{"id":1233,"date":"2024-02-22T23:36:54","date_gmt":"2024-02-22T22:36:54","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?p=1233"},"modified":"2024-02-22T23:36:55","modified_gmt":"2024-02-22T22:36:55","slug":"cyber-newsletter-5-january-2024","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2024\/02\/22\/cyber-newsletter-5-january-2024\/","title":{"rendered":"Cyber Newsletter (#5) \u2013 January 2024"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"300\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/Copie-de-newsletter-banners-1.png\" alt=\"\" class=\"wp-image-1234\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/Copie-de-newsletter-banners-1.png 1000w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/Copie-de-newsletter-banners-1-300x90.png 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/Copie-de-newsletter-banners-1-768x230.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>A simple method of detecting Pegasus spyware was made public<\/strong><\/p>\n\n\n\n<p><em>Russia\/World<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/link.sbstck.com\/redirect\/c3640bd3-7c77-4fd2-b532-35d10c614baf?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Kaspersky has developed a method<\/a>&nbsp;to detect iOS spyware like Pegasus, Reign, and Predator. This marks an important evolution in the fight against sophisticated commercial spyware notoriously used against dissidents, political opposition, and civil rights activicts across the world. The researchers also released a Python3 script on GitHub for users to self-check for spyware, and recommend daily reboots, Apple&#8217;s lockdown mode, and disabling iMessage and Facetime.<\/p>\n\n\n\n<p>This method comes as Pegasus creator NSO Group works to rehabilitate it\u2019s image and re-enter the surveillance industry. A<a href=\"https:\/\/link.sbstck.com\/redirect\/8ea64442-af58-45a5-b6bd-76d6719ee35e?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0recent exploration by Wired<\/a>\u00a0details the company\u2019s efforts to lobby and engage its technology, as the ongoing Israel war on Gaza presents opportunities for the surveillance and spyware industries.\u00a0<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>US Lawmakers Tell DOJ to Quit Blindly Funding \u2018Predictive\u2019 Police Tools<\/strong><\/p>\n\n\n\n<p><em>United States<\/em><\/p>\n\n\n\n<p>U.S. lawmakers have&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/5b92f5d6-f7ce-42a4-bb07-e8144b804b94?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">raised concerns<\/a>&nbsp;about the faciliation of the use of predictive policing tools by the U.S. Department of Justice. The DOJ has failed to convince lawmakers that it doesn\u2019t provide federal funding for local and state authorities to buy AI-based policing software. This software has been shown to reproduce bias, engender discrimination, and lead to the overpolicing of minority neighbourhoods, creating a discriminatory feedback-loop.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Global Cyber Resilience scorecard released in Davos<\/strong><\/p>\n\n\n\n<p><em>World<\/em><\/p>\n\n\n\n<p>Earlier this month,\u00a0<a href=\"https:\/\/link.sbstck.com\/redirect\/bf1d6c9e-55d6-4f75-9eb0-a096dade8fe0?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\">the inaugural cyber resilience global report was released at the 2024 Davos Forum<\/a>. SecurityScorecard presented its analysis at the onset of Davos 2024, categorizing 189 countries into 17 regions, and giving them a score based on different factors such as endpoint security or patching cadence. The report evaluates regional levels of cyber hygiene and underscores the extent to which\u00a0cybersecurity\u00a0resilience is linked to trust in the economy. Key findings include that exposure to cyber risk and GDP are strongly correlated, and that only 10 threat actor groups are responsible for about 44% of global cyber incidents. These actors are concentrated in certain geopolitical hotspots; 24% of cyberattacks studied in the report originated in China, followed by Russia with 15%. They also examine the complex mix of interdependencies among industries, the critical sectors at risk (mainly information and technology), and the existence of strong global supply chain vulnerabilities (98% of organizations use a 3rd party that has been breached).