{"id":11107,"date":"2020-08-19T01:15:44","date_gmt":"2020-08-19T01:15:44","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11107"},"modified":"2026-04-17T18:07:48","modified_gmt":"2026-04-17T18:07:48","slug":"2019-cybersecurity-insights-16","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/2019-cybersecurity-insights-16\/","title":{"rendered":"2019 Cybersecurity Insights -16"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>In this section, we analyzed threats against three major protocols.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Threats Against Telnet<\/strong><\/h2>\n\n\n\n<p>According to data from NSFOCUS&#8217;s threat hunting system, Telnet (available on port 23), targeted by a total of 120,000 attack sources, was the IoT protocol most favored by attackers1 . Figure 7-3 shows the activity trend of Telnet attack sources from March to October in 2019. We can see that the number of Telnet-based attacks increased month by month from March to August, with August seeing the most attack sources (over 60,000) that carried out more than 50,000 weak password detection activities. In addition, June witnessed the most sample download activities (more than 40,000). Overall, attack sources were on the decline in the latter half of 2019.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"585\" height=\"365\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11108\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-1.jpg 585w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-1-300x187.jpg 300w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/><\/figure><\/div>\n\n\n\n<!--more-->\n\n\n\n<p>We analyzed attack sources from the geographical perspective and got top 10 countries with the most attack sources, as shown in Figure 7-4. Apparently, China and the USA took top two spots.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"419\" height=\"333\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11109\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-2.jpg 419w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-2-300x238.jpg 300w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/figure><\/div>\n\n\n\n<p>By correlating with asset intelligence data from NTI, we found that IoT devices accounted for 29% of attack sources, with routers (47%) and video surveillance devices (42%) as dominant players. See Figure 7-5. Arguably, the two kind of devices were most easily exploitable IoT devices.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"435\" height=\"257\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11110\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-3.jpg 435w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-3-300x177.jpg 300w\" sizes=\"(max-width: 435px) 100vw, 435px\" \/><\/figure><\/div>\n\n\n\n<p>Weak password cracking is the major means resorted by attackers to target Telnet. We made an analysis of weak password exploitation and found that many IoT devices were compromised after suffering weak password cracking. Table 7.3 lists top 10 weak passwords for cracking. Of those passwords, root-vizxv was cracked for a direct login to the background of security surveillance devices from Dahua; root-t0talc0ntr0l4! was the default access credential of smart home devices of Control4; root-taZz@23495859 was one of the weak password most frequently used by Asher, a Mirai variant, to infect routers.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"736\" height=\"293\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11111\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-4.jpg 736w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/08\/0819-4-300x119.jpg 300w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/figure><\/div>\n\n\n\n<p><em>To be continued.<\/em><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>In this section, we analyzed threats against three major protocols. Threats Against Telnet According to data from NSFOCUS&#8217;s threat hunting system, Telnet (available on port 23), targeted by a total of 120,000 attack sources, was the IoT protocol most favored by attackers1 . Figure 7-3 shows the activity trend of Telnet attack sources from March [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[357],"class_list":["post-11107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2019 Cybersecurity Insights -16 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2019 Cybersecurity Insights -16 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"In this section, we analyzed threats against three major protocols. Threats Against Telnet According to data from NSFOCUS&#039;s threat hunting system, Telnet\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-19T01:15:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"2019 Cybersecurity Insights -16 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"In this section, we analyzed threats against three major protocols. Threats Against Telnet According to data from NSFOCUS&#039;s threat hunting system, Telnet\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"2019 Cybersecurity Insights -16\",\"datePublished\":\"2020-08-19T01:15:44+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/\"},\"wordCount\":285,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"keywords\":[\"Cybersecurity Insights\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/\",\"name\":\"2019 Cybersecurity Insights -16 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"datePublished\":\"2020-08-19T01:15:44+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Cybersecurity2019.png\",\"width\":475,\"height\":355,\"caption\":\"Cybersecurity insights with network and keywords.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/2019-cybersecurity-insights-16\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2019 Cybersecurity Insights -16\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2019 Cybersecurity Insights -16 - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/","og_locale":"pt_BR","og_type":"article","og_title":"2019 Cybersecurity Insights -16 - NSFOCUS","og_description":"In this section, we analyzed threats against three major protocols. Threats Against Telnet According to data from NSFOCUS's threat hunting system, Telnet","og_url":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/","og_site_name":"NSFOCUS","article_published_time":"2020-08-19T01:15:44+00:00","article_modified_time":"2026-04-17T18:07:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"2019 Cybersecurity Insights -16 - NSFOCUS","twitter_description":"In this section, we analyzed threats against three major protocols. Threats Against Telnet According to data from NSFOCUS's threat hunting system, Telnet","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"2019 Cybersecurity Insights -16","datePublished":"2020-08-19T01:15:44+00:00","dateModified":"2026-04-17T18:07:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/"},"wordCount":285,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","keywords":["Cybersecurity Insights"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/","url":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/","name":"2019 Cybersecurity Insights -16 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","datePublished":"2020-08-19T01:15:44+00:00","dateModified":"2026-04-17T18:07:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/Cybersecurity2019.png","width":475,"height":355,"caption":"Cybersecurity insights with network and keywords."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/2019-cybersecurity-insights-16\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"2019 Cybersecurity Insights -16"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11107"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10756"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}