{"id":7718,"date":"2021-04-23T07:38:05","date_gmt":"2021-04-23T07:38:05","guid":{"rendered":"https:\/\/www.techmagazines.net\/?p=7718"},"modified":"2023-01-18T06:06:16","modified_gmt":"2023-01-18T06:06:16","slug":"insecure-vpns-are-a-leading-ransomware-attack-vector","status":"publish","type":"post","link":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/","title":{"rendered":"Insecure VPNs are a Leading Ransomware Attack Vector"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19, cybercriminals exploited the increased use of <a href=\"https:\/\/www.catonetworks.com\/blog\/rethinking-enterprise-remote-access-vpn-solutions-designing-scalable-vpn-connectivity\/\">enterprise VPN solutions<\/a> to spread their malware.<\/p>\n\n\n\n<p><strong>VPN Infrastructure Creates Security Gaps<\/strong><\/p>\n\n\n\n<p>The COVID-19 pandemic provided a number of opportunities for cybercriminals. As organizations suddenly transitioned to a mostly or wholly remote workforce, new security risks and attack vectors were created.<\/p>\n\n\n\n<p>One of the most common responses to the COVID-19 pandemic was increased usage of VPN infrastructure. <a href=\"https:\/\/mejoresvpn.com\/servidor-vpn-argentina\/\">VPN argentina<\/a> provides the ability for remote workers to securely access the enterprise network.<\/p>\n\n\n\n<p>However, they also create significant security challenges for an organization. VPNs are designed to act as a gatekeeper to an organization\u2019s network. This means that they need to be exposed to the public Internet and provide access to the private corporate network.<\/p>\n\n\n\n<p>With VPNs, the barrier between the public Internet and private enterprise network is defined by software. Vulnerabilities in this software &#8211; which are common &#8211; provide cybercriminals with access to the enterprise network.<\/p>\n\n\n\n<p><br><strong>VPNs are the Primary Ransomware Infection Vector<\/strong><\/p>\n\n\n\n<p>In the wake of COVID-19, the widespread shift to remote work focused cybercriminals\u2019 attention and efforts on telework solutions. While tools like the remote desktop protocol (RDP) were the most common ransomware infection vector, VPN vulnerabilities weren\u2019t far behind.<\/p>\n\n\n\n<p>The focus on VPNs as a ransomware infection vector was driven by a number of different factors, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Increased Adoption:<\/strong> With COVID-19, VPN usage by organizations and their employees surged. This meant that more organizations deployed potentially vulnerable VPN infrastructure and that attacks could be lost in the noise.<\/li>\n\n\n\n<li><strong>Common Vulnerabilities:<\/strong> A number of exploitable vulnerabilities have been discovered and reported in VPN software. This provides cybercriminals with numerous options to try to gain access to enterprise networks.<\/li>\n\n\n\n<li><strong>Poor Patch Practices:<\/strong> Patch management is a common struggle, and the high availability requirements of VPNs for an organization with a remote workforce exacerbate this issue. As a result, publicly-known vulnerabilities in VPN software remain unpatched.<\/li>\n\n\n\n<li><strong>Limited Access Control:<\/strong> VPNs authenticate users of the software but provide them with full access to the enterprise network. This makes them an ideal solution for cybercriminals wishing to distribute ransomware or otherwise attack an organization.<\/li>\n<\/ul>\n\n\n\n<p>The combination of widespread adoption and insecure software make VPNs a valuable tool for cybercriminals.<\/p>\n\n\n\n<p><strong>Minimizing the Security Threats of Remote Access Solutions<\/strong><\/p>\n\n\n\n<p>VPNs have their problems both in terms of performance and security. Many organizations adopted VPNs during the COVID-19 pandemic because they were a familiar technology that they already had in place. However, during the pandemic, overwhelmed VPN infrastructure impaired employee productivity and network performance.<\/p>\n\n\n\n<p>In the wake of the pandemic, many organizations are looking to more permanently support remote work. However, with this extended support comes the need to ensure that their telework infrastructure meets the needs of the business. While the performance limitations of VPNs are a more visible issue, the security issues of VPN infrastructure are equally important.<\/p>\n\n\n\n<p>For this reason, many organizations are looking for alternatives to traditional VPN-based remote access solutions. A common choice is secure access service edge (SASE), which is a networking and security solution designed for the modern network. SASE is implemented as a network of cloud-based appliances that combine the network optimization of software-defined WAN (SD-WAN) with an integrated security stack. This combination allows traffic to be optimally and securely routed between any pair of geographically-distributed SASE points of present (PoPs) without losing traffic visibility or security.<\/p>\n\n\n\n<p>One of the security features of SASE solutions is zero-trust network access (ZTNA), which is also called a software-defined perimeter (SDP). ZTNA\/SDP is a replacement for VPNs that &#8211; when integrated into a SASE solution &#8211; provides a number of performance and security benefits, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Zero Trust Access:<\/strong> VPNs provide a user with unfettered access to the enterprise network, making it easy to spread ransomware or perform other attacks. With ZTNA\/SDP, access requests are granted on a case-by-case basis using zero trust principles, which limits the impact of a compromised account.<\/li>\n\n\n\n<li><strong>Integrated Security:<\/strong> VPNs perform no inspection of the traffic that they carry, making it easy to use them as a delivery method for ransomware. SASE PoPs integrate a full security stack, enabling them to inspect all traffic flowing over them before forwarding it to its destination.<\/li>\n\n\n\n<li><strong>Global Deployment:<\/strong> SASE PoPs are hosted in the cloud, meaning that they can be deployed anywhere. This eliminates the need to backhaul all business traffic through the enterprise network (via a VPN) for security inspection before forwarding it on to its actual destination.<\/li>\n\n\n\n<li><strong>Managed Security:<\/strong> VPNs are a leading ransomware attack vector because they commonly contain unpatched, exploitable vulnerabilities. SASE is available as a managed service, meaning that, if a vulnerability is discovered, the service provider is responsible for quickly fixing the issue, closing the security gap.