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><a href=\"https:\/\/link.sbstck.com\/redirect\/2c4f197a-8e7e-4521-aecc-59c5a0a223f2?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_NbT1MPjhwjLVWRNL7XUVbie-_SVuMLt4zIgJ4hWYC5_A85kn0bEh62reg9WM8bSQMkg7gGknBnPenHc_jsbg7ckLPkz4cHSOhVB1VVAjF2QjDHcQkSkNQ80m5FxrulJgeHBESR5spKAwkvK_rv1JxskJOpt_09FzTtu__dlhvjaxHEr6XGB9SIKKq__nqjqDORPKPQ_Y93M_5Kq8kyjXziLEQmj1Ps1xSBnVW7j9kW2baJBRI4OcQpHul84wnBfPmw6F6EaZ6ubtMlARkgJqMEm3zWqlCMnG4UcNyVC=s0-d-e1-ft#https:\/\/images.unsplash.com\/photo-1563206767-5b18f218e8de?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxoYWNraW5nfGVufDB8fHx8MTcwNzEzMTM3M3ww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080\" alt=\"flat screen computer monitor displaying white and black screen\" style=\"width:636px;height:auto\" title=\"flat screen computer monitor displaying white and black screen\"\/><\/a><figcaption class=\"wp-element-caption\">Photo by&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/12958d80-dd6c-4703-86fd-e96bf28e2987?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Mika Baumeister<\/a>&nbsp;on&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/6e421ef8-6571-4c56-9b69-3cefe500a341?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Unsplash<\/a><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Bitcoin price soars after the hack of the Securities and Exchange Commission X account<\/strong><\/p>\n\n\n\n<p><em>United States\/World<\/em><\/p>\n\n\n\n<p>On January 10, the official&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/e89d9f0a-f865-4fb1-9d56-e643852bf638?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">X account of the US Securities and Exchange Commission was hacked<\/a>&nbsp;and exploited to manipulate the bitcoin price. Cybercriminals published a message announcing the long-awaited authorisation to market a new bitcoin investment product. Throughout thirty minutes of confusion, the bitcoin price soared to $47,900 before falling back to $6,000. X announced that it had launched an investigation, and claimed that the hack was not the result of a security breach but of the absence of MFA on the SEC account. Hackers were therefore able to easily retrieve the authentication information via a hijacked telephone number.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Swiss government websites attacked in response to Volodymyr Zelensky&#8217;s invitation to the World Economic Forum in Davos<\/strong><\/p>\n\n\n\n<p><em>Switzerland<\/em><\/p>\n\n\n\n<p>A\u00a0<a href=\"https:\/\/link.sbstck.com\/redirect\/45f993d8-1e86-4974-8694-2d2467f41209?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\">cyber attack (DDoS) targeted several Swiss government websites<\/a>\u00a0as the World Economic Forum in Davos got underway earlier this month. The attackers, NoName group, presented the disruption as a Russian response to the Forum&#8217;s decision to welcome Ukrainian President Volodymyr Zelensky. The attack caused the targeted websites to become inaccessible, but did not result in any data leaks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Chinese espionage actor Volt Typhoon is targeting AUKUS via Cisco routers<\/strong><\/p>\n\n\n\n<p><em>China<\/em><\/p>\n\n\n\n<p>Chinese state-sponsored hackers known as\u00a0<a href=\"https:\/\/link.sbstck.com\/redirect\/6deb1cbd-1a7b-4dc4-9670-9478adf30901?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\">Volt Typhoon have been exploiting old vulnerabilities in Cisco routers<\/a>, targeting government entities in the US, UK, and Australia. One-third of the observed vulnerable Cisco devices were compromised over a 37-day period, potentially becoming part of the threat group&#8217;s botnet. This is likely an example of China&#8217;s broader strategy of targeting and stealing intelligence Western alliances oriented towards the Indo-Pacific, such as the AUKUS and Five Eyes.