{"id":12819,"date":"2020-03-04T17:02:59","date_gmt":"2020-03-04T16:02:59","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=12819"},"modified":"2020-04-06T16:50:45","modified_gmt":"2020-04-06T15:50:45","slug":"review-of-the-current-news-by-cert-w-february-2020","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/","title":{"rendered":"Review of the current news by CERT-W &#8211; February 2020"},"content":{"rendered":"<figure id=\"post-12832 media-12832\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12832\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH.png\" alt=\"\" width=\"1021\" height=\"295\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH.png 1021w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-437x126.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-71x21.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/WATCH-768x222.png 768w\" sizes=\"auto, (max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<h2>Cybercrime watch<\/h2>\n<h3><a href=\"https:\/\/www.zdnet.com\/article\/chrome-80-update-cripples-top-cybercrime-marketplace\/\">Google Chrome&#8217;s update fight against Cybercrime<\/a><\/h3>\n<p>Google Chrome version 80 now supports <strong>AES-256<\/strong> to user data stored locally. The change has made an impact on AZORult&#8217;s ability to steal user&#8217;s information. <strong>AZORult<\/strong> is a <strong>user profile malware<\/strong> that appeared in 2016 thieving big amounts of information including passwords, web browsing history, cookies, etc.<\/p>\n<h3><a href=\"https:\/\/www.zdnet.com\/article\/bouygues-construction-falls-victim-to-ransomware\/\">Bouygues Construction another&#8217;s ransomware victim<\/a><\/h3>\n<p>Bouygues Construction was victim of <strong>a ransomware attack<\/strong>. First detected on January 30, the company announced the attack in Twitter only few days before the <strong>MAZE<\/strong>&#8216;s group expressed to be behind the attack.<\/p>\n<h3><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/02\/13\/the-fbi-issues-a-powerful-35-billion-cybercrime-warning\/\">Internet Complain Center reporting (FBI IC3 report)<\/a><\/h3>\n<p>The Federal Bureau of Investigation (FBI) released the Internet Complaint Center (IC3) reporting an increment up to 1300 complaints every single day. The report shows how the <strong>Business email compromise (BEC) cost organizations $1.7 billion in 2019<\/strong>. Since companies have implemented \u201cvolume spam\u201d campaigns, attackers are becoming more sophisticated targeting high-value individuals such as CEOs and finance employees.<\/p>\n<p>&nbsp;<\/p>\n<h2>Vulnerability watch<\/h2>\n<h3><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-0688\">CVE-2020-0688<\/a> &#8211; Remote code execution vulnerability in Microsoft Exchange software<\/h3>\n<p>A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka &#8216;Microsoft Exchange Memory Corruption Vulnerability&#8217;.<\/p>\n<h3><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-15126\">CVE-2019-15126<\/a> &#8211; All-zero encryption key to encrypt part of the user\u2019s communication<\/h3>\n<p>An issue was discovered on Broadcom Wi-Fi client devices. Specifically, timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic.<\/p>\n<h3><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-0022\">CVE-2020-0022<\/a> &#8211; Critical Bluetooth vulnerability in Android<\/h3>\n<p>Android Bluetooth stack that lets attackers silently deliver malware to and steal data from nearby phones simply knowing the Bluetooth MAC address of the target. As result, possibility to Deny of Service (DoS), if the device is running Android 8.0, 8.1 or 9.0 then Remote Code Execution (RCE)<\/p>\n<p>&nbsp;<\/p>\n<h2>Weekly top<\/h2>\n<h3>Top leak: <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/sports-giant-decathlon-leaks-123\/\">Decathlon leaks 123 Million records<\/a><\/h3>\n<p>A database misconfiguration let a vpnMentor team to reveal 123 million records including customer and employee information. Over 9GB database was found from an unsecured Elasticsearch server, exposing information from Decathlon &#8211; Spain.<\/p>\n<h3>Top exploit: <a href=\"https:\/\/blog.exodusintel.com\/wp-content\/uploads\/2020\/02\/exp.zip\">CVE-2020-6418<\/a> &#8211; Confusion flaw in V8, Google Chrome<\/h3>\n<p>Confusion flaw in V8 (JavaScript engine used by Google Chrome) letting to arbitrary code execution within the browser sandbox.<\/p>\n<h3>Top attack: <a href=\"https:\/\/www.abc.net.au\/news\/rural\/2020-02-27\/ransomware-cyber-attack-cripples-australian-wool-sales\/12007912\">Cyber-attack cripples\u2019 wool sales across Australia<\/a><\/h3>\n<p>A ransomware attack affected more than 75 per cent of the wool industry across Australia. Secretary of National Auction Selling Committee (NASC) confirmed the compromising of Talman. Talman is the major software supplier to the industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime watch Google Chrome&#8217;s update fight against Cybercrime Google Chrome version 80 now supports AES-256 to user data stored locally. The change has made an impact on AZORult&#8217;s ability to steal user&#8217;s information. AZORult is a user profile malware that&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":12825,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[3480,2772,3479,2944,2878],"coauthors":[3488],"class_list":["post-12819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-cert-en","tag-cybersecurity","tag-indicators","tag-newsletter","tag-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Review of the current news by CERT-W - February 2020 - Risk Insight<\/title>\n<meta name=\"description\" content=\"February 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review of the current news by CERT-W - February 2020 - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"February 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-04T16:02:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-06T15:50:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"Review of the current news by CERT-W &#8211; February 2020\",\"datePublished\":\"2020-03-04T16:02:59+00:00\",\"dateModified\":\"2020-04-06T15:50:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\"},\"wordCount\":436,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"CERT\",\"cybersecurity\",\"indicators\",\"Newsletter\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\",\"name\":\"Review of the current news by CERT-W - February 2020 - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-03-04T16:02:59+00:00\",\"dateModified\":\"2020-04-06T15:50:45+00:00\",\"description\":\"February 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Review of the current news by CERT-W &#8211; February 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review of the current news by CERT-W - February 2020 - Risk Insight","description":"February 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/","og_locale":"en_US","og_type":"article","og_title":"Review of the current news by CERT-W - February 2020 - Risk Insight","og_description":"February 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/","og_site_name":"RiskInsight","article_published_time":"2020-03-04T16:02:59+00:00","article_modified_time":"2020-04-06T15:50:45+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"Review of the current news by CERT-W &#8211; February 2020","datePublished":"2020-03-04T16:02:59+00:00","dateModified":"2020-04-06T15:50:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/"},"wordCount":436,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["CERT","cybersecurity","indicators","Newsletter","Vulnerabilities"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/","name":"Review of the current news by CERT-W - February 2020 - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2020-03-04T16:02:59+00:00","dateModified":"2020-04-06T15:50:45+00:00","description":"February 2020 CERT-W newsletter has been released for you to find the latest indicators and news regarding cybersecurity issues and vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/03\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/03\/review-of-the-current-news-by-cert-w-february-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Review of the current news by CERT-W &#8211; February 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=12819"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12819\/revisions"}],"predecessor-version":[{"id":12828,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/12819\/revisions\/12828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/12825"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=12819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=12819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=12819"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=12819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}