{"id":2758,"date":"2016-05-04T14:51:57","date_gmt":"2016-05-04T14:51:57","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2758"},"modified":"2020-05-06T10:28:07","modified_gmt":"2020-05-06T17:28:07","slug":"fighting-point-of-sale-pos-malware-by-using-dns","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/","title":{"rendered":"Fighting Point-of-Sale (POS) Malware by Using DNS"},"content":{"rendered":"<p>If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0<a title=\"Blog on Firewalls and DNS Firewall\" href=\"https:\/\/community.infoblox.com\/t5\/Security-Blog\/3-Reasons-why-Firewalls-alone-cannot-stop-Malware-and-Data\/ba-p\/5877\" target=\"_blank\" rel=\"noopener noreferrer\"><u>this blog<\/u><\/a>\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.<\/p>\n<p><a title=\"DNS Firewall\" href=\"https:\/\/www.infoblox.com\/products\/secure-dns\/dns-firewall?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Infoblox DNS Firewall<\/u>\u00a0<\/a>helps organizations more effectively fight modern day threats, including POS Malware that favors DNS as the protocol over which to steal data. Infoblox DNS Firewall uses a threat intelligence feed, which automatically updates the DNS Firewall policy with observed and verified malicious Internet destinations. DNS Firewall takes action on endpoints attempting to connect to those known malicious destinations.<\/p>\n<p>In addition,\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/secure-dns\/threat-insight?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><u>Infoblox Threat Insight<\/u><\/a>, an optional feature set available for Infoblox appliances, uses streaming analytics to detect even the most sophisticated methods that embed data directly in DNS queries. This streaming analytics, unique to Infoblox, can automatically add malicious domains to the DNS Firewall block policy, thereby disrupting endpoint communications with these domains associated with data exfiltration.<\/p>\n<p>Check out Infoblox\u2019s Cyber Threat Advisory on the latest\u00a0<strong>Multigrain POS malware<\/strong>\u00a0in the downloadable document below.<\/p>\n<p>Every organization has sensitive data and cannot easily pinpoint malicious insiders, which can end up putting the organization at risk for a data breach.The latest Verizon 2016 Data Breach Investigations Report revealed, \u201cInsider incidents are the hardest (and take the longest) to detect. Of all the incidents, these insider misuse cases are the most likely to take months or years to discover\u2026. What motivates them? Most frequently it is the potential for financial gain.\u201d<\/p>\n<p>As such, it would be in your best interest to test out Infoblox DNS Firewall and Infoblox Threat Insight solutions to verify:<\/p>\n<p>1) If there are any malware C&amp;C communications taking place using your recursive DNS and<\/p>\n<p>2) If data is leaking out of your network over DNS queries unbeknownst to you.<\/p>\n<p>You owe this much to your employees, customers and partners.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches. Infoblox DNS Firewall\u00a0helps organizations more effectively [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":2761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,32,15],"class_list":{"0":"post-2758","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-malware","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fighting Point-of-Sale (POS) Malware by Using DNS<\/title>\n<meta name=\"description\" content=\"If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting Point-of-Sale (POS) Malware by Using DNS\" \/>\n<meta property=\"og:description\" content=\"If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-04T14:51:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Seema Kathuria\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Seema Kathuria\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/\"},\"author\":{\"name\":\"Seema Kathuria\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\"},\"headline\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\",\"datePublished\":\"2016-05-04T14:51:57+00:00\",\"dateModified\":\"2020-05-06T17:28:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/\"},\"wordCount\":332,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"keywords\":[\"Infoblox\",\"Malware\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/\",\"name\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"datePublished\":\"2016-05-04T14:51:57+00:00\",\"dateModified\":\"2020-05-06T17:28:07+00:00\",\"description\":\"If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/fighting-point-of-sale-pos-malware-by-using-dns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ce258d2acd6fe6d47748fbdb60700c9a\",\"name\":\"Seema Kathuria\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g\",\"caption\":\"Seema Kathuria\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/seema-kathuria\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fighting Point-of-Sale (POS) Malware by Using DNS","description":"If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/","og_locale":"en_US","og_type":"article","og_title":"Fighting Point-of-Sale (POS) Malware by Using DNS","og_description":"If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/","og_site_name":"Infoblox Blog","article_published_time":"2016-05-04T14:51:57+00:00","article_modified_time":"2020-05-06T17:28:07+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","type":"image\/jpeg"}],"author":"Seema Kathuria","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Seema Kathuria","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/"},"author":{"name":"Seema Kathuria","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a"},"headline":"Fighting Point-of-Sale (POS) Malware by Using DNS","datePublished":"2016-05-04T14:51:57+00:00","dateModified":"2020-05-06T17:28:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/"},"wordCount":332,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","keywords":["Infoblox","Malware","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/","url":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/","name":"Fighting Point-of-Sale (POS) Malware by Using DNS","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","datePublished":"2016-05-04T14:51:57+00:00","dateModified":"2020-05-06T17:28:07+00:00","description":"If you haven\u2019t heard of a DNS firewall, but are familiar with a \u201cfirewall\u201d, you may want to first check out\u00a0this blog\u00a0to learn that even though a firewall is an important tool in the security arsenal, it is usually not enough to control malware infections and prevent data breaches.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","width":660,"height":454,"caption":"Fighting Point-of-Sale (POS) Malware by Using DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/fighting-point-of-sale-pos-malware-by-using-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Fighting Point-of-Sale (POS) Malware by Using DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ce258d2acd6fe6d47748fbdb60700c9a","name":"Seema Kathuria","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5f088f29b8cec333f9848fb20d412f328aba4a72709c272987abee99a1384d5?s=96&d=blank&r=g","caption":"Seema Kathuria"},"url":"https:\/\/www.infoblox.com\/blog\/author\/seema-kathuria\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2758"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2758\/revisions"}],"predecessor-version":[{"id":2762,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2758\/revisions\/2762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2761"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}