{"id":5218,"date":"2018-01-25T08:50:43","date_gmt":"2018-01-25T11:50:43","guid":{"rendered":"https:\/\/ostec.blog\/generico\/spear-phishing-definicao"},"modified":"2020-10-02T10:07:01","modified_gmt":"2020-10-02T13:07:01","slug":"spear-phishing-definition","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/","title":{"rendered":"What is Spear Phishing and how to be protected?"},"content":{"rendered":"<p>[rev_slider alias=&#8221;360&#215;280-anti-spam-8-beneficios&#8221;][\/rev_slider] The use of e-mail is a frequent reality in business routines, of all segments and sizes. Sending documents internally, professional transactions, ticketing and invoicing, communication between sectors; all contribute to the inboxes to be filled daily with new messages.<\/p>\n<p>This is a natural and essential process for business continuity, but beware: emails are great ways to steal information and data, both personal and corporate.<\/p>\n<p>Phishing, as this type of crime is called, is the practice of sending emails that look trustworthy and true with the primary purpose of &#8220;fish&#8221; a victim &#8211; hence the origin of the name [&#8220;phishing&#8221; comes from &#8220;fishing&#8221;]. However, a new variation of this threat is getting stronger, especially in Brazil, which is the country with the most crimes involving virtual banking fraud in the world, according to research by ESET security company.<\/p>\n<p>To learn more about <i>Spear Phishing<\/i>, how it works, and tips for protecting yourself, keep reading.<\/p>\n<h2>What is Spear Phishing?<\/h2>\n<p><i>Spear phishing<\/i>is very much like &#8220;traditional&#8221; phishing. The big difference is that, instead of conducting major attacks, targeting a group of people and various companies, this variation of phishing makes the theft of specific information from precisely selected organizations.<\/p>\n<p>Intellectual property or confidential data, which are kept in the knowledge of a select group of corporate employees, as well as financial or military data, are the main information the cybercriminals seek to acquire.<\/p>\n<p>These types of attacks, as mentioned, work through e-mails. A message is sent on behalf of an organization with credibility or a sender that the victim has already been in contact with. The content of the message is the main bait and, for the crime to be complete, it is enough for the target to click. Usually, the victim is sent to a website, where they report their personal or corporate data. It is from this sending of information that the robbery happens.<\/p>\n<p>In addition, victims are at greater risk because <i>spear phishing<\/i>attacks are highly personalized &#8211; and they know exactly the way to attack. According to a survey conducted by security firm Proof, two out of five companies have already suffered from these attacks. Of these, 40% said that the content of the e-mail referred to travel and tourism packages, 30% of social networks and another 7% on online sales. That is why caution is needed.<\/p>\n<h2>Tips for protection<\/h2>\n<p>Like all other virtual threats, there are ways to protect yourself from <i>spear phishing<\/i>attacks. It is very important to make it clear, however, that the best way to avoid such crimes is through <b>prevention<\/b>. Companies need to be aware of the importance of maintaining a good security ecosystem, as well as making employees aware that they avoid accessing suspicious pages or performing inappropriate activities &#8211; from a security point of view.<\/p>\n<p>Here are a few tips you can use to help prevent <em>spear phishing<\/em>attacks.<\/p>\n<h3>Check the sender<\/h3>\n<p>Many of these crimes can be avoided by analyzing the sender&#8217;s email. Generally, criminals hide behind similar addresses to customers or organizations. It is important to pay attention to these small details, which can make a big difference.<\/p>\n<h3>Do not click on suspicious links<\/h3>\n<p>If you checked the sender and they looked suspicious, you&#8217;re probably already on alert. However, it is important to avoid clicks on these messages or any links inserted in it. They can target websites built for the sole purpose of stealing information. It is also important to analyze whether the connection is secure, using the <b>https<\/b>:\/\/ protocol with the <b>lock<\/b>icon.<\/p>\n<h3>Do not provide confidential information<\/h3>\n<p>Although it is obvious, not all companies follow this tip. It is of the utmost importance that managers and collaborators are aware of the importance of not providing any confidential information by e-mail.<\/p>\n<h3>Make upgrades<\/h3>\n<p>A simple and very efficient practice is to keep system updates always in their latest version, as they bring bug fixes, new security features and improvements to their tools. <span lang=\"PT-BR\">So upgrade whenever there are updates available.<\/span><\/p>\n<p><span lang=\"PT-BR\">[rev_slider alias=&#8221;horizontal-anti-spam-8-beneficios&#8221;][\/rev_slider]<\/span><\/p>\n<h3>Have good security solutions<\/h3>\n<p>It is important to have security features that can control and prevent such threats. Firewalls, when properly configured, can handle some of the need, preventing clicks from redirecting users to malicious websites. Firewalls act as a barrier between the external network (internet) and the internal one (company). Antispams are also great features as they filter all emails received, preventing potential threats from reaching your inbox.<\/p>\n<p>Did you know what Spear Phishing is? Do you invest safely against these attacks? Leave a comment for our team of experts!