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><a href=\"https:\/\/link.sbstck.com\/redirect\/8e47f2df-db04-46c9-92e9-607c0a184ff9?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_NZZb7pD20hymFQ1cWmKGuvO3ODfBJ1g59VGAJUtT-PIugUzIZTbRcgm0rGUReFqxhneofMUN-YKY2aKVJRsd4VWSZ0s5MWRjwg3nJ3FUFqRApl6wokV3R28Juww8yAA7IV9hfd98TWIzDB0suZpJRjEQ-mty1ultc6CJ7FHy-iNue03Je3geCKZAPhiS1i6IbiIfJq6rmeT2-IBMhiyA0LrCQPAPCd0REf45CGClZ2cTH_lTp6wqT5ZPRODB4cXkYf_k3hdxlBSY6tDqE-Hh3gR-TBsrUurlIbBZ17JkZ9dlBSsyZOnh46WRVA=s0-d-e1-ft#https:\/\/images.unsplash.com\/photo-1617839625591-e5a789593135?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb21wdXRlciUyMGNoaXB8ZW58MHx8fHwxNzA3MTMxNTUwfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080\" alt=\"brown and black abstract painting\" style=\"width:558px;height:auto\" title=\"brown and black abstract painting\"\/><\/a><figcaption class=\"wp-element-caption\">Photo by&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/fc83dd93-2d07-4ec8-b02c-477df0339abd?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Manuel<\/a>&nbsp;on&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/6e421ef8-6571-4c56-9b69-3cefe500a341?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Unsplash<\/a><\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Semiconductor industries continue to grow globally<\/strong><\/p>\n\n\n\n<p><em>Vi\u00eat Nam, United States, Taiwan, South Korea.<\/em><\/p>\n\n\n\n<p>Nvidia announced the&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/ce45cc4b-402c-4db0-a533-39cbc90c06e5?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">creation of a new factory in Vietnam<\/a>&nbsp;and by extension the creation of a new research center. The American company has already invested $250 million in the country but wants to extend this collaboration. Vietnam&#8217;s technological potential is colossal and the country also benefits from low labor costs. Additionally, the country&#8217;s strategic position will still allow semiconductor exports to the European Union and the United States. The Vietnamese government is keen to develop these talents, hoping to boost its number of engineers in the semiconductor field from 6,000 to 50,000 by 2030.<\/p>\n\n\n\n<p>Competition is rife in the region, as Taiwanese semiconductor giant TSMC has recently signed a&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/d1869235-7e78-475b-80a6-234243710aba?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Memorandum of Understanding with its counterparts in the Czech Republic,<\/a>&nbsp;as TSMC seeks to expand its reach into Europe further, after the success of its expansion into Germany.&nbsp;<\/p>\n\n\n\n<p>In a further contestation to Taiwanese hegemony in the region,<a href=\"https:\/\/link.sbstck.com\/redirect\/a07f3f2f-6709-4ccd-bbc1-ac6dcd9cee37?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">&nbsp;South Korea unveiled a new $470 billion public investment<\/a>&nbsp;plan to boost its chip industry to become an international leader by 2047. This project aims to create the largest production site in the world within South Korea. This massive investment will allowed the creation of 13 new factories to meet the constant growth in global demand.&nbsp;<\/p>\n\n\n\n<p>Across the pond, the<a href=\"https:\/\/link.sbstck.com\/redirect\/dc80d338-8ee0-4d74-bd3f-4ad4ebdbc04b?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0U.S. government has announced plans to provide billions in funding for semiconductor companies<\/a>\u00a0both native and foreign. Indicative of the politicisation of semiconductor supply chains, part of this funding will be directed to Taiwanese company TSMC, as the U.S. continues to weaken the Chinese dominance over the global chip market. As part of its CHIPS Act, funds will be allocated to companies such as INTEL, South Korea\u2019s Samsung Electronics and Micron.\u00a0<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><a href=\"https:\/\/link.sbstck.com\/redirect\/e1ce553d-da38-4b28-9bdc-ecf2cc673d86?