gisec-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN at GISEC 2023\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4591"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4591"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4591\/revisions"}],"predecessor-version":[{"id":4599,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4591\/revisions\/4599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4598"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}