{"id":7300,"date":"2024-02-12T08:03:22","date_gmt":"2024-02-12T07:03:22","guid":{"rendered":"https:\/\/www.softeng.es\/blog\/how-major-cyberattacks-will-evolve-in-2024\/"},"modified":"2024-09-19T16:08:21","modified_gmt":"2024-09-19T14:08:21","slug":"how-major-cyberattacks-will-evolve-in-2024","status":"publish","type":"post","link":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/","title":{"rendered":"How major cyberattacks will evolve in 2024"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;]We are in a world where every click can be a trap, and every email a gateway to a new attack. We have already discussed the <a href=\"https:\/\/www.softeng.es\/blog\/como-pueden-afectar-los-6-ciberataques-mas-comunes-a-los-activos-de-negocio\/\" target=\"_blank\" rel=\"noopener\">most common cyber-attacks<\/a> and how they can affect business assets. In this article <strong>we will go a step further to analyze how these AI-powered cyberattacks have evolved in 2024<\/strong> and how you can deal with them. <\/p>\n<h2><span style=\"color: #001689;\">1. Increasingly sophisticated social engineering attacks<\/span><\/h2>\n<p> In 2024, social engineering attacks will continue to take center stage. However, they<strong> will be harder to detect and more personalized than ever, with phishing and deepfakes leading the way<\/strong>. Cybercriminals are already implementing new techniques to achieve their goals. One of them is callback phishing, also known as callback phishing. In this new type of attack, cybercriminals send an email to victims simulating expensive subscriptions, in which they include a telephone number. The victims, upon seeing the high amount, call the phone number in the email in order to cancel the subscription. It is in that call that they will try to steal your data. Now then&#8230; How to avoid this and other types of social engineering attacks? With awareness and a robust <a href=\"https:\/\/www.softeng.es\/en\/blog\/why-should-your-company-adopt-a-zero-trust-security-strategy\/\" target=\"_blank\" rel=\"noopener\">Zero Trust security strategy<\/a>. An example of this is Via Celere, which with the accompaniment of Softeng has achieved an advanced level of security, managing daily and centralized through <a href=\"https:\/\/www.softeng.es\/en\/softeng-max\/\" target=\"_blank\" rel=\"noopener\">Softeng Max Platform<\/a> alerts Microsoft 365 and Azure. Here we tell you more about <a href=\"https:\/\/www.softeng.es\/casos-de-exito\/como-via-celere-ha-conseguido-construir-una-estrategia-de-seguridad-zero-trust-con-softeng\/\" target=\"_blank\" rel=\"noopener\">V\u00eda C\u00e9lere&#8217;<\/a>s <a href=\"https:\/\/www.softeng.es\/casos-de-exito\/como-via-celere-ha-conseguido-construir-una-estrategia-de-seguridad-zero-trust-con-softeng\/\" target=\"_blank\" rel=\"noopener\">success story<\/a>.  <\/p>\n<h2><span style=\"color: #001689;\">Ransomware and malware on new attack surfaces.<\/span><\/h2>\n<p> Malware will also continue to rise, <strong>exploiting new attack surfaces and new vulnerabilities<\/strong>. And yes, they will also be increasingly difficult to detect. New techniques such as dual ransomware or triple extortion attacks are already multiplying attacks and generating further financial, compliance and reputational consequences. The only way to avoid them is to have modern security solutions based on suspicious behavior detection, together with a policy of vulnerability analysis and management. <\/p>\n<h2><span style=\"color: #001689;\">3. More potential entries for OT and IoT infrastructure attacks<\/span><\/h2>\n<p> With respect to OT, <strong>special attention will have to be given to critical infrastructures, public administrations and essential services<\/strong>, although private companies will also be targeted. As for IoT, more and more devices will appear that communicate with each other and access the Internet, creating more potential &#8220;gateways&#8221; for cyber attackers to exploit. <\/p>\n<h2><span style=\"color: #001689;\">4. Identity theft and privilege escalation will continue to increase.<\/span><\/h2>\n<p> We are seeing more and more cases of using data such as names, Social Security numbers and bank details without consent. In 2024, these types of cyberattacks<strong> will continue to increase to produce lateral movements and compromise the maximum number of business assets.