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_NbB7Znr5HYkpf_C3vRaHgeGRSSDr00LCBlFcmBHwuNo6W0pLB6JTQQe5RNs6iO92FnwIVeexROVn3_Au_GOfG5pqIHv4O4lpjigAGyFGsa5ODdjq2rNcp_4-i4a2Ov0Za9VXw3JEjd_s9BF9SRr7azrp45FEZsnpU5EaxSKvMRKqETtVoNg24zq_O1I-8CaxIUvLU8M_xbUMYyT-KqHcnQA84z81Uxv0EPR5CTDwUv_2JNA7bAoO1uMOcPIXYvjfDZKqdG2OZkSlKCcUTkzJLrf4VwJ2ipHqripTC3bP0NxxgMzQj187c77gp8=s0-d-e1-ft#https:\/\/substackcdn.com\/image\/fetch\/w_2048,c_limit,f_auto,q_auto:good,fl_progressive:steep\/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e7b0d3-7d16-48f6-bf76-1c2c139bdc2e_1024x682.jpeg\" alt=\"TIME for Kids | Fakeout\" style=\"width:560px;height:auto\" title=\"TIME for Kids | Fakeout\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Viral deepfakes of Taylor Swift prompt U.S. bill to curb deepfake-based sexual harrassment<\/strong><\/p>\n\n\n\n<p><em>United States<\/em><\/p>\n\n\n\n<p>A bipartisan group of US senators introduced a bill on Tuesday, titled the\u00a0<a href=\"https:\/\/link.sbstck.com\/redirect\/7fd19a63-1442-4fbf-8dba-2b848cb6ed4b?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\">Disrupt Explicit Forged Images and Non-Consensual Edits Act of 2024, or the \u201cDefiance Act.<\/a>\u201d The bill intends to criminalize the spread of non-consensual, sexualized images generated by artificial intelligence. The measure comes in direct response to the proliferation of pornographic AI-made images of Taylor Swift on X. The measure would allow victims depicted in nude or sexually explicit \u201cdigital forgeries\u201d to seek a civil penalty against \u201cindividuals who produced or possessed the forgery with intent to distribute it\u201d or anyone who received the material knowing it was not made with consent.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Association&nbsp;of South East Asian Nations announce guide on AI Governance<\/strong><\/p>\n\n\n\n<p><em>South East Asia<\/em><\/p>\n\n\n\n<p>The&nbsp;Association&nbsp;of Southeast Asian Nations&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/d4c25ca2-4981-4f7b-9bac-b0b8ac24c318?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">recently published a framework for artificial intelligence governance<\/a>. The ASEAN guide on AI governance and ethics includes&nbsp; national-level and regional-level recommendations that governments can consider implementing to design, develop, and deploy AI systems responsibly.<\/p>\n\n\n\n<p>ASEAN is made up of Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam. Critics have raised concerns regarding the imbalance of capabilities between ASEAN nations, as Singapore clearly leads whilst other nations lag behind in AI-capabilites. Challenges remain for these nations to develop capabilities and AI-readiness as differing stages of digital development bring \u201cdrastically different policy concerns and considerations.\u201d\u00a0<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Cookies: CNIL imposes \u20ac10 million fine on Yahoo<\/strong><\/p>\n\n\n\n<p><em>France<\/em><\/p>\n\n\n\n<p>The French&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/f405e18a-5354-4743-8b06-bd0aba2c0bde?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">data protection authority (CNIL)<\/a>&nbsp;accuses the American group of having tracked its users using around twenty cookies even though they had asked not to be tracked. Triggered by twenty-seven complaints, this investigation has, according to the CNIL, led to the discovery of other breaches, in particular on the Yahoo Mail service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out what happened in the cyberspace during the month of January!<\/p>\n","protected":false},"author":7,"featured_media":801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1233"}],"version-history":[{"count":3,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1233\/revisions"}],"predecessor-version":[{"id":1237,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1233\/revisions\/1237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/801"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=1233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}