{"id":2114,"date":"2018-04-24T13:23:55","date_gmt":"2018-04-24T07:53:55","guid":{"rendered":"https:\/\/codelattice.com\/blog\/?p=2114"},"modified":"2021-03-03T11:09:29","modified_gmt":"2021-03-03T05:39:29","slug":"five-big-risks-on-the-cyber-security-radar-in-2018","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/","title":{"rendered":"Five Big Risks on the Cyber Security Radar in 2018"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">Cyber Security is the protection of the integrity of data, files, network, and programs\u00a0<\/span><span style=\"font-weight: 400;\">from cyber-attacks and unauthorized access.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">As per Forbes, the global cybersecurity market is expected to grow to 170 billion by\u00a0<\/span><span style=\"font-weight: 400;\">2020.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">Hackers today are way smarter than the breakers and they figure out ways much\u00a0<\/span><span style=\"font-weight: 400;\">faster for destruction.\u00a0<\/span><span style=\"font-weight: 400;\">With a new year we have new threats, what could these be?<\/span><\/p>\n<ol style=\"text-align: left;\">\n<li><b> Ransomware: <\/b><span style=\"font-weight: 400;\">Last year has seen the worst of Ransomware attacks and the\u00a0<\/span>ever-lasting effects of it. The biggest example of the past years being the NotPetya ransomware attack to FedEx-owned TNT, which made the company in operational. The damage was huge and affected the TNT business, bringing it to an abrupt halt. Ransomware is exactly the same as kidnapping somebody and asking money in return. Here in place of a person, it\u2019s your data which is as good as an individual or maybe more useful! (Evil laugh). Bigger giants have it all ready to fight against them, it those tiny little trinkets who will have to bear with it.<\/li>\n<\/ol>\n<ol style=\"text-align: left;\" start=\"2\">\n<li><b> AI-Based Attacks:<\/b><span style=\"font-weight: 400;\"> Know that neighbourhood kid who always comes up with\u00a0<\/span>new ways to bug you, AI does the same to your data. AI software can learn from the past event and develop defense mechanism to avoid such attacks again. But today the experts are worried that the attackers may develop ways to enhance the attacks using AI. For example, AI can assist hackers to decode passwords by providing probable passwords based on demographics.<\/li>\n<\/ol>\n<ol style=\"text-align: left;\" start=\"3\">\n<li><b> Social Media Threats: <\/b><span style=\"font-weight: 400;\">Social Media=Facebook. Remember those pop-ups\u00a0<\/span>with all those stupid games asking to fill your information and showing your marriage dates? They are a trap! They just take the information out of you and when you are least expecting it, bam, they attack. Though this is anticipated for future it has actually started happening with the recent security breach accepted by Facebook.<\/li>\n<\/ol>\n<ol style=\"text-align: left;\" start=\"4\">\n<li><b> Cyber-Physical Attacks:<\/b><span style=\"font-weight: 400;\"> What if your local bus or metros come to an abrupt\u00a0<\/span>halt? Simple, you can have a rainy day and there\u2019s no need to go to the dreaded place- office\/college. Hacks affecting the public domain and transportation system are likely to take place in 2018. They will either cause the destruction of systems resulting in shut down or will act as the ransomware and ask for monetary benefits to resume the services.<\/li>\n<\/ol>\n<ol style=\"text-align: left;\" start=\"5\">\n<li><b> Mining Crypto Currencies: <\/b><span style=\"font-weight: 400;\">Wherever there is money there is an attack.\u00a0<\/span>Bitcoin holders are at an all-time high-risk today. The concept being a new one is prone to hacking. To get these currencies you need to solve complex computer algorithms, and as this grows, hackers too will develop interest\u00a0towards finding out more ways to breach this information.<\/li>\n<\/ol>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">With the enforcement of GDPR- General Data Protection Regulation in Europe on\u00a0<\/span><span style=\"font-weight: 400;\">May 25 th , 2018, data protection seems to be becoming a global need. The regulation\u00a0<\/span><span style=\"font-weight: 400;\">will force companies to take faster action in reporting a data breach to customers. By\u00a0<\/span><span style=\"font-weight: 400;\">failing to report data breach within 72 hours, they will be penalized up to 20 billion\u00a0<\/span><span style=\"font-weight: 400;\">euros or 4% of the revenue, whichever is higher. The regulation is required in other\u00a0<\/span><span style=\"font-weight: 400;\">parts of the world as well to reduce the cybersecurity risk.<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">You need to be prepared and have a defence mechanism ready to deal with Cyber\u00a0<\/span><span style=\"font-weight: 400;\">criminals, as you sure cannot avoid it.