{"id":2429,"date":"2021-07-08T18:57:43","date_gmt":"2021-07-08T13:27:43","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2429"},"modified":"2021-07-08T18:57:45","modified_gmt":"2021-07-08T13:27:45","slug":"emails-fatigue-among-users-open-the-doors-for-threat-actors","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/","title":{"rendered":"Emails Fatigue Among Users Open the doors for Threat Actors!"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">Given the group transmission to remote work, more sensitive business information is being transmitted by email than ever before. Users can now receive more than hundreds of emails a day, and going through every email is a time-consuming and tedious task.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Going through with that skyrocketing sound, it\u2019s unimaginable that there\u2019s a growing email weakness. Unfortunately, that weakness makes it more likely users will click on a malicious email without even knowing it \u2013 which explains why 94% of Trojan is now transmitted via email.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Analyzing recent examples of email adversaries not only ensures you are aware of the various ways attackers are exploiting victim\u2019s inboxes, but it\u2019s also the initial step to encounter the rising threat.<\/p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Some Recent Attacks via Emails<\/strong><\/h4>\n\n\n\n<p><p style=\"text-align: justify;\">Although Spam is now counted as an old-school technique, cybercriminals still use it for malicious purposes. The unauthorized and unsubscribe spam email is a technique used by attackers to filter their mailing lists and verify email addresses. When a user clicks on an unauthorized link in a spam email, they are confirming to the spammer that their email address is correct, active, and monitor regularly. From there, the user can be targeted to receive more email attacks with more malicious payloads.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">More than 80% of reported security incidents are via Phishing accounts. A recent example happened this past May when Nobelium (the gang behind the well-known SolarWinds attack) utilized a phishing attack to drop backdoor Trojan on more than 150 different organizations. Another prime phishing attack includes Five Rivers Health Centers in Dayton, Ohio, where more than 155,000 patients had their protected health data exposed for two months due to an email phishing attack. In 2020, Her Majesty\u2019s Revenue and Customs (HMRC) in the U.K. was researching more than 10,000 phishing scams that exploit public fears of the epidemic.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Moreover, 95% of all the attacks on enterprise networks are the outcome of successful lance phishing. In November 2020, the co-founder of the Australian hedge fund, Levitas Capital, was a victim of a whipping attack, which is a form of spear phishing. While the attack cost the company worth $800,000 \u2013 quite a bit less than the $8 million originally targeted \u2013 it also outcome in the loss of the hedge fund\u2019s largest client. In the end, the business was required to permanently close.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In the year 2019, the cybersecurity survey revealed that 26% of organizations globally were targeted of one to 10 business e-mail compromise (BEC) attacks. According to the FBI\u2019s Internet Crime Complaint Center (IC3), BEC scams were the priciest losses of approximately $1.8 billion. Current BEC attacks include abusive attacks on:<\/p><\/p>\n\n\n\n<ol type=\"1\"><li>The Puerto Rican government, which amounted to $4 million.<\/li><li>Shark Tank Host, Barbara Corcoran, which amounted to $380,000.<\/li><li>And Japanese media giant, Nikkei, who transferred $29 million based on guidance in a fraudulent email.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the Importance of Emails in the Attacker Approach?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Cybercriminals constantly sharpen up their email strategies by playing on a victim\u2019s emotion\/: generating fear, exploiting greed, taking advantage of a user\u2019s curiosity, asking for help, or appealing for users to feel empathy or sympathy. This approach is often used by ransomware-as-a-service attackers.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"275\" height=\"183\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Email-fatigue-among-users-opens-doors-for-cybercriminals-image2.jpg\" alt=\"Email-fatigue-among-users-opens-doors-for-cybercriminals-image1\" class=\"wp-image-2432\"\/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">In the ransomware-as-a-service model, a malware group gives these attackers, known as distributors, the tool to transmit ransomware, while the distributor\u2019s goal is to harm as many computers as possible. It is a similar distribution model that SaaS biggies like Salesforce.com utilize. To improve their effectiveness, cybercriminals now use artificial intelligence (AI) and automation to extend their email attacks.&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Sadly, users don\u2019t even know that their systems are infected. Trojan can lay inoperative for a duration of time or go undetected. Advanced persistent threats (APTs) go undiscovered an average of 71 days in the Americas, 177 days in EMEA, and 204 days in APAC.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Given its achievement, we can expect cybercriminals to constantly generate emails a star in their attack strategies.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">To stop or mitigate the risk of an attack, a business has three obstacles that must be utilized in analogy.<\/p><\/p>\n\n\n\n<ul><li>Constant user education on what new attacks look like<\/li><li>Advanced anti-malware that gives multi-layer strategies to stop attacks in their ways.