<\/strong> The reasons? Technological progress, characterized by greater interconnection and dependence on digital systems, which opens new doors for cybercriminals to exploit vulnerabilities. <\/p>\n<h2><span style=\"color: #001689;\">5. Unsafe application design is gaining ground<\/span><\/h2>\n<p> This will be another susceptible attack surface and cybercriminals will focus on risks related to design flaws. On the one hand, we will need to obtain details of the assets published on the Internet for the detection of vulnerabilities. And, on the other hand, to establish with developers secure design principles and reference architectures based on reference frameworks. <\/p>\n<h2><span style=\"color: #001689;\">Attacks are advancing, technology is advancing<\/span><\/h2>\n<p> In 2024 we will continue to battle cyber threats that are increasingly difficult to detect, and information and preparedness are our best weapons. As a leader in cybersecurity, it is our responsibility to always be one step ahead to help companies avoid attacks that can have serious consequences. Alex Imbern\u00f3n, Cybersecurity Manager of Softeng, shares answers on this topic in his article: <a href=\"https:\/\/www.softeng.es\/en\/blog\/3-key-cybersecurity-questions-every-ceo-needs-to-know-how-to-answer\/\" target=\"_blank\" rel=\"noopener\">3 key questions on cybersecurity that every CEO should know how to answer<\/a>.[\/vc_wp_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_wp_text el_class=&#8221;section-post-default&#8221;]We are in a world where every click can be a trap, and every email a gateway to a new attack. We have already discussed the most common cyber-attacks and how they can affect business assets. In this article we will go a step further to analyze how these AI-powered cyberattacks have evolved in [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":4450,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[56],"tags":[],"categoria_posts":[],"class_list":["post-7300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How major cyberattacks will evolve in 2024 - Softeng<\/title>\n<meta name=\"description\" content=\"In this article we look at how major cyberattacks evolve in 2024, powered by AI, and how you can deal with them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How major cyberattacks will evolve in 2024 - Softeng\" \/>\n<meta property=\"og:description\" content=\"In this article we look at how major cyberattacks evolve in 2024, powered by AI, and how you can deal with them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Softeng\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T07:03:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T14:08:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softeng.es\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1229\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abril Saglietti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abril Saglietti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\"},\"author\":{\"name\":\"Abril Saglietti\",\"@id\":\"https:\/\/www.softeng.es\/en\/#\/schema\/person\/706a44d843957aeef44ebc7f2fcf9a78\"},\"headline\":\"How major cyberattacks will evolve in 2024\",\"datePublished\":\"2024-02-12T07:03:22+00:00\",\"dateModified\":\"2024-09-19T14:08:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\"},\"wordCount\":618,\"publisher\":{\"@id\":\"https:\/\/www.softeng.es\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg\",\"articleSection\":[\"CIBERSEGURIDAD\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\",\"url\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\",\"name\":\"How major cyberattacks will evolve in 2024 - Softeng\",\"isPartOf\":{\"@id\":\"https:\/\/www.softeng.es\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage\"},\"thumbnailUrl\":\"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg\",\"datePublished\":\"2024-02-12T07:03:22+00:00\",\"dateModified\":\"2024-09-19T14:08:21+00:00\",\"description\":\"In this article we look at how major cyberattacks evolve in 2024, powered by AI, and how you can deal with them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage\",\"url\":\"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg\",\"contentUrl\":\"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg\",\"width\":1500,\"height\":1229,\"caption\":\"Art\u00edculo - evoluci\u00f3n ciberamenazas\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softeng.es\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How major cyberattacks will evolve in 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softeng.es\/en\/#website\",\"url\":\"https:\/\/www.softeng.es\/en\/\",\"name\":\"Softeng\",\"description\":\"Softeng | Maximize the cloud. Securely.\",\"publisher\":{\"@id\":\"https:\/\/www.softeng.es\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softeng.es\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.softeng.es\/en\/#organization\",\"name\":\"Softeng\",\"url\":\"https:\/\/www.softeng.es\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softeng.es\/en\/#\/schema\/logo\/image\/\",\"url\":\"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png\",\"contentUrl\":\"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png\",\"width\":696,\"height\":696,\"caption\":\"Softeng\"},\"image\":{\"@id\":\"https:\/\/www.softeng.es\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/softeng\/\",\"https:\/\/www.youtube.com\/@SoftengSL\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softeng.es\/en\/#\/schema\/person\/706a44d843957aeef44ebc7f2fcf9a78\",\"name\":\"Abril Saglietti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/da3c5d77be20c5e190d806cce7001d978f005fe25cea9af1bcc7f0dea0173f15?