{"id":457,"date":"2016-11-11T02:18:32","date_gmt":"2016-11-11T09:18:32","guid":{"rendered":"https:\/\/www.morphis-insights.com\/?p=457"},"modified":"2024-01-26T11:10:19","modified_gmt":"2024-01-26T11:10:19","slug":"state-sponsored-data-breaches","status":"publish","type":"post","link":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/","title":{"rendered":"2016 Sees Uptick in State-Sponsored Data Breaches"},"content":{"rendered":"<p>Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. In fact, a discussion surrounding cybersecurity found its way on to the United States\u2019 <a href=\"https:\/\/youtu.be\/R9GSJUAuFfE\" target=\"_blank\" rel=\"noopener\">presidential debate<\/a> stage earlier this year.<\/p>\n<p>Including September\u2019s revelation of the nearly 500 million Yahoo! accounts said to have been hacked\u2014 the largest data breach to date \u2014 a number of big names have come forward, revealing they, too, were the targets of cyberattacks. The list includes Dropbox, LinkedIn, Snapchat, Oracle, Verizon the Internal Revenue Service and now Yahoo!.<\/p>\n<p>In today\u2019s increasingly digital world, nation-states have acquired a growing taste for information and the concentration of information on outdated legacy systems has led to a drastic rise in nation-state hacking. Information has become political, after all.<\/p>\n<p>The Yahoo! breach may have included \u201cnames, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers\u201d according to a <a href=\"https:\/\/yahoo.tumblr.com\/post\/150781911849\/an-important-message-about-yahoo-user-security\" target=\"_blank\" rel=\"noopener\">statement<\/a> released by Yahoo!.<\/p>\n<p>Outdated legacy systems pose quite a challenge to information officers and executives overseeing cybersecurity threats and the tangled, old systems allow state-sponsored actors access to their databases through gaps in the network and security. While attributing these hacks remains a challenge, many companies and governments have improved their ability to find the perpetrators.<\/p>\n<p>Russia and China tend to lead the way when it comes to nation-state sponsored cyberattacks. The efforts of the Chinese tend to be economically driven, taking advantage of network gaps and gaps in security to produce economic accelerants via the theft of intellectual property. China\u2019s hacking framework is so broad and successful at targeting U.S. companies that the Department of Justice has called it a <a href=\"http:\/\/gizmodo.com\/justice-department-says-chinese-cyberespionage-is-a-nat-1753528044\" target=\"_blank\" rel=\"noopener\">national security emergency<\/a>.<\/p>\n<p>Russia, on the other hand, tends to focus its cyber efforts on gaining political leverage. Russia\u2019s emphasis is on altering policy, destabilizing or punishing countries (<a href=\"http:\/\/www.cnn.com\/2016\/02\/11\/politics\/ukraine-power-grid-attack-russia-us\/\" target=\"_blank\" rel=\"noopener\">attack on power grid in Ukraine<\/a>) and undermining political systems in both <a href=\"http:\/\/www.telegraph.co.uk\/news\/2016\/09\/21\/russia-blamed-for-hacking-attack-on-german-mps\/\" target=\"_blank\" rel=\"noopener\">Germany<\/a> and the <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/us-government-officially-accuses-russia-of-hacking-campaign-to-influence-elections\/2016\/10\/07\/4e0b9654-8cbf-11e6-875e-2c1bfe943b66_story.html\" target=\"_blank\" rel=\"noopener\">United States<\/a>. Recently, much has been discussed about the successful efforts of a pair of Russian intelligence-affiliated gangs, COZY BEAR AND FANCY BEAR as <a href=\"https:\/\/www.crowdstrike.com\/blog\/bears-midst-intrusion-democratic-national-committee\/\" target=\"_blank\" rel=\"noopener\">identified by the company Crowdstrike<\/a>, into the Democratic National Committee\u2019s network.<\/p>\n<p>The U.S. government is so concerned about modernization, the House of Representatives passed the IT Modernization Act, encouraging government agencies to modernize their IT software.<\/p>\n<p>In September, <a href=\"http:\/\/www.npr.org\/2016\/09\/22\/495069534\/yahoo-confirms-massive-data-breach-by-state-sponsored-actor\" target=\"_blank\" rel=\"noopener\">Yahoo! confirmed their massive breach<\/a> was the work of a state-sponsored actor \u2014 an individual acting on behalf of a government. But why would a nation-state want to hack Yahoo!?<\/p>\n<p>Scale might be the reason Yahoo! was targeted. Yahoo! was sitting on hundreds of millions of email accounts and related user data. In fact, Yahoo! provides email services to more than 560,000 domains, which include law firms, healthcare companies, churches and other potentially valuable sources of sensitive information.<\/p>\n<p>Such information can be incredibly valuable online, as people freely share information about their private lives via the Internet. Oftentimes, people repeatedly reuse the same password or answers to other security questions that can\u2019t easily be changed.<\/p>\n<p>Making matters worse, Yahoo! took years to discover and bring the breach to light, meaning sensitive information was stolen years before it was reported to the public.<\/p>\n<p>In the end, it is crucial that IT systems across every industry are modernized in order to reduce the threat of state-sponsored attacks. Breaches are proving to be not only expensive, but are becoming increasingly dangerous and politically charged as nation-states become more adept at stealing sensitive information.<\/p>\n<p>At Morphis, our state-of-the-art technology has allowed for low-risk, low-cost, rapid delivery of modernized applications for a number of years now. <a href=\"https:\/\/www.morphis-insights.com\/contact\/\" target=\"_blank\" rel=\"noopener\">Contact us<\/a> before a state-sponsored actor breaches your IT systems and software, putting your sensitive data at risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. In fact, a discussion surrounding cybersecurity found its way on to the United States\u2019 presidential debate stage earlier this year. Including September\u2019s revelation of the nearly 500 million Yahoo! accounts said to have been hacked\u2014 the largest data breach [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":456,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82],"tags":[110],"class_list":["post-457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-modernization","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2016 Sees Uptick in State-Sponsored Data Breaches | Morphis Insights<\/title>\n<meta name=\"description\" content=\"Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. Don&#039;t be a victim, update your legacy systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2016 Sees Uptick in State-Sponsored Data Breaches | Morphis Insights\" \/>\n<meta property=\"og:description\" content=\"Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. Don&#039;t be a victim, update your legacy systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Morphis-Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-11T09:18:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T11:10:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"732\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruno Andrade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Andrade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\"},\"author\":{\"name\":\"Bruno Andrade\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\"},\"headline\":\"2016 Sees Uptick in State-Sponsored Data Breaches\",\"datePublished\":\"2016-11-11T09:18:32+00:00\",\"dateModified\":\"2024-01-26T11:10:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\"},\"wordCount\":627,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Application Modernization\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\",\"name\":\"2016 Sees Uptick in State-Sponsored Data Breaches | Morphis Insights\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg\",\"datePublished\":\"2016-11-11T09:18:32+00:00\",\"dateModified\":\"2024-01-26T11:10:19+00:00\",\"description\":\"Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. Don't be a victim, update your legacy systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg\",\"width\":1100,\"height\":732,\"caption\":\"State-Sponsored Data Breaches\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/morphis-tech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2016 Sees Uptick in State-Sponsored Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"name\":\"Legacy Modernization - Blog\",\"description\":\"Legacy to Cloud\",\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\",\"name\":\"Morphis Tech\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"width\":344,\"height\":51,\"caption\":\"Morphis Tech\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/morphis_technologies\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\",\"name\":\"Bruno Andrade\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"caption\":\"Bruno Andrade\"},\"url\":\"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2016 Sees Uptick in State-Sponsored Data Breaches | Morphis Insights","description":"Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. Don't be a victim, update your legacy systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/","og_locale":"en_GB","og_type":"article","og_title":"2016 Sees Uptick in State-Sponsored Data Breaches | Morphis Insights","og_description":"Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. Don't be a victim, update your legacy systems.","og_url":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/","og_site_name":"Morphis-Tech Blog","article_published_time":"2016-11-11T09:18:32+00:00","article_modified_time":"2024-01-26T11:10:19+00:00","og_image":[{"width":1100,"height":732,"url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg","type":"image\/jpeg"}],"author":"Bruno Andrade","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Andrade","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#article","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/"},"author":{"name":"Bruno Andrade","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275"},"headline":"2016 Sees Uptick in State-Sponsored Data Breaches","datePublished":"2016-11-11T09:18:32+00:00","dateModified":"2024-01-26T11:10:19+00:00","mainEntityOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/"},"wordCount":627,"commentCount":0,"publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg","keywords":["Security"],"articleSection":["Application Modernization"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/","url":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/","name":"2016 Sees Uptick in State-Sponsored Data Breaches | Morphis Insights","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg","datePublished":"2016-11-11T09:18:32+00:00","dateModified":"2024-01-26T11:10:19+00:00","description":"Discussions surrounding cybersecurity have moved out of the offices of IT departments and into the limelight. Don't be a victim, update your legacy systems.","breadcrumb":{"@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#primaryimage","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/11\/Yahoo-confirms-state-sponsored-data-breach-tied-to-half-billion-accounts.jpg","width":1100,"height":732,"caption":"State-Sponsored Data Breaches"},{"@type":"BreadcrumbList","@id":"https:\/\/morphis-tech.com\/blog\/state-sponsored-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/morphis-tech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"2016 Sees Uptick in State-Sponsored Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/morphis-tech.com\/blog\/#website","url":"https:\/\/morphis-tech.com\/blog\/","name":"Legacy Modernization - Blog","description":"Legacy to Cloud","publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/morphis-tech.com\/blog\/#organization","name":"Morphis Tech","url":"https:\/\/morphis-tech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","width":344,"height":51,"caption":"Morphis Tech"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/morphis_technologies\/"]},{"@type":"Person","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275","name":"Bruno Andrade","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","caption":"Bruno Andrade"},"url":"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/"}]}},"_links":{"self":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/comments?post=457"}],"version-history":[{"count":1,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/457\/revisions"}],"predecessor-version":[{"id":6927,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/457\/revisions\/6927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media\/456"}],"wp:attachment":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media?parent=457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/categories?post=457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/tags?post=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}