{"id":17075,"date":"2025-02-03T10:06:34","date_gmt":"2025-02-03T08:06:34","guid":{"rendered":"https:\/\/kordon.app\/?p=17075"},"modified":"2025-02-04T22:15:51","modified_gmt":"2025-02-04T20:15:51","slug":"top-information-security-risks-in-2025","status":"publish","type":"post","link":"https:\/\/kordon.app\/et\/top-information-security-risks-in-2025\/","title":{"rendered":"Top Information Security Risks to monitor in 2025"},"content":{"rendered":"<p>I know you&#8217;re well-versed in many of the threats we face in information security today. But even the most experienced among us can miss a beat in this dynamic landscape. That&#8217;s why I&#8217;ve put together this post. It&#8217;s designed to act as a&nbsp;<strong>comprehensive checklist of information security risks<\/strong>&nbsp;worth considering. I hope the list helps you spot any gaps in your current risk registry. And who knows, maybe some of the <strong>real-world examples<\/strong>&nbsp;come in handy for your next information security <strong>training preparation.<\/strong><\/p>\n\n\n\n<p>Remember, finding new risks isn&#8217;t just a part of the job\u2014it&#8217;s a step forward in\u00a0<strong>fortifying our defenses<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. <strong>Phishing<\/strong><\/h2>\n\n\n\n<p><strong>Phishing<\/strong>&nbsp;involves deceptive communications, usually emails, designed to trick recipients into divulging sensitive information. <\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>These attacks usually include&nbsp;<strong>social engineering tactics<\/strong>&nbsp;that take advantage of human emotions, like urgency or trust, to encourage action. They often imitate messages from trusted sources like&nbsp;<strong>banks, corporate IT teams<\/strong>, or well-known online services.<\/p>\n\n\n\n<p><strong>Impact<\/strong>&nbsp;The consequences of falling victim to a phishing attack can include: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the compromise of personal and&nbsp;<strong>corporate credentials<\/strong>, <\/li>\n\n\n\n<li>unauthorized transactions, access to&nbsp;<strong>confidential systems<\/strong>, <\/li>\n\n\n\n<li>and significant&nbsp;<strong>data breaches<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world example<\/strong> of a phishing attack<\/h3>\n\n\n\n<p><strong>In 2020, a major Twitter breach occurred involving a spear-phishing attack targeting the company&#8217;s employees.<\/strong> The attackers used\u00a0<strong>phone calls<\/strong>\u00a0to trick employees into providing credentials. The attackers claimed they were calling from\u00a0<strong>Twitter&#8217;s IT department<\/strong>\u00a0and needed the information to address a technical issue. With the obtained credentials, the attackers were able to access\u00a0<strong>Twitter&#8217;s internal systems<\/strong>\u00a0ja\u00a0<strong>high-profile user accounts<\/strong>, including those of celebrities and politicians. They used this access to execute a\u00a0<strong>cryptocurrency scam<\/strong>, resulting in over\u00a0<strong>$100,000<\/strong>\u00a0in fraudulent transactions (<a href=\"https:\/\/en.wikipedia.org\/wiki\/2020_Twitter_account_hijacking\" target=\"_blank\" rel=\"noopener\" title=\"\">Read more<\/a>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. <strong>Ransomware attacks<\/strong><\/h2>\n\n\n\n<p><strong>Ransomware<\/strong>&nbsp;is&nbsp;<strong>malicious software<\/strong>&nbsp;designed to block access to a data by&nbsp;<strong>encrypting<\/strong>&nbsp;it, until a sum of money is paid.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>These attacks often start with&nbsp;<strong>phishing emails<\/strong>&nbsp;that contain&nbsp;<strong>malicious attachments<\/strong>&nbsp;or links that, when opened or clicked, install the ransomware on the victim\u2019s system. It can also spread through exposed&nbsp;<strong>remote desktop protocols<\/strong>or&nbsp;<strong>unpatched vulnerabilities<\/strong>&nbsp;in software.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The consequences of a ransomware attack can be severe, ranging from&nbsp;<strong>operational disruption<\/strong>&nbsp;ja&nbsp;<strong>financial losses<\/strong>&nbsp;due to downtime to the potential loss of&nbsp;<strong>sensitive or proprietary data<\/strong>. Additionally, paying the ransom does not always guarantee that access will be restored or that the data will not be leaked. On average, companies might pay anywhere from&nbsp;<strong>tens of thousands to millions of dollars<\/strong>&nbsp;in ransom. In 2020, the average ransom payment was around&nbsp;<strong>$233,000<\/strong>, but this can vary widely depending on the size of the company and the critical nature of the encrypted data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world ransomware attack example<\/strong><\/h3>\n\n\n\n<p>In 2021, the&nbsp;<strong>Colonial Pipeline Company<\/strong>, the largest fuel pipeline operator in the United States, was attacked by a ransomware.The attack was carried out by a criminal cybergroup known as&nbsp;<strong>DarkSide<\/strong>. The attack led to the shutdown of approximately&nbsp;<strong>5,500 miles<\/strong>&nbsp;of pipeline, resulting in a significant disruption of fuel supply across the Eastern United States.