{"id":11514,"date":"2024-07-12T12:12:35","date_gmt":"2024-07-12T10:12:35","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=11514"},"modified":"2024-11-21T14:11:24","modified_gmt":"2024-11-21T13:11:24","slug":"dns-servers","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2024\/07\/12\/dns-servers\/","title":{"rendered":"THREAT INTEL: DNS &#8211; Domain Name System servers act as modern-day switchboards &#8230;"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11514\" class=\"elementor elementor-11514\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d327f16 e-flex e-con-boxed e-con e-parent\" data-id=\"4d327f16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3aac580e elementor-widget elementor-widget-html\" data-id=\"3aac580e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1101loxy2\/creativeref:1101l50786\" rel=\"sponsored noopener\" target=\"_blank\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1101loxy2\/creativeref:1101l50786\" width=\"1456\" height=\"180\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-273f61f7 e-con-full e-flex e-con e-parent\" data-id=\"273f61f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6c4199d e-con-full e-flex e-con e-child\" data-id=\"6c4199d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77450c11 elementor-widget elementor-widget-image\" data-id=\"77450c11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.flickr.com\/photos\/groovysoup\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"200\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059-300x200.jpg\" class=\"attachment-medium size-medium wp-image-11511\" alt=\"confident-call-center-operator-talking-with-client_74855-4059\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059-300x200.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg 740w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: pch.vector\/Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d86b98c elementor-widget elementor-widget-html\" data-id=\"3d86b98c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<a href=\"https:\/\/prf.hn\/click\/camref:1100loHrP\/creativeref:1011l114168\" rel=\"sponsored noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/creative.prf.hn\/source\/camref:1100loHrP\/creativeref:1011l114168\" width=\"1080\" height=\"1080\" border=\"0\"\/><\/a>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32796c30 e-con-full e-flex e-con e-child\" data-id=\"32796c30\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-452cfbaa elementor-widget elementor-widget-wp-widget-text\" data-id=\"452cfbaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p>Gibraltar: Friday 12 July 2024 at 11:30 CET<\/p>\n<p><strong>THREAT INTEL: DNS &#8211; Domain Name System (DNS) servers act as modern-day switchboards, directing and connecting Internet traffic.\u00a0<\/strong><\/p>\n<p>By Andy Jenkinson \u2013 Guest Contributor |\u00a0 Group CEO\u00a0<a href=\"https:\/\/www.cybersecip.com\/\" target=\"_blank\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\nvia <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">CYBERInsights<\/a><br \/>\nFirst for\u00a0<a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=sme+cybersecurity+news&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">SME Cybersecurity News<\/a><br \/>\n<a href=\"https:\/\/www.google.com\/search?q=Domain+Name+System+servers+act+as+modern-day+switchboards+%E2%80%A6&amp;sca_esv=8c2b0740c73d74e6&amp;sca_upv=1&amp;sxsrf=ADLYWIKqDqFaYY818q2_UHSrilcTTrgagQ%3A1721047614135&amp;ei=PhqVZvvzB_GHxc8PwKygsAY&amp;ved=0ahUKEwj7irr9iamHAxXxQ_EDHUAWCGYQ4dUDCA8&amp;uact=5&amp;oq=Domain+Name+System+servers+act+as+modern-day+switchboards+%E2%80%A6&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAaAhgCIj1Eb21haW4gTmFtZSBTeXN0ZW0gc2VydmVycyBhY3QgYXMgbW9kZXJuLWRheSBzd2l0Y2hib2FyZHMg4oCmMgUQIRigAUjAElAAWOYEcAF4AJABAJgBnAKgAZwCqgEDMi0xuAEDyAEA-AEB-AECmAICoAK_AqgCCsICBxAjGCcY6gLCAhAQLhijAxgnGKgDGOoCGIsDmAMWkgcFMS4wLjGgB5sC&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on 120724 at 12:30 CET<\/a><\/p>\n<p><em>#CyberInsights #SMECybersecurityNews #Cybersecurity #WhitethornShield #InternetSecurity #DNS #PKI<\/em><\/p>\n<p><strong><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">In the early days of telephony, human operators manually connected calls.<\/span><\/span><\/strong><\/p>\n<p><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">Theses people were Human <strong>DNS<\/strong> operatives.<\/span><\/span><\/p>\n<div class=\" mr2\">\n<div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>This quaint scenario mirrors today&#8217;s digital landscape where <strong>Domain Name System (DNS)<\/strong> servers act as modern-day switchboards, directing and connecting Internet traffic.<\/p>\n<p>However, errors and lax security in this digital &#8216;exchange&#8217; results in misdirected connections and a ripe, almost lawless environment for <strong>Cybercrime<\/strong>.<\/p>\n<p>Today, just as old telephone lines were susceptible to being tapped, our Internet connections are vulnerable. <strong>DNS<\/strong> errors lead to <strong>DNS<\/strong> Tampering and Abuse allowing users to be misdirected to fraudulent websites, surveyed, and enabling criminals to steal sensitive data.<\/p>\n<p>Lax security protocols open doors for hackers to monitor, intercept, and manipulate communications.<\/p>\n<p>This digital evolution has exponentially increased the speed and scale of damage, costs, and losses. While we&#8217;ve revolutionized communication, we&#8217;ve also inadvertently facilitated <strong>Cybercrime<\/strong>, serving it on a silver platter to anyone with malicious intent.<\/p>\n<p>The analogy is clear: as we innovate and improve our systems, the stakes and exposures rise.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a32d8c elementor-widget elementor-widget-image\" data-id=\"4a32d8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"353\" height=\"360\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_120724.jpg\" class=\"attachment-large size-large wp-image-11517\" alt=\"AJ_120724\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_120724.jpg 353w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/AJ_120724-294x300.jpg 294w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39f722b7 elementor-widget elementor-widget-wp-widget-text\" data-id=\"39f722b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><div class=\"feed-shared-inline-show-more-text feed-shared-update-v2__description feed-shared-inline-show-more-text--minimal-padding feed-shared-inline-show-more-text--expanded \">\n<div class=\"update-components-text relative update-components-update-v2__commentary \" dir=\"ltr\">\n<p>Our advances in communication have, by errors, negligence, and default, also have accelerated the capabilities of <strong>Cybercriminals<\/strong>. That crime is enabled and facilitated by INSECURE third party suppliers and our own organizations.