<\/p>\n<h2>Keep reading<\/h2>\n<p>[latest_post type=&#8217;boxes&#8217; number_of_posts=&#8217;3&#8242; number_of_colums=&#8217;3&#8242; order_by=&#8217;date&#8217; order=&#8217;ASC&#8217; category=&#8217;problem-recognition&#8217; text_length=&#8217;100&#8242; title_tag=&#8217;h4&#8242; display_category=&#8217;0&#8242; display_time=&#8217;0&#8242; display_comments=&#8217;0&#8242; display_like=&#8217;0&#8242; display_share=&#8217;0&#8242;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[rev_slider alias=&#8221;360&#215;280-anti-spam-8-beneficios&#8221;][\/rev_slider] The use of e-mail is a frequent reality in business routines, of all segments and sizes. Sending documents internally, professional transactions, ticketing and invoicing, communication between sectors; all contribute to the inboxes to be filled daily with new messages. This is a natural and essential process for business continuity, but beware: emails are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12784,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[983,984,988,992],"tags":[1614,1678],"class_list":["post-5218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-security","category-general","category-information-loss-or-leakage","category-learning-and-discovery","tag-phishing-en","tag-spear-phishing-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Spear Phishing and how to be protected? - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"description\" content=\"Emails are very important in a company. But did you know that they can bring great threats? Know what Spear Phishing is and how to protect yourself!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Spear Phishing and how to be protected? - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Emails are very important in a company. But did you know that they can bring great threats? Know what Spear Phishing is and how to protect yourself!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-25T11:50:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T13:07:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"What is Spear Phishing and how to be protected?\",\"datePublished\":\"2018-01-25T11:50:43+00:00\",\"dateModified\":\"2020-10-02T13:07:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\"},\"wordCount\":820,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg\",\"keywords\":[\"phishing\",\"spear phishing\"],\"articleSection\":[\"E-mails\",\"General\",\"Information loss or leakage\",\"Learning and discovery\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\",\"url\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\",\"name\":\"What is Spear Phishing and how to be protected? - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg\",\"datePublished\":\"2018-01-25T11:50:43+00:00\",\"dateModified\":\"2020-10-02T13:07:01+00:00\",\"description\":\"Emails are very important in a company. But did you know that they can bring great threats? Know what Spear Phishing is and how to protect yourself!\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg\",\"width\":928,\"height\":534,\"caption\":\"Homem segurando uma x\u00edcara de caf\u00e9 enquanto confere seus e-mails. Ele corre risco de cair em spear phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Spear Phishing and how to be protected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Spear Phishing and how to be protected? - OSTEC | Seguran\u00e7a digital de resultados","description":"Emails are very important in a company. But did you know that they can bring great threats? Know what Spear Phishing is and how to protect yourself!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/","og_locale":"en_US","og_type":"article","og_title":"What is Spear Phishing and how to be protected? - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Emails are very important in a company. But did you know that they can bring great threats? Know what Spear Phishing is and how to protect yourself!","og_url":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2018-01-25T11:50:43+00:00","article_modified_time":"2020-10-02T13:07:01+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"What is Spear Phishing and how to be protected?","datePublished":"2018-01-25T11:50:43+00:00","dateModified":"2020-10-02T13:07:01+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/"},"wordCount":820,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg","keywords":["phishing","spear phishing"],"articleSection":["E-mails","General","Information loss or leakage","Learning and discovery"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/","url":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/","name":"What is Spear Phishing and how to be protected? - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg","datePublished":"2018-01-25T11:50:43+00:00","dateModified":"2020-10-02T13:07:01+00:00","description":"Emails are very important in a company. But did you know that they can bring great threats? Know what Spear Phishing is and how to protect yourself!","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/01\/E-mails-e-caf\u00e9.jpg","width":928,"height":534,"caption":"Homem segurando uma x\u00edcara de caf\u00e9 enquanto confere seus e-mails. Ele corre risco de cair em spear phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/email-security\/spear-phishing-definition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is Spear Phishing and how to be protected?"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/en\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=5218"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/5218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12784"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=5218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=5218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=5218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}