{"id":12602,"date":"2020-01-31T16:25:03","date_gmt":"2020-01-31T15:25:03","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12602"},"modified":"2020-01-31T16:25:03","modified_gmt":"2020-01-31T15:25:03","slug":"dorking-exploiting-search-engine-capabilities-discover-security-gaps","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/","title":{"rendered":"Dorking &#8211; exploiting search engine capabilities to discover security gaps"},"content":{"rendered":"<p><strong>Search engines<\/strong>, such as public ones like Google or companies\u2019 internal intranet search tools, are typically used so one can find information about a topic that they are interested in.\u00a0 However, a more nefarious way to use these tools has recently gained prominence.\u00a0 Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using search terms called \u201cdorks\u201d.\u00a0 <strong>This technique is referred to as both \u201cGoogle hacking\u201d or \u201cGoogle dorking\u201d.<\/strong><\/p>\n<figure id=\"post-12603 media-12603\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-12603 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Capture.png\" alt=\"\" width=\"541\" height=\"302\" \/><\/figure>\n<p>Typically, <strong>one would use key words to find out information about a topic they are interested in.<\/strong>\u00a0 For example, if one wanted to improve their tennis serve, they would probably search for \u201ctennis serve tips\u201d, which would give a number of links to articles based upon the terms provided. Search engines archive information collected throughout the internet, indexing information so it is readily available to comb through. A user will provide a keyword which the engine will then find throughout its indexes, returning results based upon relevance and algorithms. Search engines store all publicly accessible information in a website, like things hidden in the code that are not secured.\u00a0 <strong>In addition to searching for key terms, search engines provide a number of more advanced operators to take advantage of, which is exactly what Google dorking takes advantage of.<\/strong> For example, the operator \u2018site\u2019 will focus a search on a specific website instead of every site indexed by the search engine.<\/p>\n<p>Wide scale security events using Google dorking has occurred recently and has been widely reported on.\u00a0 \u00a0Two notable examples include the data leak of a <strong>French political party\u2019s data<\/strong>, which was found on the site of its webhost using \u201cdorks\u201d of the type \u201cIndex of \/\u201d and <strong>the discovery of numerous websites used by the CIA for communication<\/strong>, leading to numerous executions of agents working for the US.<\/p>\n<p>To give an example of a specific search that uses Google dorking, the inquiry \u201cinurl: files intext:nationality filetype: xls intext: &lt;first name or last name type&gt;\u201dis likely to find Excel files that contain individuals\u2019 information with columns displaying \u00a0name and nationality. At the same time, a <strong>single well-chosen keyword<\/strong>\u2014for example, the name of <strong>an enterprise application<\/strong> searched on the Internet or the word \u201c<strong>salary<\/strong>\u201d searched on the company intranet\u2014c<strong>an be enough to find highly sensitive information.<\/strong><\/p>\n<figure id=\"post-12607 media-12607\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12607 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/01\/Capture-2.png\" alt=\"\" width=\"406\" height=\"360\" \/><\/figure>\n<p>Search engines internal to certain websites can also be exploited. \u00a0For example, <strong>websites containing application source codes<\/strong> (e.g. GitHub), <strong>technical forums<\/strong> for software publishers, or <strong>job posting websites<\/strong> containing descriptions of sensitive technical environments can be ripe for using Google dorking to find exploitable information<\/p>\n<p>Google dorking has reached an apex of public accessibility because of numerous tutorials postedonline, specialized, private search engines (e.g. startpage.com) and websites listing thousands of \u201cdorks\u201d (e.g. Google Hacking Database) listed by specific use case (e.g. finding files containing passwords).<\/p>\n<p>Google dorking is <strong>typically performed manually but able to be automated with \u201cdork scanners\u201d<\/strong> such as \u201cZeus-scanner\u201d or with the help of PowerShell tools (PnP-PowerShell) for searches in Office365.<\/p>\n<p><strong>To guard against exploitation of internal search engines<\/strong>, organizations can:<\/p>\n<ul>\n<li><strong>Use Data Loss Prevention software and services<\/strong> to detect data leakage of sensitive information, including tools that search non-indexed websites, like the Dark Web.<\/li>\n<li><strong>Implement Data Classification and Governance procedures<\/strong>, including oversight of how data is shared, like withOffice365 Groups, starting with data that is most critical to business operation and would lead to the largest risk events (e.g. sensitive trade groups, client data, HR information, etc.)<\/li>\n<li><strong>Appropriately oversee outsourced activities with a Security Assurance Plan<\/strong> and raise providers\u2019 awareness of the importance of the adequate protection and nondisclosure of the information accessible to them. When possible, require evidence of data destruction after a contract has expired<\/li>\n<li><strong>Supervise the transfer of sensitive information<\/strong> to parties that do not always possess Synchronous Serial Interface (SSI) protection capabilities (on their company intranet or on the Internet) equivalent to the organization\u2019s own capabilities<\/li>\n<\/ul>\n<p>Organizations can also take <strong>measures to limit the impact of a known data leak:<\/strong><\/p>\n<ul>\n<li><strong>Develop a process for managing identified leaks<\/strong>, including actions to be taken for search engines and websites that have indexed the leak (e.g. Google search engine optimization (SEO) management)<\/li>\n<li><strong>Have procedures for security incident management including data breach<\/strong> (with regards to GDPR) and crisis management activities, \u00a0noting the potential need for notification of regulatory authorities and impacted individuals.