{"id":2066,"date":"2022-09-05T07:56:19","date_gmt":"2022-09-05T07:56:19","guid":{"rendered":"https:\/\/exceltic.com\/?p=2066"},"modified":"2026-03-19T13:31:33","modified_gmt":"2026-03-19T12:31:33","slug":"soc-cyber-threats-ia","status":"publish","type":"post","link":"https:\/\/exceltic.serquo.com\/en\/soc-cyber-threats-ia\/","title":{"rendered":"SOC: management and prevention of cyber-threats using AI"},"content":{"rendered":"<p>According to Matt Ahlgre (2022, <a href=\"https:\/\/www.websiterating.com\/es\/research\/cybersecurity-statistics-facts\/#references\">WSR<\/a>), the <strong>ransomware or 'data hijacking' attacks <\/strong>occur every 10 seconds and it is estimated that the global cost of cyber-threats in 2025 will be 10.5 trillion.<\/p>\n\n\n\n<p>However, in spite of these data, the future of the <a href=\"https:\/\/exceltic.com\/ciberseguridad\/\" data-type=\"URL\" data-id=\"https:\/\/exceltic.com\/ciberseguridad\/\">cybersecurity <\/a>looks promising. Numerous advances in detection and response to these threats, using technologies such as <strong>machine learning or deep learning<\/strong>, they are able to detect them at an early stage.<\/p>\n\n\n\n<p>In 2020, <strong>Garner <\/strong>establishes <strong>\"<em>SECURITY MONITORING PYRAMID<\/em>\"<\/strong> o<strong> \"triangle of virtue<\/strong>covering most of the cyber security spectrum through threat detection, prevention and response solutions:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/exceltic.com\/wp-content\/uploads\/2022\/09\/Piramide-ingles.png\" alt=\"Cyber-threats Pyramid\" class=\"wp-image-2067\" width=\"512\" height=\"271\" srcset=\"\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" data-srcset=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">EDR<\/mark><\/strong><\/td><td><strong>EDR<\/strong>, Endpoint detection and response (EPR) is a system that <strong>monitors suspicious activity at endpoints<\/strong> (computers connected to a network, not the network itself).<br><br>It enables the collection and analysis of data on endpoint security risks with the objective of detecting security breaches as they occur, providing a rapid response to identified or suspected threats.\u00a0The capabilities and details of an EDR system can vary substantially depending on how it is implemented.<\/td><\/tr><tr><td><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">NDR<\/mark><\/strong><\/td><td>Network detection and response allows you to monitor traffic for threats and suspicious behaviour that could cause a security breach in the future.&nbsp;<br><br>Traditional signature-based methods are no longer 100% effective against modern threats, creating a false illusion of security for many businesses.&nbsp;<br><br>Greater and deeper network visibility provides businesses with an additional layer of security and advanced prevention capabilities.<\/td><\/tr><tr><td><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">SIEM<\/mark><\/strong><\/td><td><strong>Security information and event management<\/strong>, is the umbrella term for the services of <a href=\"https:\/\/exceltic.com\/desarrollo-software\/\">software <\/a>that collect and examine (suspicious) behaviour in their digital infrastructure from numerous sources.&nbsp;<br><br><strong>SIEM's main function?&nbsp;<\/strong>Collect security information from databases, servers, domain controllers and network hardware. Identify risks, identify trends, examine alarms and locate network vulnerabilities by applying analytics to this data.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-secondary-color has-text-color\">Why use an NDR?<\/p>\n\n\n\n<p><strong>SIEM programmes<\/strong> can generate comprehensive reports on incidents and events, including malware and other transgressions. However, they are not able to adjust on their own and are often unable to <strong>it is difficult to interpret large amounts of data. <\/strong><\/p>\n\n\n\n<p><strong>An advanced NDR<\/strong>, in contrast, it can quickly decrypt a large number of protocols to identify suspicious attacks and patterns of behaviour with sufficient context and evidence for analysts to act with confidence. In addition, NDR complements EDR by filling in the gaps that EDR does not detect.<\/p>\n\n\n\n<p>Each of the <strong>SIEM, EDR and NDR<\/strong> has particular advantages and disadvantages. When all three are combined, <strong>each element can reinforce the others.<\/strong><\/p>\n\n\n\n<p class=\"has-primary-color has-text-color has-large-font-size\">HOW TO STOP RANSOMWARE<\/p>\n\n\n\n<p><strong>Ransomware attacks<\/strong> are changing, in fact, new generations often use stolen credentials in order to gain privileged access.<\/p>\n\n\n\n<p>The<strong> attacker's intent <\/strong>is to get administrator access to the domain controller, as from this position it is easy to gain access to most of the valuable data. It is also possible to deploy ransomware incredibly quickly, using administration tools that have GPOs (Group Policy Objects).<\/p>\n\n\n\n<p>The <strong>modern RansomOps attacks do not deploy the binary code all the way to the end<\/strong>So by the time you see the attack, it is too late. Early detection of it, in the earlier stages, is vital.<\/p>\n\n\n\n<p>For this reason,<strong> it is absolutely essential<\/strong> monitor the use of all privileged accounts. We have observed that this is certainly one of the most valuable attack detection signals.