{"id":4457,"date":"2013-08-10T12:57:29","date_gmt":"2013-08-10T19:57:29","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4457"},"modified":"2020-05-06T10:31:39","modified_gmt":"2020-05-06T17:31:39","slug":"did-you-ever-think-youd-see-a-news-story-like-this","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/","title":{"rendered":"Did you ever think you&#8217;d see a news story like this?"},"content":{"rendered":"<p>\u201cSecurity company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil. The toilets can be controlled using an Android app\u2026\u201d<\/p>\n<p>According to Trustwave, \u201cAttackers could cause the unit to unexpectedly open\/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user.\u201d<\/p>\n<p>Pretty funny, right? I\u2019m sure the user is distressed\u2014but not as much as JC penny, Visa, and Nasdaq, who recently found themselves on a list of the victims of one of the biggest hacking events ever. These companies were under attack for three or four years and didn\u2019t know it.<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4458\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/hacker.png\" alt=\"Hacker news article\" width=\"266\" height=\"139\" \/><\/div>\n<p>It\u2019s not really all that funny.<\/p>\n<p>If you\u2019ve been around IT for any time at all, you\u2019ve seen security threats evolve from mischievous annoyances to deadly serious business-threatening assaults.<\/p>\n<p>Back when personal computing was just getting started, hacking attacks were essentially pranks by young programmers who just wanted to show what they could do with code. They took the form primarily of boot viruses that attacked individual computers.<\/p>\n<p>But it didn\u2019t take long for hackers to start getting serious, and to start targeting corporate IT infrastructures. New techniques included worms, Trojan horses, flood attacks, limited-target hacking, and denial-of-service (DoS) attacks.<\/p>\n<p>We watched hacking become a business, and security threats reached industrial strength\u2014distributed denial of service (DDoS) attacks and attacks that combined multiple techniques. And the advanced persistent threat (APT) reared its ugly head.<\/p>\n<p>Now enterprise computing infrastructures are under attack from organized criminal groups, rogue governments, and extreme activists with political axes to grind. Companies are fighting to keep their operations running, their revenues coming in, and their reputations intact\u2014and at the same time protect the identities, personal information, and bank and credit-card accounts of their customers.<\/p>\n<p>It\u2019s an ongoing battle between good and evil.<\/p>\n<p>You can\u2019t help but think of star wars. It\u2019s not much of an exaggeration to call it a full-scale war between good and evil, a conflict with the dark side of the IT force. As criminals refine and perfect their attacks, technology vendors develop new weapons to defend against them. And as defenses get stronger, attackers step up their assaults.<\/p>\n<p>So in the \u201880s, firewalls and antivirus software were enough. By the \u201890s, we were deploying deep packet inspection, intrusion-prevention systems, web filtering, and data-loss prevention systems. By 2000, unified threat management and web application firewalls were raising the walls higher against the rising flood of threats. And today we\u2019re deploying defense-in-depth and security information and event management solutions to detect APTs and prevent DDoS attacks.<\/p>\n<p>What makes it all so challenging?<\/p>\n<p>Why is it, then, that even with multilayered, state-of-the-art security technology in place, the bad guys still win with alarming regularity? Why do we keep seeing statistics like \u201c855 successful breaches, 174 million records compromised, remediation costs of $5.4 million in the United States and $4.8 million in Germany\u201d?<\/p>\n<p>Because nothing is simple in the IT world, and there are a lot of important things\u2014like preserving legacy investments, keeping costs down, optimizing performance, and taking advantage of new technologies\u2014that can either interfere with security efforts or take precedence over them.<\/p>\n<p>And because current approaches aren\u2019t keeping pace with new attack techniques. With more than 74 percent of DDoS traffic arriving as infrastructure attacks, organizations are still hardening, securing, and updating servers\u2014but not infrastructure devices such as routers and switches. With DNS showing up as the #2 attack vector protocol behind HTTP, most IT organizations still manage DNS on highly vulnerable commodity servers.<\/p>\n<p>And what are we going to do about it?<\/p>\n<p>So in the continually escalating battle, where do we go next? Stay tuned to this blog, and we\u2019ll try to come up with some answers for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cSecurity company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil. The toilets can be controlled using an Android app\u2026\u201d According to Trustwave, \u201cAttackers could cause the unit to unexpectedly open\/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user.\u201d Pretty funny, right? I\u2019m sure [&hellip;]<\/p>\n","protected":false},"author":254,"featured_media":2663,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[200,202,16,15],"class_list":{"0":"post-4457","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-hack","9":"tag-hacker","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Did you ever think you&#039;d see a news story like this?<\/title>\n<meta name=\"description\" content=\"Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Did you ever think you&#039;d see a news story like this?\" \/>\n<meta property=\"og:description\" content=\"Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-10T19:57:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Renuka Nadkarni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Renuka Nadkarni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/\"},\"author\":{\"name\":\"Renuka Nadkarni\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\"},\"headline\":\"Did you ever think you&#8217;d see a news story like this?\",\"datePublished\":\"2013-08-10T19:57:29+00:00\",\"dateModified\":\"2020-05-06T17:31:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"keywords\":[\"Hack\",\"Hacker\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/\",\"name\":\"Did you ever think you'd see a news story like this?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"datePublished\":\"2013-08-10T19:57:29+00:00\",\"dateModified\":\"2020-05-06T17:31:39+00:00\",\"description\":\"Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Youve-Been-Hacked.jpg\",\"width\":660,\"height\":454,\"caption\":\"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/did-you-ever-think-youd-see-a-news-story-like-this\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Did you ever think you&#8217;d see a news story like this?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/111901fc66473b7a5d5d6cf2ae869ef9\",\"name\":\"Renuka Nadkarni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g\",\"caption\":\"Renuka Nadkarni\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/renuka-nadkarni\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Did you ever think you'd see a news story like this?","description":"Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/","og_locale":"en_US","og_type":"article","og_title":"Did you ever think you'd see a news story like this?","og_description":"Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/","og_site_name":"Infoblox Blog","article_published_time":"2013-08-10T19:57:29+00:00","article_modified_time":"2020-05-06T17:31:39+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","type":"image\/jpeg"}],"author":"Renuka Nadkarni","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Renuka Nadkarni","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/"},"author":{"name":"Renuka Nadkarni","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9"},"headline":"Did you ever think you&#8217;d see a news story like this?","datePublished":"2013-08-10T19:57:29+00:00","dateModified":"2020-05-06T17:31:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","keywords":["Hack","Hacker","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/","url":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/","name":"Did you ever think you'd see a news story like this?","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","datePublished":"2013-08-10T19:57:29+00:00","dateModified":"2020-05-06T17:31:39+00:00","description":"Security company Trustwave issued a warning about potential bathroom breaches of luxury Satis smart toilets from Lixil.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Youve-Been-Hacked.jpg","width":660,"height":454,"caption":"You've Been Hacked: Infoblox Finds 4 out of 5 Enterprise Networks Could be Compromised, Based on DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/did-you-ever-think-youd-see-a-news-story-like-this\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Did you ever think you&#8217;d see a news story like this?"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/111901fc66473b7a5d5d6cf2ae869ef9","name":"Renuka Nadkarni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0661e443c4c379f0c36c9451f82921d754eda7aa497a8cbc3002b9c3a298bcce?s=96&d=blank&r=g","caption":"Renuka Nadkarni"},"url":"https:\/\/www.infoblox.com\/blog\/author\/renuka-nadkarni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/254"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4457"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4457\/revisions"}],"predecessor-version":[{"id":4459,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4457\/revisions\/4459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2663"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}