{"id":14265,"date":"2023-08-28T12:58:25","date_gmt":"2023-08-28T12:58:25","guid":{"rendered":"https:\/\/flowactivo.org\/?p=14265"},"modified":"2024-01-09T12:47:51","modified_gmt":"2024-01-09T12:47:51","slug":"hackers-aws-uswhittakertechcrunch","status":"publish","type":"post","link":"https:\/\/flowactivo.org\/de\/hackers-aws-uswhittakertechcrunch\/","title":{"rendered":"Hackers Aws Uswhittakertechcrunch"},"content":{"rendered":"<p><img decoding=\"async\" class=\"wp-image-14266 size-full lazyload\" data-src=\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg\" alt=\"Hackers Aws Uswhittakertechcrunch\" width=\"612\" height=\"408\" data-srcset=\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg 612w, https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1-300x200.jpg 300w\" data-sizes=\"(max-width: 612px) 100vw, 612px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 612px; --smush-placeholder-aspect-ratio: 612\/408;\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Hackers aws uswhittakertechcrunch &#8211; In today&#8217;s interconnected world, cloud computing has become the cornerstone of modern businesses, enabling them to scale, innovate, and collaborate in ways that were previously unimaginable. Amazon Web Services (AWS), one of the leading cloud service providers, has been instrumental in this digital revolution. However, the very advantages that AWS offers in terms of accessibility, scalability, and ease of use also present potential vulnerabilities that malicious actors can exploit. One such instance is the notorious USWhittakerTechCrunch breach, a glaring reminder of the ever-evolving landscape of cyber threats and the critical importance of robust security measures in the cloud.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">1: AWS and the Digital Transformation: A Primer<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Before delving into the specifics of the USWhittakerTechCrunch breach, it&#8217;s crucial to understand the role AWS plays in today&#8217;s business landscape. AWS offers a vast array of cloud services, ranging from storage and computation to artificial intelligence and Internet of Things (IoT) solutions. This has fueled the rapid digital transformation of businesses, enabling them to streamline operations, reduce costs, and innovate at an unprecedented pace.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">2: The Anatomy of the USWhittakerTechCrunch Breach<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The USWhittakerTechCrunch breach sent shockwaves through the cybersecurity community, underscoring the potential vulnerabilities of even the most sophisticated cloud infrastructures. The breach, which occurred in the summer of 2022, targeted a diverse range of businesses hosted on AWS. The attackers exploited a combination of misconfigured security settings, weak access controls, and social engineering tactics to gain unauthorized access to sensitive data.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">3: Misconfigured Cloud Settings: A Hidden Threat<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Misconfigured cloud settings have emerged as a common weak point in cloud security, often acting as an open door for cybercriminals. In the case of the USWhittakerTechCrunch breach, the attackers identified misconfigured AWS S3 buckets that contained a treasure trove of confidential customer data. These misconfigurations left the data exposed to the public internet, a stark reminder that even a single oversight can have far-reaching consequences.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">4: The Role of Weak Access Controls<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Weak access controls amplify the risks associated with misconfigured settings. In the USWhittakerTechCrunch breach, the attackers exploited lax access controls, gaining unauthorized entry into the cloud environments of multiple businesses. This access allowed them to move laterally within the infrastructure, exfiltrating sensitive data and potentially leaving backdoors for future attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">5: Social Engineering: Manipulating the Human Element<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While technical vulnerabilities played a significant role in the breach, the attackers also leveraged social engineering techniques to infiltrate the target systems. Through carefully crafted phishing emails and deceptive communication, they managed to trick employees into revealing sensitive credentials or clicking on malicious links, providing the attackers with a foothold into the cloud infrastructure.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">6: Lessons Learned and Future Directions<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The USWhittakerTechCrunch breach serves as a stark reminder that cybersecurity is an ongoing process that demands continuous vigilance and adaptation. Cloud providers, including AWS, have since reinforced their security offerings with enhanced monitoring, automated security tools, and training resources to help customers safeguard their environments. Additionally, businesses have learned the importance of regular security audits, prompt patching, and a strong emphasis on employee cybersecurity training.