<\/li>\n<li><strong>Have a monitoring procedure and tools in place for social media networks<\/strong>, developing prepared responses for engaging with individuals on these platforms when dealing with a crisis<\/li>\n<\/ul>\n<p>Google dorking can be leveraged by an organization <strong>to test out the security of its own systems,<\/strong> such as during, security audits or Red Team activities that aim at thinking from a malicious agent\u2019s perspective to discover\u2014before the agent\u2014the gaps that could be exploited to cause harm to an organization. \u00a0<strong>Google dorking is a powerful technique bad actors are using<\/strong> to exploit rarely seen gaps in an organization\u2019s architecture, and the possibility of this technique\u2019s use should be kept in mind when assessing an organization\u2019s information security risk.\u00a0 It is one of the many examples of ways cybercriminals continue to evolve in their activities today, and highlights the need for an organization\u2019s continuous evolution in how it handles security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Search engines, such as public ones like Google or companies\u2019 internal intranet search tools, are typically used so one can find information about a topic that they are interested in.\u00a0 However, a more nefarious way to use these tools has&#8230;<\/p>\n","protected":false},"author":1285,"featured_media":12061,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[3106,2817,3459,3457,3458],"coauthors":[2841],"class_list":["post-12602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-data-en","tag-data-protection","tag-dorking-en","tag-google-hacking","tag-search-engines"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dorking - exploiting search engine capabilities to discover security gaps<\/title>\n<meta name=\"description\" content=\"Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using the technique referred to as \u201cGoogle dorking\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dorking - exploiting search engine capabilities to discover security gaps\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using the technique referred to as \u201cGoogle dorking\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-31T15:25:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Axel Petersen\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Axel Petersen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\"},\"author\":{\"name\":\"Axel Petersen\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\"},\"headline\":\"Dorking &#8211; exploiting search engine capabilities to discover security gaps\",\"datePublished\":\"2020-01-31T15:25:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\"},\"wordCount\":888,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"data\",\"data protection\",\"Dorking\",\"google hacking\",\"search engines\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\",\"name\":\"Dorking - exploiting search engine capabilities to discover security gaps\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2020-01-31T15:25:03+00:00\",\"description\":\"Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using the technique referred to as \u201cGoogle dorking\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg\",\"width\":3873,\"height\":3873,\"caption\":\"Vector illustration of iceberg and clouds\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dorking &#8211; exploiting search engine capabilities to discover security gaps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\",\"name\":\"Axel Petersen\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dorking - exploiting search engine capabilities to discover security gaps","description":"Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using the technique referred to as \u201cGoogle dorking\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/","og_locale":"en_US","og_type":"article","og_title":"Dorking - exploiting search engine capabilities to discover security gaps","og_description":"Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using the technique referred to as \u201cGoogle dorking\u201d.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/","og_site_name":"RiskInsight","article_published_time":"2020-01-31T15:25:03+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"Axel Petersen","twitter_misc":{"Written by":"Axel Petersen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/"},"author":{"name":"Axel Petersen","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274"},"headline":"Dorking &#8211; exploiting search engine capabilities to discover security gaps","datePublished":"2020-01-31T15:25:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/"},"wordCount":888,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","keywords":["data","data protection","Dorking","google hacking","search engines"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/","name":"Dorking - exploiting search engine capabilities to discover security gaps","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","datePublished":"2020-01-31T15:25:03+00:00","description":"Cybercriminals are hunting for sensitive information hidden in publically-accessible information by using the technique referred to as \u201cGoogle dorking\u201d.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/09\/Fotolia_71195707_Subscription_Monthly_XXL.jpg","width":3873,"height":3873,"caption":"Vector illustration of iceberg and clouds"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/01\/dorking-exploiting-search-engine-capabilities-discover-security-gaps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Dorking &#8211; exploiting search engine capabilities to discover security gaps"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274","name":"Axel Petersen","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1285"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12602"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12602\/revisions"}],"predecessor-version":[{"id":12609,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12602\/revisions\/12609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12061"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12602"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}