<\/p>\n\n\n\n<p>The company ultimately paid a ransom of&nbsp;<strong>75 bitcoins (approximately $4.4 million at the time)<\/strong>&nbsp;to regain access to their systems. This incident not only highlighted the disruptive potential of ransomware but also the broader implications such attacks can have on national infrastructure and economic stability. Globally, ransomware attacks are estimated to have cost businesses over&nbsp;<strong>$20 billion<\/strong>&nbsp;in 2021, a figure that is expected to rise as attacks become more frequent and sophisticated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. <strong>Cloud security vulnerabilities<\/strong><\/h2>\n\n\n\n<p><strong>Cloud security vulnerabilities<\/strong>&nbsp;refer to weaknesses or flaws in cloud computing environments that can be exploited by attackers to gain unauthorized access, manipulate services, or steal data. These vulnerabilities often arise from misconfigurations, inadequate access controls, or insecure APIs.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>The common triggers include&nbsp;<strong>misconfigured cloud storage<\/strong>,&nbsp;<strong>lack of proper encryption<\/strong>,&nbsp;<strong>inadequate user authentication<\/strong>&nbsp;processes, and vulnerabilities within&nbsp;<strong>third-party services<\/strong>&nbsp;integrated into the cloud architecture. These issues can expose sensitive data and allow attackers to infiltrate cloud environments.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The impact of cloud security vulnerabilities can be extensive, leading to&nbsp;<strong>data breaches<\/strong>,&nbsp;<strong>service disruptions<\/strong>, and&nbsp;<strong>loss of customer trust<\/strong>. For businesses relying on cloud services, these vulnerabilities can result in substantial financial and reputational damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world example<\/strong> of a cloud security risk<\/h3>\n\n\n\n<p><strong>In 2019, a major data breach occurred at Capital One, facilitated by a AWS firewall configuration error in their use of Amazon Web Services (AWS).<\/strong>&nbsp;A former employee exploited this vulnerability to access the personal information of over&nbsp;<strong>100 million customers<\/strong>. The breach included sensitive data such as&nbsp;<strong>Social Security numbers, bank account numbers, and credit card applications<\/strong>. This incident not only led to significant financial penalties for Capital One but also raised serious concerns about the effectiveness of current security practices in cloud environments. (<a href=\"https:\/\/www.appsecengineer.com\/blog\/aws-shared-responsibility-model-capital-one-breach-case-study\" target=\"_blank\" rel=\"noopener\" title=\"\">Read more<\/a>)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Personal<strong> mobile device security risks<\/strong><\/h2>\n\n\n\n<p><strong>Mobile security threats involve unauthorized access, data leakage, and malicious attacks targeting mobile devices<\/strong>such as smartphones, tablets, and laptops. These threats exploit vulnerabilities within&nbsp;<strong>mobile operating systems, apps, and insecure networks<\/strong>.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>Common triggers include:the use of\u00a0<strong>unsecured Wi-Fi networks<\/strong>,\u00a0<strong>device theft or loss<\/strong>,\u00a0<strong>phishing attacks targeting mobile devices<\/strong>, and the installation of\u00a0<strong>malicious apps<\/strong>.\u00a0<strong>Inadequate device management<\/strong>\u00a0ja\u00a0<strong>lack of robust security policies<\/strong>\u00a0exacerbate these risks.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The consequences range from&nbsp;<strong>unauthorized access to sensitive data<\/strong>&nbsp;to the introduction of&nbsp;<strong>malware into corporate networks<\/strong>. Compromised mobile devices can lead to&nbsp;<strong>data breaches, financial loss<\/strong>, and significant damage to an organization\u2019s reputation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Hypothetical example of a mobile security threat<\/strong><\/h3>\n\n\n\n<p><br><strong>Imagine a scenario where a cybersecurity firm discovers a sophisticated attack targeting the mobile devices of employees at multiple multinational corporations.