{"id":70,"date":"2024-01-08T11:15:44","date_gmt":"2024-01-08T10:15:44","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=70"},"modified":"2024-02-22T21:06:23","modified_gmt":"2024-02-22T20:06:23","slug":"glossary","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/glossar\/","title":{"rendered":"Glossary"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-b3cf6ae62331710fe9634fab7e371c4d\"><strong>Glossary<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color wp-elements-1458b69560db02479a64798c072f0619\" style=\"font-style:normal;font-weight:600\">All important cybersecurity terms at a glance<\/h1>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-glossar.svg\" alt=\"\" class=\"wp-image-742\" style=\"width:602px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:60px;margin-bottom:200px;padding-right:15px;padding-left:15px\"><div class=\"glossar-posts\">\n\t\n\n<a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/advanced-persistent-threat-apt\/\">Advanced persistent threat (apt)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/antivirus-software\/\">Antivirus software<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/brute-force-angriff\/\">Brute force attack<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/buffer-overflow\/\">Buffer overflow<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/cybersecurity-framework\/\">Cybersecurity Framework<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/denial-of-service-dos\/\">Denial of Service (DoS)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/denial-of-service-dos-attacke\/\">Denial-of-service (dos) attack<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/distributed-denial-of-service-ddos\/\">Distributed Denial of Service (DDoS)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/distributed-denial-of-service-ddos-attacke\/\">Distributed denial-of-service (ddos) attack<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/endpoint-security\/\">Endpoint Security<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/exploit\/\">Exploit<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/firewall\/\">Firewall<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/incident-response\/\">Incident response<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/information-security-management-system\/\">Information Security Management System<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/intrusion-detection-system-ids\/\">Intrusion Detection System (ids)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/intrusion-prevention-system-ips\/\">Intrusion prevention system (ips)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/intrusion-response-plan\/\">Intrusion response plan<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/keylogger\/\">Keylogger<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/malware\/\">Malware<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/man-in-the-middle-mitm-attacke\/\">Man-in-the-middle (mitm) attack<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/multi-faktor-authentifizierung-mfa\/\">Multi-factor authentication (MFA)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/penetration-testing\/\">Penetration testing<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/penetrationstest\/\">Penetrationtest<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/pharming\/\">Pharming<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/phishing\/\">Phishing<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/privileged-access-management\/\">Privileged Access Management (PAM)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/ransomware\/\">Ransomware<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/rootkit\/\">Rootkit<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/secure-socket-layer-ssl\/\">Secure Socket Layer (SSL)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/security-audit\/\">Security Audit<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/security-information-and-event-management\/\">Security Information and Event Management (SIEM)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/security-operations-center\/\">Security operations centre<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/session-hijacking\/\">Session hijacking<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/spear-phishing-2\/\">Spear phishing<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/threat-intelligence\/\">Threat Intelligence<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/tokenization\/\">Tokenisation<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/transport-layer-security-tls\/\">Transport Layer Security (TLS)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/trojanisches-pferd\/\">Trojan horse<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/two-factor-authentication-2fa\/\">Two-factor authentication (2fa)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/virtual-private-network-vpn\/\">Virtual Private Network (VPN)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/virtualization\/\">Virtualisation<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/vulnerability\/\">Vulnerability<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/vulnerability-assessment\/\">Vulnerability Assessment<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/web-application-firewall-waf\/\">Web application firewall (waf)<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/zero-day-exploit\/\">Zero day exploit<\/a><a class=\"glossar-post wp-block-button__link has-link-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/glossar\/zero-day-vulnerability\/\">Zero-day vulnerability<\/a>\t<\/div>\n\t\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-77eb75476f3e30fdb41d950146faf06b wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Clear communication<\/li>\n\n\n\n<li class=\"fade-up\">Concrete solutions<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1328 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1328\" data-uid=\"69de254626be5\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1328\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1328 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1328\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69de254626be5\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69de254626be5\" id=\"forminator-field-name-1_69de254626be5-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69de254626be5\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69de254626be5\" id=\"forminator-field-email-1_69de254626be5-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69de254626be5\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69de254626be5\" id=\"forminator-field-phone-1_69de254626be5-label\" class=\"forminator-label\">Telephone<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69de254626be5\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69de254626be5\" id=\"forminator-field-textarea-1_69de254626be5-label\" class=\"forminator-label\">What would you like to tell us?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69de254626be5\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69de254626be5\" id=\"forminator-field-consent-1_69de254626be5-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69de254626be5__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69de254626be5\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69de254626be5-label\" aria-describedby=\"forminator-field-consent-1_69de254626be5__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69de254626be5__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12  forminator-hidden\"><div role=\"group\" class=\"forminator-field\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69de254626be5-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69de254626be5-label\" class=\"forminator-label\">Checkbox<\/span><label id=\"forminator-field-checkbox-1-1-69de254626be5-label\" for=\"forminator-field-checkbox-1-1-69de254626be5\" class=\"forminator-checkbox\" title=\"\/dev\/null please\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"one\" id=\"forminator-field-checkbox-1-1-69de254626be5\" aria-labelledby=\"forminator-field-checkbox-1-1-69de254626be5-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\" aria-describedby=\"forminator-field-checkbox-1-69de254626be5-description\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">\/dev\/null please<\/span><\/label><span id=\"forminator-field-checkbox-1-69de254626be5-description\" class=\"forminator-description\">My contact request should be piped directly to \/dev\/null.<\/span><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"ac0e6db699\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/70\" \/><input type=\"hidden\" name=\"form_id\" value=\"1328\"><input type=\"hidden\" name=\"page_id\" value=\"1555\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/glossar\/zero-day-vulnerability\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_7\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_7\" type=\"text\" name=\"input_7\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-d59d9b0b wp-block-group-is-layout-flex\" style=\"border-radius:10px;margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60);padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1327.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n\n<\/style>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Glossary All important cybersecurity terms at a glance<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-70","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":27,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/70\/revisions"}],"predecessor-version":[{"id":852,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/70\/revisions\/852"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}