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">7: The Road Ahead: Navigating Cloud Security Challenges<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As organizations continue their migration to the cloud, the need for proactive <a href=\"https:\/\/www.dhs.gov\/topics\/cybersecurity\" rel=\"nofollow noopener\" target=\"_blank\">cybersecurity<\/a> measures has never been more evident. The USWhittakerTechCrunch breach has propelled discussions around best practices for securing cloud environments, with a renewed emphasis on robust identity and access management, encryption, and the adoption of a &#8220;security-first&#8221; mindset throughout all levels of an organization.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion:<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The USWhittakerTechCrunch breach has shed light on the complex interplay between technology, human behavior, and the evolving threat landscape. While the breach was a harsh wake-up call, it has also spurred a collective effort to fortify cloud security practices, ensuring that the benefits of cloud computing are harnessed without compromising data integrity and customer trust. As technology continues to advance, so must our approach to security, and the lessons learned from incidents like this are invaluable as we navigate the uncharted territories of the digital age.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers aws uswhittakertechcrunch &#8211; In today&#8217;s interconnected world, cloud computing has become the cornerstone of modern businesses, enabling them to scale, innovate, and collaborate in ways that were previously unimaginable. Amazon Web Services (AWS), one of the leading cloud service providers, has been instrumental in this digital revolution. However, the very advantages that AWS offers [&hellip;]<\/p>\n","protected":false},"author":51,"featured_media":14266,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[45],"tags":[21429,22603,21428,21430],"class_list":["post-14265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-aws-and-the-digital-transformation","tag-aws-uswhittakertechcrunch","tag-hackers-aws-uswhittakertechcrunch","tag-uswhittakertechcrunch-breach"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Aws Uswhittakertechcrunch - Flowactivo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/flowactivo.org\/de\/hackers-aws-uswhittakertechcrunch\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Aws Uswhittakertechcrunch - Flowactivo\" \/>\n<meta property=\"og:description\" content=\"Hackers aws uswhittakertechcrunch &#8211; In today&#8217;s interconnected world, cloud computing has become the cornerstone of modern businesses, enabling them to scale, innovate, and collaborate in ways that were previously unimaginable. Amazon Web Services (AWS), one of the leading cloud service providers, has been instrumental in this digital revolution. However, the very advantages that AWS offers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/flowactivo.org\/de\/hackers-aws-uswhittakertechcrunch\/\" \/>\n<meta property=\"og:site_name\" content=\"Flowactivo\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-28T12:58:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T12:47:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"laxman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"laxman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/\"},\"author\":{\"name\":\"laxman\",\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/person\/69fddf11d5dba3c7b79756423a3abcdf\"},\"headline\":\"Hackers Aws Uswhittakertechcrunch\",\"datePublished\":\"2023-08-28T12:58:25+00:00\",\"dateModified\":\"2024-01-09T12:47:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/\"},\"wordCount\":654,\"publisher\":{\"@id\":\"https:\/\/flowactivo.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg\",\"keywords\":[\"AWS and the Digital Transformation\",\"aws uswhittakertechcrunch\",\"hackers aws uswhittakertechcrunch\",\"USWhittakerTechCrunch Breach\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/\",\"url\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/\",\"name\":\"Hackers Aws Uswhittakertechcrunch - Flowactivo\",\"isPartOf\":{\"@id\":\"https:\/\/flowactivo.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg\",\"datePublished\":\"2023-08-28T12:58:25+00:00\",\"dateModified\":\"2024-01-09T12:47:51+00:00\",\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage\",\"url\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg\",\"contentUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg\",\"width\":612,\"height\":408,\"caption\":\"Hackers Aws Uswhittakertechcrunch\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/flowactivo.org\/#website\",\"url\":\"https:\/\/flowactivo.org\/\",\"name\":\"Flowactivo\",\"description\":\"Stay Updated with the Latest Insights\",\"publisher\":{\"@id\":\"https:\/\/flowactivo.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/flowactivo.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/flowactivo.org\/#organization\",\"name\":\"Flowactivo\",\"url\":\"https:\/\/flowactivo.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png\",\"contentUrl\":\"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png\",\"width\":16,\"height\":16,\"caption\":\"Flowactivo\"},\"image\":{\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/flowactivo.org\/#\/schema\/person\/69fddf11d5dba3c7b79756423a3abcdf\",\"name\":\"laxman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5e85b34b030d004a813cc7c4a77e8dcde2b1389506c72bbe51befa3df6e6e9d7?