<\/strong>&nbsp;The attack involves a series of&nbsp;<strong>spear-phishing messages<\/strong>, crafted to mimic internal communications. When employees click on the links within these messages,&nbsp;<strong>stealthy malware<\/strong> is installed on their mobile devices. This malware is engineered to&nbsp;<strong>harvest credentials and sensitive corporate data<\/strong>, bypassing&nbsp;<strong>two-factor authentication systems<\/strong>&nbsp;seamlessly. It enables&nbsp;<strong>unauthorized access to critical business systems<\/strong>ja&nbsp;<strong>confidential data<\/strong>, including contract details and proprietary blueprints. Such a breach could lead to&nbsp;<strong>significant financial losses<\/strong>&nbsp;and severe threats to the&nbsp;<strong>integrity of corporate intellectual property<\/strong>, showcasing the devastating potential of mobile security vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Insider threats<\/strong><\/h2>\n\n\n\n<p><strong>Insider threats<\/strong> happen when current or former <strong>employees, contractors, or business partners<\/strong> with knowledge about the organization\u2019s <strong>security practices, data, and computer systems<\/strong> misuse their access, either on purpose or accidentally causing harm.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>These threats often arise from&nbsp;<strong>disgruntled employees<\/strong>&nbsp;seeking retaliation, employees&nbsp;<strong>inadvertently mishandling data<\/strong>, or through&nbsp;<strong>negligence<\/strong>&nbsp;that leads to security breaches. Additionally, well-meaning insiders may be&nbsp;<strong>manipulated by external parties<\/strong>&nbsp;to gain access to sensitive information.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The consequences of insider threats can be particularly devastating because they come from within and can&nbsp;<strong>bypass many traditional security measures<\/strong>. Impacts include&nbsp;<strong>data theft<\/strong>,&nbsp;<strong>financial fraud<\/strong>,&nbsp;<strong>intellectual property theft<\/strong>, and in severe cases,&nbsp;<strong>critical disruptions to business operations<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world example<\/strong> of an insider threat<\/h3>\n\n\n\n<p>In 2018, an incident at&nbsp;<strong>Tesla<\/strong>&nbsp;made headlines when an employee made code changes to the&nbsp;<strong>Tesla Manufacturing Operating System<\/strong>&nbsp;and exported large amounts of highly sensitive Tesla data to unknown third parties. The employee&#8217;s actions, reportedly in response to a workplace grievance, not only exposed&nbsp;<strong>proprietary information<\/strong>&nbsp;but also threatened the company\u2019s&nbsp;<strong>operational security<\/strong>&nbsp;ja&nbsp;<strong>competitive position<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. <strong>IoT security flaws<\/strong><\/h2>\n\n\n\n<p><strong>IoT security flaws<\/strong>&nbsp;refer to vulnerabilities in&nbsp;<strong>Internet of Things devices<\/strong>&nbsp;that can be exploited to gain unauthorized access, manipulate device functionality, or launch attacks on other systems.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>Common triggers include&nbsp;<strong>insecure device configurations<\/strong>,&nbsp;<strong>default passwords<\/strong>, and&nbsp;<strong>unpatched firmware vulnerabilities<\/strong>&nbsp;that make IoT devices easy targets for botnet recruitment.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The impact of IoT security flaws can lead to large-scale network disruptions, privacy violations, and significant damage to infrastructure. Exploited devices can become part of a&nbsp;<strong>botnet<\/strong>, used to execute coordinated attacks such as&nbsp;<strong>DDoS (Distributed Denial of Service)<\/strong>, which can cripple networks and services.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world example<\/strong> of IoT security flaw<\/h3>\n\n\n\n<p>In 2016, the&nbsp;<strong>Mirai botnet<\/strong>&nbsp;demonstrated the devastating potential of IoT security weaknesses. Mirai malware infected a large number of IoT devices, including IP cameras and home routers, by exploiting their default passwords and other security shortcomings. Once infected, these devices were used to launch massive&nbsp;<strong>DDoS attacks<\/strong>. One of the most notable attacks targeted the DNS service provider&nbsp;<strong>Dyn<\/strong>, leading to major internet platforms and services becoming unavailable, including&nbsp;<strong>Twitter, Netflix, and Reddit<\/strong>. This attack not only disrupted consumer services but also highlighted the potential national security implications of unsecured IoT devices. (Read more: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mirai_(malware)\" target=\"_blank\" rel=\"noopener\" title=\"\">Mirai<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/DDoS_attacks_on_Dyn\" target=\"_blank\" rel=\"noopener\" title=\"\">Dyn attacks<\/a>)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. <strong>Zero-day exploits<\/strong><\/h2>\n\n\n\n<p><strong>A zero-day exploit occurs when attackers use a previously unknown vulnerability <\/strong>in software or hardware before the developers have had the chance to issue a fix or patch.