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da3c5d77be20c5e190d806cce7001d978f005fe25cea9af1bcc7f0dea0173f15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da3c5d77be20c5e190d806cce7001d978f005fe25cea9af1bcc7f0dea0173f15?s=96&d=mm&r=g\",\"caption\":\"Abril Saglietti\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How major cyberattacks will evolve in 2024 - Softeng","description":"In this article we look at how major cyberattacks evolve in 2024, powered by AI, and how you can deal with them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/","og_locale":"en_US","og_type":"article","og_title":"How major cyberattacks will evolve in 2024 - Softeng","og_description":"In this article we look at how major cyberattacks evolve in 2024, powered by AI, and how you can deal with them.","og_url":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/","og_site_name":"Softeng","article_published_time":"2024-02-12T07:03:22+00:00","article_modified_time":"2024-09-19T14:08:21+00:00","og_image":[{"width":1500,"height":1229,"url":"https:\/\/www.softeng.es\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg","type":"image\/jpeg"}],"author":"Abril Saglietti","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abril Saglietti","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#article","isPartOf":{"@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/"},"author":{"name":"Abril Saglietti","@id":"https:\/\/www.softeng.es\/en\/#\/schema\/person\/706a44d843957aeef44ebc7f2fcf9a78"},"headline":"How major cyberattacks will evolve in 2024","datePublished":"2024-02-12T07:03:22+00:00","dateModified":"2024-09-19T14:08:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/"},"wordCount":618,"publisher":{"@id":"https:\/\/www.softeng.es\/en\/#organization"},"image":{"@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg","articleSection":["CIBERSEGURIDAD"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/","url":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/","name":"How major cyberattacks will evolve in 2024 - Softeng","isPartOf":{"@id":"https:\/\/www.softeng.es\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg","datePublished":"2024-02-12T07:03:22+00:00","dateModified":"2024-09-19T14:08:21+00:00","description":"In this article we look at how major cyberattacks evolve in 2024, powered by AI, and how you can deal with them.","breadcrumb":{"@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#primaryimage","url":"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg","contentUrl":"\/wp-content\/uploads\/2024\/02\/Articulo-evolucion-ciberamenazas.jpg","width":1500,"height":1229,"caption":"Art\u00edculo - evoluci\u00f3n ciberamenazas"},{"@type":"BreadcrumbList","@id":"https:\/\/www.softeng.es\/en\/blog\/how-major-cyberattacks-will-evolve-in-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softeng.es\/en\/"},{"@type":"ListItem","position":2,"name":"How major cyberattacks will evolve in 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.softeng.es\/en\/#website","url":"https:\/\/www.softeng.es\/en\/","name":"Softeng","description":"Softeng | Maximize the cloud. Securely.","publisher":{"@id":"https:\/\/www.softeng.es\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softeng.es\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.softeng.es\/en\/#organization","name":"Softeng","url":"https:\/\/www.softeng.es\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softeng.es\/en\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","contentUrl":"\/wp-content\/uploads\/2024\/11\/Logotipo-para-SEOYoast.png","width":696,"height":696,"caption":"Softeng"},"image":{"@id":"https:\/\/www.softeng.es\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/softeng\/","https:\/\/www.youtube.com\/@SoftengSL"]},{"@type":"Person","@id":"https:\/\/www.softeng.es\/en\/#\/schema\/person\/706a44d843957aeef44ebc7f2fcf9a78","name":"Abril Saglietti","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/da3c5d77be20c5e190d806cce7001d978f005fe25cea9af1bcc7f0dea0173f15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/da3c5d77be20c5e190d806cce7001d978f005fe25cea9af1bcc7f0dea0173f15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da3c5d77be20c5e190d806cce7001d978f005fe25cea9af1bcc7f0dea0173f15?s=96&d=mm&r=g","caption":"Abril Saglietti"}}]}},"_links":{"self":[{"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/posts\/7300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/comments?post=7300"}],"version-history":[{"count":0,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/posts\/7300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/media\/4450"}],"wp:attachment":[{"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/media?parent=7300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/categories?post=7300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/tags?post=7300"},{"taxonomy":"categoria_posts","embeddable":true,"href":"https:\/\/www.softeng.es\/en\/wp-json\/wp\/v2\/categoria_posts?post=7300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}