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Cyber Security is the protection of the integrity of data, files, network, and programs\u00a0from cyber-attacks and unauthorized access. As per Forbes, the global cybersecurity market is expected to grow to 170 billion by\u00a02020. Hackers today are way smarter than the breakers and they figure out ways much\u00a0faster for destruction.\u00a0With a new year we have [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":2129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[378],"tags":[],"class_list":["post-2114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security"],"acf":{"heading_txt":"","webp":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Five Big Risks on the Cyber Security Radar in 2018 - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Big Risks on the Cyber Security Radar in 2018 - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-24T07:53:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-03T05:39:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp\" \/>\n<meta name=\"author\" content=\"Adheena Prakash\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Five Big Risks on the Cyber Security Radar in 2018\" \/>\n<meta name=\"twitter:description\" content=\"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adheena Prakash\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\"},\"author\":{\"name\":\"Adheena Prakash\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2018-04-24T07:53:55+00:00\",\"dateModified\":\"2021-03-03T05:39:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\"},\"wordCount\":555,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/h1.jpg\",\"articleSection\":[\"Cloud &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\",\"name\":\"Five Big Risks on the Cyber Security Radar in 2018 - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/h1.jpg\",\"datePublished\":\"2018-04-24T07:53:55+00:00\",\"dateModified\":\"2021-03-03T05:39:29+00:00\",\"description\":\"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp\",\"width\":600,\"height\":344,\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1\",\"name\":\"Adheena Prakash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g\",\"caption\":\"Adheena Prakash\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Big Risks on the Cyber Security Radar in 2018 - Codelattice Blog","description":"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/","og_locale":"en_US","og_type":"article","og_title":"Five Big Risks on the Cyber Security Radar in 2018 - Codelattice Blog","og_description":"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.","og_url":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_published_time":"2018-04-24T07:53:55+00:00","article_modified_time":"2021-03-03T05:39:29+00:00","og_image":[{"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp","type":"","width":"","height":""}],"author":"Adheena Prakash","twitter_card":"summary_large_image","twitter_title":"Five Big Risks on the Cyber Security Radar in 2018","twitter_description":"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.","twitter_image":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp","twitter_creator":"@Codelattice","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Adheena Prakash","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/"},"author":{"name":"Adheena Prakash","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1"},"headline":"Codelattice Blog","datePublished":"2018-04-24T07:53:55+00:00","dateModified":"2021-03-03T05:39:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/"},"wordCount":555,"commentCount":0,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/h1.jpg","articleSection":["Cloud &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/","url":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/","name":"Five Big Risks on the Cyber Security Radar in 2018 - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/h1.jpg","datePublished":"2018-04-24T07:53:55+00:00","dateModified":"2021-03-03T05:39:29+00:00","description":"The biggest example of the past years being the NotPetya ransomware attack on FedEx-owned TNT, which made the company operational.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp","width":600,"height":344,"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-33.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/five-big-risks-on-the-cyber-security-radar-in-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1","name":"Adheena Prakash","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g","caption":"Adheena Prakash"}}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=2114"}],"version-history":[{"count":2,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2114\/revisions"}],"predecessor-version":[{"id":3312,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2114\/revisions\/3312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/2129"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=2114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=2114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=2114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}