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>These vulnerabilities arise from undiscovered flaws within software or hardware. Attackers exploit these gaps quickly, taking advantage of the time it takes for the issue to be identified and patched.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The impact of zero-day exploits can be severe, including&nbsp;<strong>unauthorized access to sensitive data<\/strong>, system compromises, and&nbsp;<strong>widespread network disruption<\/strong>. These attacks often target large numbers of users before detection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world zero-day exploit example<\/strong> <\/h3>\n\n\n\n<p>In 2021, a zero-day exploit known as&nbsp;<em><strong>Hafnium<\/strong><\/em><strong>&nbsp;targeting Microsoft Exchange Servers<\/strong> was discovered. <strong>Attackers used these vulnerabilities to access email accounts, and install malware that created a backdoor to further infiltrate corporate networks. <\/strong>The exploit affected tens of thousands of organizations globally, including government bodies, policy think tanks, and infectious disease researchers, emphasizing the urgent need for vigilance against zero-day threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8. <strong>Supply chain attacks<\/strong><\/h2>\n\n\n\n<p>A supply chain attack occurs when a <strong>cyber attacker infiltrates a system through an outside partner<\/strong> or provider who has access to the systems and data <strong>rather than trying to attack you directly.<\/strong><\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>This risk often arises from<strong> inadequate security practices of third-party vendors or compromised software\/hardware used within the organization<\/strong>. Attackers exploit these vulnerabilities to gain unauthorized access.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The consequences of a supply chain attack can include the loss of sensitive or proprietary information, disruption of operational activities, financial losses, and damage to the organization&#8217;s reputation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world supply chain attack example<\/strong> <\/h3>\n\n\n\n<p>In the notable <strong>2020 SolarWinds attack<\/strong>, cybercriminals <strong>compromised the company\u2019s software development to inject malicious code into their software system<\/strong>. This software was then distributed to approximately 18,000 customers, including significant government agencies and Fortune 500 companies. The attack led to significant breaches of confidential data, highlighting the devastating impact of supply chain vulnerabilities on security, operations, and trust.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">9. <strong>AI-powered attacks<\/strong><\/h2>\n\n\n\n<p><strong>AI-powered attacks<\/strong>&nbsp;leverage advanced&nbsp;<strong>artificial intelligence technologies<\/strong>&nbsp;to enhance cyber-attacks, making them more sophisticated and difficult to detect. These attacks can range from automated hacking tools to creating&nbsp;<strong>deepfakes<\/strong>&nbsp;that impersonate public figures.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>Rapid advancements in&nbsp;<strong>AI and machine learning<\/strong>&nbsp;enable attackers to manipulate audio and visual content with high accuracy, automating the generation of realistic fake content that can deceive individuals and systems alike.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The consequences of AI-powered attacks include&nbsp;<strong>misinformation<\/strong>, manipulation of public perception, unauthorized access to sensitive information, and potentially severe disruptions in political, social, and economic spheres.