{"id":56658,"date":"2024-07-25T13:05:52","date_gmt":"2024-07-25T13:05:52","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36147\/Hackers-Bypass-Windows-SmartScreen-Flaw-To-Launch-Malware.html"},"modified":"2024-07-25T13:05:52","modified_gmt":"2024-07-25T13:05:52","slug":"hackers-bypass-windows-smartscreen-flaw-to-launch-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/","title":{"rendered":"Hackers Bypass Windows SmartScreen Flaw To Launch Malware"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/07\/072424_microsoft_defender.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybercriminals are stepping up efforts to bypass a critical component in Microsoft Defender in order to covertly install malware.<\/p>\n<p>The team at <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/exploiting-cve-2024-21412-stealer-campaign-unleashed\">Fortinet said<\/a> it spotted multiple in-the-wild attacks on CVE-2024-21412. The vulnerability, classified as a security bypass error, allows an attacker to utilize embedded URLs in .lnk files without triggering the SmartScreen component.<\/p>\n<p>Though Microsoft patched the vulnerability in February, enough Windows systems remain unpatched as to make targeting the flaw worthwhile for criminal hackers.<\/p>\n<p>Normally, when a piece of malware attempts to execute, Windows Defender isolates it and delivers the user a SmartScreen notification, thus preventing any further infection or malicious activity.<\/p>\n<p>However, should the attack code and commands be specially crafted and placed inside of a URL within the .lnk link file, the malware attack can be carried out without being caught by SmartScreen.<\/p>\n<p>Fortinet global security strategist Aamir Lakhani told CyberRisk Alliance that once the exploit is performed, the attacker can use any number of methods to execute the malicious payload.<\/p>\n<p>The team has seen cybercriminals using techniques ranging from disguising the executable as a more benign filetype to more sophisticated methods like .DLL sideloading and injecting malware code into legitimate processes.<\/p>\n<p>\u201cThe most common threat vector is the initial threat vector that occurs through phishing emails. Exploiting this vulnerability begins with phishing emails containing malicious links,\u201d Lakhani explained.<\/p>\n<p>\u201cThese emails use lures related to healthcare insurance schemes, transportation notices, and tax-related communications to deceive individuals and organizations.\u201d<\/p>\n<p>Lakhani noted that in a few cases, there have been more exotic methods employed to disguise the attack payload.<\/p>\n<p>\u201cThere are other initial vectors as well,\u201d the researcher explained.<\/p>\n<p>\u201cAnother tactic is to take advantage of Open Redirect links. These links exploit Google DoubleClick open redirects, leading victims to compromised web servers hosting the exploit.\u201d<\/p>\n<p>Ultimately, the exploit will end in the installation of a number of bog-standard malware capabilities, including backdoor access to the infected PC, credential theft, and remote keylogging and activity tracking.<\/p>\n<p>Fortunately, the vulnerability is relatively simple for most users and administrators to address. Simply updating Windows (or having updated it any time in the last five months) will resolve the flaw. Additionally, administrators are advised to remind users of the importance of not opening email attachments from untrusted sources.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36147\/Hackers-Bypass-Windows-SmartScreen-Flaw-To-Launch-Malware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56659,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[6112],"class_list":["post-56658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwaremicrosoftflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Bypass Windows SmartScreen Flaw To Launch Malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Bypass Windows SmartScreen Flaw To Launch Malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-25T13:05:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/07\/072424_microsoft_defender.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Bypass Windows SmartScreen Flaw To Launch Malware\",\"datePublished\":\"2024-07-25T13:05:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\"},\"wordCount\":388,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg\",\"keywords\":[\"headline,hacker,malware,microsoft,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\",\"name\":\"Hackers Bypass Windows SmartScreen Flaw To Launch Malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg\",\"datePublished\":\"2024-07-25T13:05:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,microsoft,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwaremicrosoftflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Bypass Windows SmartScreen Flaw To Launch Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Bypass Windows SmartScreen Flaw To Launch Malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Bypass Windows SmartScreen Flaw To Launch Malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-07-25T13:05:52+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/07\/072424_microsoft_defender.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Bypass Windows SmartScreen Flaw To Launch Malware","datePublished":"2024-07-25T13:05:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/"},"wordCount":388,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg","keywords":["headline,hacker,malware,microsoft,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/","name":"Hackers Bypass Windows SmartScreen Flaw To Launch Malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg","datePublished":"2024-07-25T13:05:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-bypass-windows-smartscreen-flaw-to-launch-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,microsoft,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwaremicrosoftflaw\/"},{"@type":"ListItem","position":3,"name":"Hackers Bypass Windows SmartScreen Flaw To Launch Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56658"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56658\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56659"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}