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e85b34b030d004a813cc7c4a77e8dcde2b1389506c72bbe51befa3df6e6e9d7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e85b34b030d004a813cc7c4a77e8dcde2b1389506c72bbe51befa3df6e6e9d7?s=96&d=mm&r=g\",\"caption\":\"laxman\"},\"url\":\"https:\/\/flowactivo.org\/de\/author\/laxman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Aws Uswhittakertechcrunch - Flowactivo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/flowactivo.org\/de\/hackers-aws-uswhittakertechcrunch\/","og_locale":"da_DK","og_type":"article","og_title":"Hackers Aws Uswhittakertechcrunch - Flowactivo","og_description":"Hackers aws uswhittakertechcrunch &#8211; In today&#8217;s interconnected world, cloud computing has become the cornerstone of modern businesses, enabling them to scale, innovate, and collaborate in ways that were previously unimaginable. Amazon Web Services (AWS), one of the leading cloud service providers, has been instrumental in this digital revolution. However, the very advantages that AWS offers [&hellip;]","og_url":"https:\/\/flowactivo.org\/de\/hackers-aws-uswhittakertechcrunch\/","og_site_name":"Flowactivo","article_published_time":"2023-08-28T12:58:25+00:00","article_modified_time":"2024-01-09T12:47:51+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg","type":"image\/jpeg"}],"author":"laxman","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"laxman","Estimeret l\u00e6setid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#article","isPartOf":{"@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/"},"author":{"name":"laxman","@id":"https:\/\/flowactivo.org\/#\/schema\/person\/69fddf11d5dba3c7b79756423a3abcdf"},"headline":"Hackers Aws Uswhittakertechcrunch","datePublished":"2023-08-28T12:58:25+00:00","dateModified":"2024-01-09T12:47:51+00:00","mainEntityOfPage":{"@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/"},"wordCount":654,"publisher":{"@id":"https:\/\/flowactivo.org\/#organization"},"image":{"@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage"},"thumbnailUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg","keywords":["AWS and the Digital Transformation","aws uswhittakertechcrunch","hackers aws uswhittakertechcrunch","USWhittakerTechCrunch Breach"],"articleSection":["Technology"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/","url":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/","name":"Hackers Aws Uswhittakertechcrunch - Flowactivo","isPartOf":{"@id":"https:\/\/flowactivo.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage"},"image":{"@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage"},"thumbnailUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg","datePublished":"2023-08-28T12:58:25+00:00","dateModified":"2024-01-09T12:47:51+00:00","inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/flowactivo.org\/hackers-aws-uswhittakertechcrunch\/#primaryimage","url":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg","contentUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2023\/08\/istockphoto-1401155021-612x612-1.jpg","width":612,"height":408,"caption":"Hackers Aws Uswhittakertechcrunch"},{"@type":"WebSite","@id":"https:\/\/flowactivo.org\/#website","url":"https:\/\/flowactivo.org\/","name":"Flowactivo","description":"Hold dig opdateret med de nyeste indsigter","publisher":{"@id":"https:\/\/flowactivo.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/flowactivo.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/flowactivo.org\/#organization","name":"Flowactivo","url":"https:\/\/flowactivo.org\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/","url":"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png","contentUrl":"https:\/\/flowactivo.org\/wp-content\/uploads\/2021\/01\/favicon-16x16-1.png","width":16,"height":16,"caption":"Flowactivo"},"image":{"@id":"https:\/\/flowactivo.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/flowactivo.org\/#\/schema\/person\/69fddf11d5dba3c7b79756423a3abcdf","name":"laxman","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/secure.gravatar.com\/avatar\/5e85b34b030d004a813cc7c4a77e8dcde2b1389506c72bbe51befa3df6e6e9d7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5e85b34b030d004a813cc7c4a77e8dcde2b1389506c72bbe51befa3df6e6e9d7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e85b34b030d004a813cc7c4a77e8dcde2b1389506c72bbe51befa3df6e6e9d7?s=96&d=mm&r=g","caption":"laxman"},"url":"https:\/\/flowactivo.org\/de\/author\/laxman\/"}]}},"_links":{"self":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts\/14265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/comments?post=14265"}],"version-history":[{"count":2,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts\/14265\/revisions"}],"predecessor-version":[{"id":19337,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/posts\/14265\/revisions\/19337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/media\/14266"}],"wp:attachment":[{"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/media?parent=14265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/categories?post=14265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/flowactivo.org\/de\/wp-json\/wp\/v2\/tags?post=14265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}