
{"id":817,"date":"2010-10-22T09:15:33","date_gmt":"2010-10-22T12:15:33","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=817"},"modified":"2010-10-22T09:19:58","modified_gmt":"2010-10-22T12:19:58","slug":"supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/","title":{"rendered":"Supuesto video de pederastia propaga malware por correo"},"content":{"rendered":"<div>En  el d\u00eda de hoy nos han reportado un caso de malware que se propaga a  trav\u00e9s del m\u00e9todo t\u00edpico de enlaces a trav\u00e9s de correo electr\u00f3nico pero,  en este caso lo peculiar es que se anuncia un video de un padre  teniendo relaciones sexuales con su hijo.<\/div>\n<div><a href=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-819\" title=\"Dibujo3\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3-300x95.jpg\" alt=\"\" width=\"300\" height=\"95\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3-300x95.jpg 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3.jpg 833w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/div>\n<div>\n<div>\n<div>Como puede el enlace mostrado (HTML) no coincide con el real que apunta a un script PHP en otro servidor.<\/p>\n<p>Si el usuario ingresa al primer enlace HTML,ver\u00e1 la noticia de abril de  2010 sobre el video y efectivamente descargar\u00e1 un archivo <span style=\"text-decoration: underline;\">WMV pornogr\u00e1fico pero sin contenido pederasta<\/span>.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/1.bp.blogspot.com\/_sdv3yhG5CB4\/TL8Od5TxihI\/AAAAAAAAD_I\/RPJN_VypRoQ\/s320\/noticia.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"noticia\" src=\"http:\/\/1.bp.blogspot.com\/_sdv3yhG5CB4\/TL8Od5TxihI\/AAAAAAAAD_I\/RPJN_VypRoQ\/s320\/noticia.jpg\" alt=\"\" width=\"320\" height=\"222\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<div>\n<div>En cambio, si el usuario hace clic, se ejecuta el archivo PHP y se descarga un archivo ejecutable llamado <em>video-do-padre-pedofilo-fazendo-sexo-com-menor-mwv.exe<\/em> y que es <a href=\"http:\/\/www.virustotal.com\/file-scan\/report.html?id=af40508082b11d2164237d409dd7ce56c5075b310ca2295ffb577743e781b217-1287588343\">identificado por algunos antivirus<\/a> como un troyano.<\/p>\n<p>El archivo se aloja en un servidor vulnerado y que ha sido modificado previamente (deface):<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"Deface\" src=\"http:\/\/2.bp.blogspot.com\/_sdv3yhG5CB4\/TL8NxOcb6YI\/AAAAAAAAD_A\/G7NkX_g69pI\/s320\/deface.jpg\" alt=\"\" width=\"320\" height=\"305\" \/><\/p>\n<\/div>\n<\/div>\n<div>\n<div>En  el servidor se pueden encontrar muchos directorios (alrededor de 20) y  archivos que est\u00e1n siendo utilizados actualmente para propagar el  malware mencionado:<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"Directorios\" src=\"http:\/\/3.bp.blogspot.com\/_sdv3yhG5CB4\/TL8OF_hMZwI\/AAAAAAAAD_E\/h2utQ-8beAs\/s320\/directorios.jpg\" alt=\"\" width=\"320\" height=\"107\" \/><\/div>\n<\/div>\n<div>\n<div>\n<div>Todos  los archivos han sido creados en el d\u00eda de la fecha y seguramente ser\u00e1n  utilizados durante estos d\u00edas para maximizar la cantidad de usuarios  infectados.<\/p>\n<p><a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\"><\/a><\/p>\n<\/div>\n<div>Fuente: <a href=\"http:\/\/blog.segu-info.com.ar\/2010\/10\/supuesto-video-de-pedetastia-propaga.html#axzz135TlUN41\" target=\"_blank\">Segu-Info<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>En el d\u00eda de hoy nos han reportado un caso de malware que se propaga a trav\u00e9s del m\u00e9todo t\u00edpico de enlaces a trav\u00e9s de correo electr\u00f3nico pero, en este caso lo peculiar es que se anuncia un video de un padre teniendo relaciones sexuales con su hijo. Como puede el enlace mostrado (HTML) no [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-817","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Supuesto video de pederastia propaga malware por correo<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Santiago Trigo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/\"},\"author\":{\"name\":\"Santiago Trigo\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\"},\"headline\":\"Supuesto video de pederastia propaga malware por correo\",\"datePublished\":\"2010-10-22T12:15:33+00:00\",\"dateModified\":\"2010-10-22T12:19:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/\"},\"wordCount\":211,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3-300x95.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Supuesto video de pederastia propaga malware por correo\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3-300x95.jpg\",\"datePublished\":\"2010-10-22T12:15:33+00:00\",\"dateModified\":\"2010-10-22T12:19:58+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3.jpg\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3.jpg\",\"width\":\"833\",\"height\":\"265\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\",\"name\":\"Santiago Trigo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"caption\":\"Santiago Trigo\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Supuesto video de pederastia propaga malware por correo","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/","twitter_misc":{"Written by":"Santiago Trigo","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/"},"author":{"name":"Santiago Trigo","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3"},"headline":"Supuesto video de pederastia propaga malware por correo","datePublished":"2010-10-22T12:15:33+00:00","dateModified":"2010-10-22T12:19:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/"},"wordCount":211,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3-300x95.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/","url":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Supuesto video de pederastia propaga malware por correo","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3-300x95.jpg","datePublished":"2010-10-22T12:15:33+00:00","dateModified":"2010-10-22T12:19:58+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/supuesto-video-de-pederastia-propaga-malware-por-correo-leer-mas-noticias-de-seguridad-informatica-segu-info-supuesto-video-de-pederastia-propaga-malware-por-correo\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3.jpg","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2010\/10\/Dibujo3.jpg","width":"833","height":"265"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3","name":"Santiago Trigo","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","caption":"Santiago Trigo"},"sameAs":["http:\/\/www.talsoft.com.ar"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=817"}],"version-history":[{"count":5,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/817\/revisions"}],"predecessor-version":[{"id":821,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/817\/revisions\/821"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}