<\/li><li>Circumstance plans to revert and manage an attack, mitigate the harm, and recover as quickly as possible.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Multi-layered Strategies Provide the best Email Security<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"316\" height=\"160\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Email-fatigue-among-users-opens-doors-for-cybercriminals-image1.jpg\" alt=\"Email-fatigue-among-users-opens-doors-for-cybercriminals-image2\" class=\"wp-image-2433\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Email-fatigue-among-users-opens-doors-for-cybercriminals-image1.jpg 316w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Email-fatigue-among-users-opens-doors-for-cybercriminals-image1-300x152.jpg 300w\" sizes=\"(max-width: 316px) 100vw, 316px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">When we talk about email security, a one-and-done approach never works. Trojan will get through a single defense, so a solution must provide multiple layers of protection. That\u2019s why, if malware prevents one defense, a consequent layer will stop it. Consider the following multi-layer protection program:<\/p><\/p>\n\n\n\n<ul><li>An anti-spam engine that decreases the risk of bypassing unwanted spam mails.<\/li><li>Anti-evasion technology that avoids advanced evasion tactics that utilized fixed files and anonymous URLs.<\/li><li>Threat Intelligence to avoid emerging threats from infiltrating your email.&nbsp;&nbsp;<\/li><li>Detection to avoid advanced attacks, like APTs and zero-day attacks that ordinary defenses miss.<\/li><li>Anti-phishing engines to avoid any type of phishing attack before it reaches the user.<\/li><li>Anti-spoofing tactic to preserve user protection against social engineering and payload-less attacks.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Given the group transmission to remote work, more sensitive business information is being transmitted by email than ever before. Users can now receive more than hundreds of emails a day, and going through every email is a time-consuming and tedious task. Going through with that skyrocketing sound, it\u2019s unimaginable that there\u2019s a growing email weakness. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2431,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emails Fatigue Among Users Open the doors for Threat Actors! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emails Fatigue Among Users Open the doors for Threat Actors! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Given the group transmission to remote work, more sensitive business information is being transmitted by email than ever before. Users can now receive more than hundreds of emails a day, and going through every email is a time-consuming and tedious task. Going through with that skyrocketing sound, it\u2019s unimaginable that there\u2019s a growing email weakness. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-08T13:27:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T13:27:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Email-fatigue-among-users-opens-doors-for-cybercriminals-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Emails Fatigue Among Users Open the doors for Threat Actors!\",\"datePublished\":\"2021-07-08T13:27:43+00:00\",\"dateModified\":\"2021-07-08T13:27:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\"},\"wordCount\":834,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\",\"url\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\",\"name\":\"Emails Fatigue Among Users Open the doors for Threat Actors! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-07-08T13:27:43+00:00\",\"dateModified\":\"2021-07-08T13:27:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emails Fatigue Among Users Open the doors for Threat Actors!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emails Fatigue Among Users Open the doors for Threat Actors! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/","og_locale":"en_US","og_type":"article","og_title":"Emails Fatigue Among Users Open the doors for Threat Actors! - Xiarch Solutions Private Limited","og_description":"Given the group transmission to remote work, more sensitive business information is being transmitted by email than ever before. Users can now receive more than hundreds of emails a day, and going through every email is a time-consuming and tedious task. Going through with that skyrocketing sound, it\u2019s unimaginable that there\u2019s a growing email weakness. [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-07-08T13:27:43+00:00","article_modified_time":"2021-07-08T13:27:45+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Email-fatigue-among-users-opens-doors-for-cybercriminals-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Emails Fatigue Among Users Open the doors for Threat Actors!","datePublished":"2021-07-08T13:27:43+00:00","dateModified":"2021-07-08T13:27:45+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/"},"wordCount":834,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/","url":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/","name":"Emails Fatigue Among Users Open the doors for Threat Actors! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-07-08T13:27:43+00:00","dateModified":"2021-07-08T13:27:45+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/emails-fatigue-among-users-open-the-doors-for-threat-actors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emails Fatigue Among Users Open the doors for Threat Actors!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2429"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2429"}],"version-history":[{"count":3,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2429\/revisions"}],"predecessor-version":[{"id":2448,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2429\/revisions\/2448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2431"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}