<\/p>\n<p>Vigilance and robust security measures are essential to protect against the digital threats that loom over our increasingly connected world. There truly is nothing new under the sun; we&#8217;ve simply accelerated the exposure and consequences of our exposed and exploitable vulnerabilities.<\/p>\n<p><a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cybersec-innovation-partners\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cybersec Innovation Partners<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/gchq\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">GCHQ<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/jisc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Jisc<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cloudflare\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Cloudflare<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/central-intelligence-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">Central Intelligence Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-cyber-security-centre\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Cyber Security Centre<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/national-security-agency\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">National Security Agency<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fbicyber\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">FBI Cyber Division<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/bbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">BBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/itv-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ITV News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/cnbc\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CNBC<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/abcnews\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">ABC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/fox-news-channel\/?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BDGz1Ibg3SMiONtT128vA4A%3D%3D\" target=\"_self\" data-test-app-aware-link=\"\" data-ntt-old-href=\"https:\/\/www.linkedin.com\/company\/fox-news-channel\/\" rel=\"noopener\">Fox News Media<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/company\/nbc-news\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">NBC News<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=intenretsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7217423202723999746\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">IntenretSecurity<\/a><br \/>\n<a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=dns&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7217423202723999746\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">DNS<\/a> <a class=\"app-aware-link \" href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=pki&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7217423202723999746\" data-test-app-aware-link=\"\" target=\"_blank\" rel=\"noopener\">PKI<\/a>,<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12538d50 e-con-full e-flex e-con e-child\" data-id=\"12538d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bd2193e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4bd2193e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5277757b elementor-widget elementor-widget-wp-widget-text\" data-id=\"5277757b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong><span lang=\"en-GB\">About Andy Jenkinson<\/span><\/strong><\/p>\n<p><strong><span lang=\"en-GB\">Group CEO CIP. Fellow Cyber Theory Institute. Director Fintech &amp; Cyber Security Alliance (FITCA) working with Governments. Recognised Expert in Internet Asset &amp; DNS Vulnerabilities.<\/span><\/strong><\/p>\n<p>Andy Jenkinson is a senior and seasoned innovative Executive with over 30 years\u2019 experience as a hands-on lateral thinking CEO, coach, and leader. A \u2018big deal\u2019 business accelerator, and inspirational, lateral thinker, Andy has crafted, created, and been responsible for delivering 100\u2019s \u00a3 millions of projects within the Cyber, Technical, Risk and Compliance markets for some of the world\u2019s largest, leading organisations. Andy has a demonstrable track record of largescale technical delivery and management within many sectors including the Professional, Managed, and Financial Services.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4023796a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4023796a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.linkedin.com\/in\/andy-jenkinson-96210727\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26d3ec11 e-flex e-con-boxed e-con e-parent\" data-id=\"26d3ec11\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: pch.vector\/Freepik Learn More \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":11511,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[440],"tags":[439],"ppma_author":[415],"class_list":["post-11514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberthreat-intel","tag-cyberthreat-intel"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg",740,493,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059-300x200.jpg",300,200,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg",640,426,false],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg",640,426,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg",740,493,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg",740,493,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059.jpg",740,493,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/07\/confident-call-center-operator-talking-with-client_74855-4059-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/cyberthreat-intel\/\" rel=\"category tag\">SME CYBER\/THREAT INTEL<\/a>","tag_info":"SME CYBER\/THREAT INTEL","comment_count":"0","authors":[{"term_id":415,"user_id":0,"is_guest":1,"slug":"cybersecurity-journalist-iain-fraser","display_name":"Cybersecurity Journalist - Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=11514"}],"version-history":[{"count":12,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11514\/revisions"}],"predecessor-version":[{"id":11610,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/11514\/revisions\/11610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/11511"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=11514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=11514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=11514"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=11514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}