{"id":34522,"date":"2020-04-20T22:00:00","date_gmt":"2020-04-20T22:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/theedge\/how-can-i-help-my-users-spot-disinformation\/b\/d-id\/1337603"},"modified":"2020-04-20T22:00:00","modified_gmt":"2020-04-20T22:00:00","slug":"how-can-i-help-my-users-spot-disinformation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/","title":{"rendered":"How Can I Help My Users Spot Disinformation?"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">A combination of clever tools, good education, and better mindfulness might keep users from being manipulated.<\/span> <\/p>\n<div class=\"docimage\" align=\"center\" readability=\"8\"><em><strong><a href=\"https:\/\/www.darkreading.com\/theedge\/how-can-i-help-my-users-spot-disinformation\/b\/d-id\/1337603?_mc=rss%5Fx%5Fdrr%5Fedt%5Faud%5Fdr%5Fx%5Fx%2Drss%2Dsimple&amp;image_number=1\" target=\"new\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"docimage\" src=\"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg\" alt=\"(image by EtiAmmos, via Adobe Stock)\" border=\"0\"><\/a><\/strong><\/em><\/p>\n<p><em><strong><span class=\"docimagecaptiontext\"><em>(image by EtiAmmos, via Adobe Stock)<\/em><\/span><\/strong><\/em><\/p>\n<\/div>\n<p><em><strong>Question: How can I help my users spot disinformation online?<\/strong><\/em><\/p>\n<p><strong>Sam Small, CSO, ZeroFox:<\/strong>&nbsp;Education is the key to helping users effectively and consistently spot disinformation online. Include the topic in your security awareness and training curriculum. Explain its purpose and value, share and dissect the anatomy of its familiar forms and indicators, and discuss practical techniques your users can employ to validate or repudiate questionable information on their own. Then, test your users&#8217; abilities to discern between authentic and fake content by presenting them with real examples of both (or alternatively, create your own).<\/p>\n<p>Consider introducing your users to some of the many tools, apps, browser extensions, and community forums created to help people research and verify information online. Find an extensive list of t<a href=\"https:\/\/www.rand.org\/research\/projects\/truth-decay\/fighting-disinformation\/search.html#q=&amp;typeOfTool=Disinformation+tracking\" target=\"_blank\" rel=\"noopener noreferrer\">ools that fight disinformation online<\/a>, fact-checking tools and resources curated by the RAND Corporation&#8217;s <a href=\"https:\/\/www.rand.org\/research\/projects\/truth-decay\/fighting-disinformation.html#learn-more-about-truth-decay-\" target=\"_blank\" rel=\"noopener noreferrer\">Countering Truth Decay Initiative<\/a>.<\/p>\n<p>Want to go deeper? Encourage your users to practice a skill long celebrated by psychologists, Buddhists, and new-age yogis alike: mindfulness. Disinformation is designed to elicit a strong emotional response. The users most skilled in recognizing it are those with an acute awareness of their emotions and an ability to recognize attempts to manipulate them in real-time. Even so, separating fact from fiction is often difficult without additional context or information.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/zztlI3n2Ao9aPABMXB6B9YwxP0Qr5AuHFYn2o2t79uZXsYfcDgAwmhnzELDj3N_ao3tf4UQTYVlDGUC65QcaJh3BBciwVPzR1j894pr_drb5pNfXhSE9Vjw51z4-Ha7UBrsDzqJW\" alt width=\"145\" height=\"45\"><\/p>\n<p><strong>Check out this listing of <a href=\"https:\/\/www.omdia.com\/resources\/product-content\/covid-19-omdia-analyst-advisory-security\">free security products and services<\/a> compiled for Dark Reading by Omdia analysts to help you meet the challenges of COVID-19.<br \/><\/strong><\/p>\n<p><span class=\"italic\">The Edge is Dark Reading&#8217;s home for features, threat data and in-depth perspectives on cybersecurity. <a href=\"https:\/\/www.darkreading.com\/theedge\/how-can-i-help-my-users-spot-disinformation\/b\/d-id\/1337603\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/theedge\/how-can-i-help-my-users-spot-disinformation\/b\/d-id\/1337603?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A combination of clever tools, good education, and better mindfulness might keep users from being manipulated. Read More <a href=\"https:\/\/www.darkreading.com\/theedge\/how-can-i-help-my-users-spot-disinformation\/b\/d-id\/1337603?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-34522","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Can I Help My Users Spot Disinformation? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Can I Help My Users Spot Disinformation? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-20T22:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Can I Help My Users Spot Disinformation?\",\"datePublished\":\"2020-04-20T22:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\"},\"wordCount\":297,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\",\"name\":\"How Can I Help My Users Spot Disinformation? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg\",\"datePublished\":\"2020-04-20T22:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage\",\"url\":\"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg\",\"contentUrl\":\"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Can I Help My Users Spot Disinformation?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Can I Help My Users Spot Disinformation? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/","og_locale":"en_US","og_type":"article","og_title":"How Can I Help My Users Spot Disinformation? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-20T22:00:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Can I Help My Users Spot Disinformation?","datePublished":"2020-04-20T22:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/"},"wordCount":297,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/","url":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/","name":"How Can I Help My Users Spot Disinformation? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg","datePublished":"2020-04-20T22:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/theedge\/FactOrFake_602x250jpg.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-can-i-help-my-users-spot-disinformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How Can I Help My Users Spot Disinformation?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34522"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34522\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}