<\/p>\n\n\n\n<p class=\"has-secondary-color has-text-color\">Recommendations:<\/p>\n\n\n\n<p><strong>Prevention<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Assess the level of security on a regular basis and implement a plan to prioritise corrections according to the level of risk. Special attention should be paid to the most vulnerable services such as RDP, FTP and remote access infrastructure.<\/li><li>Enable multi-factor authentication in remote access infrastructures or identity providers.<\/li><li>Implement controls, prevention policies and rules to buy time to respond to the threat.<\/li><li>Pay special attention to privileged accounts. The use of bridge servers and management systems for these accounts will make it more difficult for attackers.<\/li><\/ul>\n\n\n\n<p><strong>Detection:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>From the time the ransomware operator gains access to the time it is deployed, there is a time lag. That's why we believe in investing in detection and response across the network, cloud, endpoint and identity infrastructure, maximising the chances of early detection.<\/li><\/ul>\n\n\n\n<p><strong>Research and response:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Monitor critical alerts on an ongoing basis. Reinforcing internal teams, through MDRs, managed detection and response systems, or with managed security service providers.<\/li><li>Look for surges of activity in your DMZ prior to initial access along with open source OSINT intelligence. This can provide an early assessment of a cyber-attack.<\/li><\/ul>\n\n\n\n<p><strong>The network detection and response platform driven by the <a href=\"https:\/\/www.vectra.ai\/\">Vectra AI <\/a><\/strong>monitors privileged account abuse, network traffic, and even from the cloud, data centre or IoT devices, looking for telltale signs of compromise and attacker behaviour indicative of a ransomware attack, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Recognition and lateral movement<\/li><li>Command and control<\/li><li>Initial access: Cyber attackers look for vulnerabilities in systems and services over the internet via RDP, FTP or VPN servers, as they allow initial access to companies and the cloud. In many cases, it takes hours, days or even weeks for the attack to be deployed, so it is during this time that constant vigilance is really required. <\/li><\/ul>\n\n\n\n<p>This level of analysis is impossible to perform manually, but it is simple for Vectra's AI-powered platform. <strong>Vectra integrates with existing security tools <\/strong>to take action on affected accounts and devices.<\/p>\n\n\n\n<p><strong>Exceltic expands its cybersecurity department with this new alliance<\/strong> que proporcionar\u00e1 a sus clientes soluciones de detecci\u00f3n y respuesta de red.<\/p>","protected":false},"excerpt":{"rendered":"<p>Detecting and responding to cyber-attacks is a key part of running a successful security operations centre. Find out how artificial intelligence detects Ransomware. <\/p>","protected":false},"author":1,"featured_media":2084,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eventos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA<\/title>\n<meta name=\"description\" content=\"La detecci\u00f3n y respuesta ante ciber-amenazas es una pieza clave en la correcta gesti\u00f3n del centro de operaciones de seguridad. Descubre c\u00f3mo la IA detecta el Ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exceltic.serquo.com\/en\/soc-cyber-threats-ia\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA\" \/>\n<meta property=\"og:description\" content=\"La detecci\u00f3n y respuesta ante ciber-amenazas es una pieza clave en la correcta gesti\u00f3n del centro de operaciones de seguridad. Descubre c\u00f3mo la IA detecta el Ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exceltic.serquo.com\/en\/soc-cyber-threats-ia\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/exceltic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-05T07:56:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T12:31:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1464\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Serquo Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@exceltic\" \/>\n<meta name=\"twitter:site\" content=\"@exceltic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Serquo Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/\"},\"author\":{\"name\":\"Serquo Admin\",\"@id\":\"https:\/\/exceltic.serquo.com\/#\/schema\/person\/aa4f97f58379cc64179590f276472ad5\"},\"headline\":\"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA\",\"datePublished\":\"2022-09-05T07:56:19+00:00\",\"dateModified\":\"2026-03-19T12:31:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/\"},\"wordCount\":1073,\"image\":{\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp\",\"articleSection\":[\"Eventos\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/\",\"url\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/\",\"name\":\"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA\",\"isPartOf\":{\"@id\":\"https:\/\/exceltic.serquo.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp\",\"datePublished\":\"2022-09-05T07:56:19+00:00\",\"dateModified\":\"2026-03-19T12:31:33+00:00\",\"author\":{\"@id\":\"https:\/\/exceltic.serquo.com\/#\/schema\/person\/aa4f97f58379cc64179590f276472ad5\"},\"description\":\"La detecci\u00f3n y respuesta ante ciber-amenazas es una pieza clave en la correcta gesti\u00f3n del centro de operaciones de seguridad. Descubre c\u00f3mo la IA detecta el Ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage\",\"url\":\"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp\",\"contentUrl\":\"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp\",\"width\":2560,\"height\":1464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/exceltic.serquo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/exceltic.serquo.com\/#website\",\"url\":\"https:\/\/exceltic.serquo.com\/\",\"name\":\"\",\"description\":\"Ingenier\u00eda y Consultor\u00eda\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/exceltic.serquo.