{"id":6588,"date":"2023-02-26T01:19:40","date_gmt":"2023-02-26T01:19:40","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/target\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/"},"modified":"2023-05-18T10:46:06","modified_gmt":"2023-05-18T10:46:06","slug":"popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/","title":{"rendered":"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex file transfer application.<\/p>\n<p>This vulnerability, identified by CISA as CVE-2022-47986, is one of three flaws in the Mitel corporate communication platform that were added to the organization&#8217;s catalogue of exploitable flaws this week.<\/p>\n<p>Several security researchers had previously issued warnings before to today&#8217;s release. On January 18, IBM released a fix.<\/p>\n<p>The deadline for federal civilian agencies to patch the vulnerability, which has a CVSS score of 9.8 out of 10, is March 14th.<\/p>\n<p>According to the CEO of a cybersecurity firm, Aspera is so popular that it was awarded an Emmy in 2014 for facilitating speedier media production processes by allowing businesses to exchange huge video files in a short amount of time.<\/p>\n<p>According to Broomhead, Aspera has been the go-to option for many years for businesses in industries such as genomics and biomedical research, media production, military signals intelligence, and financial services that need to move massive datasets.<\/p>\n<p>Broomhead further noted that the vulnerability is simple to exploit and would allow a remote attacker to bypass network authentication procedures in order to gain control of the targeted server.<\/p>\n<p>138 instances of Aspera Faspex are available to the public, according to a search on the internet scanning engine Shodan. In addition to IBM, cybersecurity firm ShadowServer has stated it has witnessed exploit attempts since the patch was released.<\/p>\n<p>After alerting IBM on October 6, the security firm AssetNote said it waited a week to publish the attack code on its blog.<\/p>\n<p>According to Ryan Cribelar of Nucleus Security, the technique is frequently employed by major corporations for the rapid and secure transmission of massive files and data sets over great distances.<\/p>\n<p>It&#8217;s used in the private and public sectors, including the healthcare and financial sectors. Given the product&#8217;s longevity and the fact that most businesses use many IBM products if they use any, he concluded that it must have a sizable customer base. &#8220;It&#8217;s an IBM product, so you can assume a large customer base,&#8221; he said.<\/p>\n<p>Cribelar said the flaw is appealing to attackers for two reasons.<\/p>\n<p>He explained that when internal vulnerability management programmes evolve, &#8220;it might live on a device that doesn&#8217;t get as consistent scanning coverage as other devices,&#8221; and the responsibility for the device&#8217;s upkeep could be forgotten. According to the researchers, &#8220;these two factors can allow for the vulnerability to have a longer lifetime on the device.&#8221;<\/p>\n<p>Cribelar further noted that the susceptible software is often located on the network&#8217;s outer perimeter, providing hackers with a valuable entry point into the system of an unsuspecting victim without fear of being discovered too soon.<\/p>\n<p>After last week&#8217;s extensive attacks on the GoAnywhere MFT file-transfer software, which led to a breach at one of the largest healthcare providers in the United States affecting more than 1 million people, this is the latest file transfer technology to be abused.<\/p>\n<p>More than 130 businesses were compromised by the Clop ransomware group, according to an announcement made to BleepingComputer.<\/p>\n<p>In 2021, hackers exploited flaws in another file transmission service, Accellion, to routinely attack banks, governments, schools, and businesses.[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,51],"tags":[],"class_list":{"0":"post-6588","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-attack","7":"category-vulnerabilities"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Popular IBM file transfer tool vulnerable to cyberattacks, CISA says - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-26T01:19:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-18T10:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hacker-stealing-information-hacking-internet-dark-face-made-by-aiartificial-intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says\",\"datePublished\":\"2023-02-26T01:19:40+00:00\",\"dateModified\":\"2023-05-18T10:46:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/\"},\"wordCount\":705,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"articleSection\":[\"Cyber Attack\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/\",\"name\":\"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"datePublished\":\"2023-02-26T01:19:40+00:00\",\"dateModified\":\"2023-05-18T10:46:06+00:00\",\"description\":\"The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says - Sajin Shivdas | Cybersecurity","description":"The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/","og_locale":"en_US","og_type":"article","og_title":"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says - Sajin Shivdas | Cybersecurity","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-02-26T01:19:40+00:00","article_modified_time":"2023-05-18T10:46:06+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hacker-stealing-information-hacking-internet-dark-face-made-by-aiartificial-intelligence.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says","datePublished":"2023-02-26T01:19:40+00:00","dateModified":"2023-05-18T10:46:06+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/"},"wordCount":705,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"articleSection":["Cyber Attack","Vulnerabilities"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/","name":"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"datePublished":"2023-02-26T01:19:40+00:00","dateModified":"2023-05-18T10:46:06+00:00","description":"The Cybersecurity and Infrastructure Security Agency (CISA) reports that criminal Hackers are actively exploiting a critical flaw in the IBM Aspera Faspex","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Popular IBM file transfer tool vulnerable to cyberattacks, CISA says"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6588"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6588\/revisions"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}