{"id":4095,"date":"2016-12-19T19:46:22","date_gmt":"2016-12-19T19:46:22","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=4095"},"modified":"2016-12-19T19:46:22","modified_gmt":"2016-12-19T19:46:22","slug":"gazing-crystal-ball-2017-cybersecurity-predictions","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/gazing-crystal-ball-2017-cybersecurity-predictions\/","title":{"rendered":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions"},"content":{"rendered":"<p><em><strong>By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS<\/strong><\/em><\/p>\n<p>Cyber extortion and attacks can take many forms \u2013 from ransomware to DDoS shakedowns and data-dump blackmail, organizations all over the globe have been directly impacted by these campaigns in 2016.\u00a0This year we saw the first DDoS attack exceeding 1Tbps in size and the proliferation of attacks by IoT botnets, among countless other new methods that hackers have perfected to gain entry into organizations and disrupt day-to-day business. If you thought 2016 was bad, you can expect 2017 to be even worse as sophisticated hackers set their sights on bigger targets and continue to evolve their practices.<!--more--><\/p>\n<p>As the number of these incidents continues to rise, NSFOCUS has identified a few attack vectors that we expect to be particularly problematic in the year ahead as well as two defense vectors to help organizations prepare for the onslaught of attacks.<\/p>\n<p><strong>Attack Vectors:<\/strong><\/p>\n<ol>\n<li><strong>The Weaponization of Industrial and Municipal IoT <\/strong>\u2013 As more devices become Internet-enabled and accessible and the security measures in place continue to lag behind, the associated risks are on the rise. We have seen a growing threat against industrial and municipal IoT as leading manufacturers and grid power produce, among others, transition to Industry 4.0 without implementing sufficient safeguards. This can lead to theft of intellectual property, collecting competitive intelligence and even the disruption or destruction of critical infrastructure.<\/li>\n<li><strong>Targeting the Cloud Operators \u2013 <\/strong>The cloud-computing infrastructure of today is one of the most successful developments in information technology. However, that doesn\u2019t mean these operators aren\u2019t just as vulnerable as every other organization. Reprobates, hacktivists, nation-states, and terrorist organizations will likely take aim at the cloud in 2017, leading to some of the largest DDoS and ransomware attacks of all time.<\/li>\n<li><strong>The Advancement of Laterally-Spread Ransomware Worms \u2013<\/strong>Next-generation ransomware will soon have the attributes of the self-propagating worms of the past. Worms like Conficker, SQL Slammer, Nimda, Code Red, etc. will once again become the norm however, this time they will carry ransomware payloads capable of infecting hundreds of machines in no time at all. The future of ransomware will be modular and stealthy, capable of moving laterally, and even bridge air-gapped defenses.<\/li>\n<\/ol>\n<p><strong>Defense Vectors:<\/strong><\/p>\n<ol>\n<li><strong>The Growth of Crowdsourced, Actionable Threat Intelligence \u2013 <\/strong>Although Threat Intelligence (TI) is still in its infancy, it won\u2019t be for long as the industry, governments, and other influential institutions will begin to heavily encourage all organizations to crowdsource TI data. This effort will make TI more actionable and affordable for the masses. Soon, all cyber defenses will be fully capable of consuming TI in real-time, acting upon the intelligence gained, and also delivering upstream crowdsource capabilities.<\/li>\n<li><strong>The Rise of the Automated, Machine Learning, and Artificially Intelligence (AI)-Enabled Defenses \u2013<\/strong> The attack predictions mentioned above will force the Internet community, researchers, corporations, and governments to heavily fund automation, machine learning, and AI-enabled technology research. These defenses will incorporate automated capabilities to allow for self-configuration on the fly. Others will have automated kill-chain capabilities designed to help stop the spread of contamination by immediately detecting infections, and shutting down systems before epidemics spread even further. These soon-to-be-realized defenses will become increasingly intelligent \u2013 not only able to detect anomalies in any type of traffic, user, or device \u2013 they will also be capable of inoculating systems in real time; adapting their immunizations to whatever infection is presented to them.<\/li>\n<\/ol>\n<p>For additional insight into each of the above predictions, read our full article on <a href=\"http:\/\/virtual-strategy.com\/2016\/12\/19\/executive-viewpoint-2017-prediction-nsfocus-the-changing-face-of-cybersecurity\" target=\"_blank\" rel=\"noopener\">Virtual Strategy Magazine.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Cyber extortion and attacks can take many forms \u2013 from ransomware to DDoS shakedowns and data-dump blackmail, organizations all over the globe have been directly impacted by these campaigns in 2016.\u00a0This year we saw the first DDoS attack exceeding 1Tbps in size and the proliferation of attacks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10538,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-4095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Cyber extortion and attacks can take many forms \u2013 from ransomware to DDoS shakedowns and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-19T19:46:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Cyber extortion and attacks can take many forms \u2013 from ransomware to DDoS shakedowns and\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions\",\"datePublished\":\"2016-12-19T19:46:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/0507-2.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/\",\"name\":\"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/0507-2.jpg\",\"datePublished\":\"2016-12-19T19:46:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/0507-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/0507-2.jpg\",\"width\":642,\"height\":307,\"caption\":\"Bar chart showing percentages for various categories.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/gazing-crystal-ball-2017-cybersecurity-predictions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS","og_description":"By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Cyber extortion and attacks can take many forms \u2013 from ransomware to DDoS shakedowns and","og_url":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/","og_site_name":"NSFOCUS","article_published_time":"2016-12-19T19:46:22+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS","twitter_description":"By: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Cyber extortion and attacks can take many forms \u2013 from ransomware to DDoS shakedowns and","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions","datePublished":"2016-12-19T19:46:22+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/"},"wordCount":580,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg","articleSection":["Blog"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/","url":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/","name":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg","datePublished":"2016-12-19T19:46:22+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/06\/0507-2.jpg","width":642,"height":307,"caption":"Bar chart showing percentages for various categories."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/gazing-crystal-ball-2017-cybersecurity-predictions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Gazing into our Crystal Ball \u2013 2017 Cybersecurity Predictions"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/4095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=4095"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/4095\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10538"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=4095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=4095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=4095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}