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/exceltic.serquo.com\/#\/schema\/person\/aa4f97f58379cc64179590f276472ad5\",\"name\":\"Serquo Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/exceltic.serquo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c335bd9da7b1e9a671364c54e17ba39cb4a646b8eb953383973649c257b1fe49?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c335bd9da7b1e9a671364c54e17ba39cb4a646b8eb953383973649c257b1fe49?s=96&d=mm&r=g\",\"caption\":\"Serquo Admin\"},\"url\":\"https:\/\/exceltic.serquo.com\/en\/author\/serquo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOC: management and prevention of cyber-threats using AI","description":"Cyber threat detection and response is a key part of successful security operations centre management. Find out how AI detects Ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exceltic.serquo.com\/en\/soc-cyber-threats-ia\/","og_locale":"en_GB","og_type":"article","og_title":"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA","og_description":"La detecci\u00f3n y respuesta ante ciber-amenazas es una pieza clave en la correcta gesti\u00f3n del centro de operaciones de seguridad. Descubre c\u00f3mo la IA detecta el Ransomware.","og_url":"https:\/\/exceltic.serquo.com\/en\/soc-cyber-threats-ia\/","article_publisher":"https:\/\/www.facebook.com\/exceltic\/","article_published_time":"2022-09-05T07:56:19+00:00","article_modified_time":"2026-03-19T12:31:33+00:00","og_image":[{"width":2560,"height":1464,"url":"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp","type":"image\/webp"}],"author":"Serquo Admin","twitter_card":"summary_large_image","twitter_creator":"@exceltic","twitter_site":"@exceltic","twitter_misc":{"Written by":"Serquo Admin","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#article","isPartOf":{"@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/"},"author":{"name":"Serquo Admin","@id":"https:\/\/exceltic.serquo.com\/#\/schema\/person\/aa4f97f58379cc64179590f276472ad5"},"headline":"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA","datePublished":"2022-09-05T07:56:19+00:00","dateModified":"2026-03-19T12:31:33+00:00","mainEntityOfPage":{"@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/"},"wordCount":1073,"image":{"@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp","articleSection":["Eventos"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/","url":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/","name":"SOC: management and prevention of cyber-threats using AI","isPartOf":{"@id":"https:\/\/exceltic.serquo.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage"},"image":{"@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp","datePublished":"2022-09-05T07:56:19+00:00","dateModified":"2026-03-19T12:31:33+00:00","author":{"@id":"https:\/\/exceltic.serquo.com\/#\/schema\/person\/aa4f97f58379cc64179590f276472ad5"},"description":"Cyber threat detection and response is a key part of successful security operations centre management. Find out how AI detects Ransomware.","breadcrumb":{"@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#primaryimage","url":"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp","contentUrl":"https:\/\/exceltic.serquo.com\/wp-content\/uploads\/2022\/08\/pexels-hacked-min-scaled.webp","width":2560,"height":1464},{"@type":"BreadcrumbList","@id":"https:\/\/exceltic.serquo.com\/soc-ciber-amenazas-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/exceltic.serquo.com\/"},{"@type":"ListItem","position":2,"name":"SOC: gesti\u00f3n y prevenci\u00f3n de ciber-amenazas mediante IA"}]},{"@type":"WebSite","@id":"https:\/\/exceltic.serquo.com\/#website","url":"https:\/\/exceltic.serquo.com\/","name":"","description":"Engineering and Consulting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exceltic.serquo.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/exceltic.serquo.com\/#\/schema\/person\/aa4f97f58379cc64179590f276472ad5","name":"Serquo Admin","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/exceltic.serquo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c335bd9da7b1e9a671364c54e17ba39cb4a646b8eb953383973649c257b1fe49?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c335bd9da7b1e9a671364c54e17ba39cb4a646b8eb953383973649c257b1fe49?s=96&d=mm&r=g","caption":"Serquo Admin"},"url":"https:\/\/exceltic.serquo.com\/en\/author\/serquo\/"}]}},"_links":{"self":[{"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/posts\/2066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/comments?post=2066"}],"version-history":[{"count":12,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/posts\/2066\/revisions"}],"predecessor-version":[{"id":2240,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/posts\/2066\/revisions\/2240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/media\/2084"}],"wp:attachment":[{"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/media?parent=2066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/categories?post=2066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exceltic.serquo.com\/en\/wp-json\/wp\/v2\/tags?post=2066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}