<\/li>\n<\/ul>\n\n\n\n<p>SASE solutions are designed to meet the networking and security needs of the modern enterprise. At the same time, they also provide a solution to the explosion of ransomware attacks exploiting remote access solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"wpm_excerpt clearfix\"><p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19, cybercriminals exploited the increased &hellip;<\/p>\n<\/div>","protected":false},"author":1,"featured_media":796,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":["post-7718","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Insecure VPNs are a Leading Ransomware Attack Vector | Tech Magazine<\/title>\n<meta name=\"description\" content=\"Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insecure VPNs are a Leading Ransomware Attack Vector | Tech Magazine\" \/>\n<meta property=\"og:description\" content=\"Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&amp;ref=br_rs\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&amp;ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-23T07:38:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-18T06:06:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"585\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amit Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amit Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\"},\"author\":{\"name\":\"Amit Gupta\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"headline\":\"Insecure VPNs are a Leading Ransomware Attack Vector\",\"datePublished\":\"2021-04-23T07:38:05+00:00\",\"dateModified\":\"2023-01-18T06:06:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\",\"url\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\",\"name\":\"Insecure VPNs are a Leading Ransomware Attack Vector | Tech Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.techmagazines.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg\",\"datePublished\":\"2021-04-23T07:38:05+00:00\",\"dateModified\":\"2023-01-18T06:06:16+00:00\",\"description\":\"Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg\",\"width\":585,\"height\":340},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techmagazines.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insecure VPNs are a Leading Ransomware Attack Vector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techmagazines.net\/#website\",\"url\":\"https:\/\/www.techmagazines.net\/\",\"name\":\"Tech Magazines\",\"description\":\"Best Digital Tech Magazines Site\",\"publisher\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techmagazines.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2\",\"name\":\"Amit Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"contentUrl\":\"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png\",\"width\":500,\"height\":125,\"caption\":\"Amit Gupta\"},\"logo\":{\"@id\":\"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/\"},\"description\":\"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.\",\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs\"],\"url\":\"https:\/\/www.techmagazines.net\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insecure VPNs are a Leading Ransomware Attack Vector | Tech Magazine","description":"Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/","og_locale":"en_US","og_type":"article","og_title":"Insecure VPNs are a Leading Ransomware Attack Vector | Tech Magazine","og_description":"Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19,","og_url":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/","og_site_name":"Tech Magazine","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs","article_author":"https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs","article_published_time":"2021-04-23T07:38:05+00:00","article_modified_time":"2023-01-18T06:06:16+00:00","og_image":[{"width":585,"height":340,"url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg","type":"image\/jpeg"}],"author":"Amit Gupta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amit Gupta","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#article","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/"},"author":{"name":"Amit Gupta","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"headline":"Insecure VPNs are a Leading Ransomware Attack Vector","datePublished":"2021-04-23T07:38:05+00:00","dateModified":"2023-01-18T06:06:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/"},"wordCount":849,"publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"image":{"@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg","articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/","url":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/","name":"Insecure VPNs are a Leading Ransomware Attack Vector | Tech Magazine","isPartOf":{"@id":"https:\/\/www.techmagazines.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage"},"image":{"@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg","datePublished":"2021-04-23T07:38:05+00:00","dateModified":"2023-01-18T06:06:16+00:00","description":"Ransomware has become the most damaging and expensive cyberattack in recent years. As organizations switched to remote work in response to COVID-19,","breadcrumb":{"@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#primaryimage","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/04\/ransomware.jpg","width":585,"height":340},{"@type":"BreadcrumbList","@id":"https:\/\/www.techmagazines.net\/insecure-vpns-are-a-leading-ransomware-attack-vector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techmagazines.net\/"},{"@type":"ListItem","position":2,"name":"Insecure VPNs are a Leading Ransomware Attack Vector"}]},{"@type":"WebSite","@id":"https:\/\/www.techmagazines.net\/#website","url":"https:\/\/www.techmagazines.net\/","name":"Tech Magazines","description":"Best Digital Tech Magazines Site","publisher":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techmagazines.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/9827714c3556d6a5d325c9af0386dac2","name":"Amit Gupta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/","url":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","contentUrl":"https:\/\/www.techmagazines.net\/wp-content\/uploads\/2019\/03\/cropped-technologies-2.png","width":500,"height":125,"caption":"Amit Gupta"},"logo":{"@id":"https:\/\/www.techmagazines.net\/#\/schema\/person\/image\/"},"description":"Amit Gupta is an experienced digital marketer, expert writer, and founder of Tech Magazine. With 5+ years in the industry, he specializes in creating in-depth content on Technology Updates, IoT, Gaming, Gadget, Web Development, and Artificial Intelligence. Connect on Facebook and Linkedin.","sameAs":["https:\/\/www.facebook.com\/profile.php?id=100007079021205&ref=br_rs"],"url":"https:\/\/www.techmagazines.net\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/7718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/comments?post=7718"}],"version-history":[{"count":2,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/7718\/revisions"}],"predecessor-version":[{"id":18594,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/posts\/7718\/revisions\/18594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media\/796"}],"wp:attachment":[{"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/media?parent=7718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/categories?post=7718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techmagazines.net\/wp-json\/wp\/v2\/tags?post=7718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}