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world example<\/strong> of an AI-powered attack&nbsp;<\/h3>\n\n\n\n<p>In 2021, Estonia&#8217;s Prime Minister,&nbsp;<strong>Kaja Kallas<\/strong>, along with other&nbsp;<strong>high-ranking officials<\/strong>&nbsp;from various Western capitals, <strong>fell victim to a deepfake scam i<\/strong>nvolving the <strong>impersonation<\/strong> of&nbsp;<strong>African Union Chairperson Moussa Faki<\/strong>. This sophisticated attack utilized AI-generated video and audio to create a highly convincing fake representation of Chairperson Faki. During the scam, Prime Minister Kallas and other officials engaged in a video conference under the belief they were discussing international matters with the real Chairperson Faki. This incident not only underscores the evolving sophistication of AI-assisted attacks but also highlights the significant threat they pose to global security and diplomacy, stressing the urgent need for advanced cybersecurity measures to detect and mitigate such threats\u200b. (<a href=\"https:\/\/africabriefing.com\/estonias-pm-falls-victim-to-deepfake-scam-involving-african-union-chairperson\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Read more<\/a>)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">10. Regulatory compliance risk<\/h2>\n\n\n\n<p><strong>Regulatory compliance risks<\/strong>&nbsp;involve potential legal penalties and financial losses that organizations face when they fail to adhere to laws, regulations, and standards relevant to their operations.<\/p>\n\n\n\n<p><strong>Trigger<\/strong><\/p>\n\n\n\n<p>These risks are often triggered by changes in legal frameworks, a misunderstanding or lack of awareness of new regulations, or the failure to implement required compliance measures within stipulated deadlines.<\/p>\n\n\n\n<p><strong>Impact<\/strong><\/p>\n\n\n\n<p>The consequences of non-compliance can be significant, including&nbsp;<strong>hefty fines, legal sanctions, damage to reputation<\/strong>, and even operational shutdown. Businesses face losing customer trust or decreased market value.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-world examples of compliance risk<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Meta<\/strong>&nbsp;was fined&nbsp;<strong>\u20ac1.2 billion<\/strong>&nbsp;by the Irish Data Protection Commission in 2023 for transferring personal data of European users to the United States without adequate data protection mechanisms. This fine underscores the severe financial implications for major tech companies under GDPR compliance (\u200b<a href=\"https:\/\/wideangle.co\/long\/privacy-review-2023\/the-5-highest-gdpr-fines-of-2023\" target=\"_blank\" rel=\"noopener\" title=\"Read more\">Read more<\/a>).<\/li>\n\n\n\n<li><strong>TikTok<\/strong>&nbsp;received a&nbsp;<strong>\u20ac345 million fine<\/strong>&nbsp;for inadequately protecting the data of underage users, particularly around age verification and privacy settings, stressing the importance of protecting vulnerable user groups\u200b<a href=\"https:\/\/www.csoonline.com\/article\/567531\/the-biggest-data-breach-fines-penalties-and-settlements-so-far.html\" target=\"_blank\" rel=\"noreferrer noopener\">. (<\/a><a href=\"https:\/\/www.csoonline.com\/article\/567531\/the-biggest-data-breach-fines-penalties-and-settlements-so-far.html\" target=\"_blank\" rel=\"noopener\" title=\"\">Read more<\/a><a href=\"https:\/\/www.csoonline.com\/article\/567531\/the-biggest-data-breach-fines-penalties-and-settlements-so-far.html\" target=\"_blank\" rel=\"noreferrer noopener\">)<\/a>.<\/li>\n\n\n\n<li><strong>Criteo<\/strong>, a French adtech company, faced a&nbsp;<strong>\u20ac40 million fine<\/strong>&nbsp;from France&#8217;s CNIL for failing to demonstrate user consent in its behavioral advertising, highlighting that GDPR compliance is critical across all sectors, not just for tech giants (<a href=\"https:\/\/www.eqs.com\/compliance-blog\/biggest-gdpr-fines\/\" target=\"_blank\" rel=\"noopener\" title=\"Read more\">Read mor<\/a>e).<\/li>\n<\/ol>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Explore the top 10 information security risks for 2025, featuring real-world examples of each threat. <\/p>","protected":false},"author":1,"featured_media":17690,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[114,26],"tags":[],"class_list":["post-17075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risk-management","category-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/17075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/comments?post=17075"}],"version-history":[{"count":73,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/17075\/revisions"}],"predecessor-version":[{"id":17731,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/17075\/revisions\/17731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media\/17690"}],"wp:attachment":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media?parent=17075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/categories?post=17075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/tags?post=17075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}