{"id":245,"date":"2022-06-22T15:22:03","date_gmt":"2022-06-22T15:22:03","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=245"},"modified":"2022-06-22T15:22:03","modified_gmt":"2022-06-22T15:22:03","slug":"android-malware-kan-stjala-finansiell-data","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/skadlig-kod\/android-malware-kan-stjala-finansiell-data\/","title":{"rendered":"Android Malware kan stj\u00e4la finansiell data"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Three years ago, the number of malware infections had increased, and new malware had been discovered. This malware could steal financial data by bypassing multi-factor authentication. Researchers at F5 Labs detected the virus, which they dubbed \u201cExobot.\u201d It\u2019s believed the virus have spread via fraudulent websites and spam email. Exobot invite users to download it, thinking it\u2019s a popular cryptocurrency tracker.\u00a0<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Detaljer om MaliBot Android-skadlig programvara.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Forskare p\u00e5 F-Secure uppt\u00e4ckte f\u00f6rst Exobot-skadlig programvara. Den skadliga programvaran \u00e4r en sofistikerad skadlig programvara som kan kringg\u00e5 tv\u00e5faktorsautentisering och stj\u00e4la finansiella data. Den skadliga programvaran distribueras genom bedr\u00e4gliga webbplatser och smishing. N\u00e4r den \u00e4r installerad beg\u00e4r den skadliga programvaran beh\u00f6righeter f\u00f6r att \u00f6verlagra andra appar och komma \u00e5t SMS-meddelanden, kontaktlistor och samtalsloggar. Med dessa beh\u00f6righeter i handen kan den skadliga programvaran avlyssna eng\u00e5ngskoder (OTP) som skickas via SMS f\u00f6r bankappar och kringg\u00e5 tv\u00e5faktorsautentisering.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exobot kan ocks\u00e5 spela in telefonsamtal till kundtj\u00e4nst f\u00f6r att f\u00e5 ytterligare inloggningsuppgifter eller annan k\u00e4nslig information. Om du tror att du kan ha laddat ner Exobot-skadlig programvara \u00e4r det viktigt att avinstallera alla misst\u00e4nkta appar och \u00e4ndra dina l\u00f6senord omedelbart. Du b\u00f6r ocks\u00e5 aktivera tv\u00e5faktorsautentisering p\u00e5 alla konton som st\u00f6der det. Och slutligen, se till att bara ladda ner appar fr\u00e5n betrodda k\u00e4llor som Google Play Store.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">MaliBot Android-skadlig programvara kringg\u00e5r tv\u00e5faktorsautentisering.<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">N\u00e4r den \u00e4r installerad beg\u00e4r den skadliga programvaran beh\u00f6righeter som vanligtvis anses misst\u00e4nkta, s\u00e5som \u00e5tkomst till SMS-meddelanden, kontaktlistor och samtalsloggar. Den beg\u00e4r ocks\u00e5 beh\u00f6righet att \u00f6verlagra andra appar. Med dessa beh\u00f6righeter i handen kan den skadliga programvaran avlyssna eng\u00e5ngskoder (OTP) som skickas via SMS f\u00f6r bankappar och kringg\u00e5 tv\u00e5faktorsautentisering. Appen kan ocks\u00e5 spela in telefonsamtal till kundtj\u00e4nst f\u00f6r att f\u00e5 ytterligare inloggningsuppgifter eller annan k\u00e4nslig information.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u201cThis is a very sophisticated piece of Android malware,\u201d said Craig Young, a principal security researcher at Tripwire\u2019s Vulnerability and Exposure Research Team (VERT). \u201cThe developers have put a lot of work into making it difficult to detect and analyze.\u201d<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Vad \u00e4r tv\u00e5faktorsautentisering?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Two-factor authentication, commonly known as two-step verification, is a type of identity verification that uses two elements: a password and a one-time code sent to you by text message. Even if the attackers have access to your password, they\u2019ll need access to your phone to log in because they\u2019ll also need access to the location where you\u2019re receiving the one-time code.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Hur aktiverar man tv\u00e5faktorsautentisering?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Tv\u00e5faktorsautentisering \u00e4r ett extra s\u00e4kerhetslager som kan skydda dina onlinekonton fr\u00e5n att bli hackade. Om du inte redan anv\u00e4nder tv\u00e5faktorsautentisering \u00e4r det viktigt att aktivera det p\u00e5 alla konton som st\u00f6der det. F\u00f6r att aktivera tv\u00e5faktorsautentisering m\u00e5ste du logga in p\u00e5 ditt konto och g\u00e5 till s\u00e4kerhetsinst\u00e4llningarna. D\u00e4rifr\u00e5n m\u00e5ste du generera en eng\u00e5ngskod som skickas till dig via SMS eller en app. N\u00e4r du har koden kommer du att ange den n\u00e4r du uppmanas att logga in. Det \u00e4r viktigt att notera att du endast b\u00f6r anv\u00e4nda appar fr\u00e5n betrodda k\u00e4llor som Google Play Store n\u00e4r du genererar eng\u00e5ngskoder.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Slutsats<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Exobot-skadlig programvara \u00e4r en sofistikerad Android-skadlig programvara som kan kringg\u00e5 tv\u00e5faktorsautentisering och stj\u00e4la finansiella data. Om du tror att du kan ha laddat ner Exobot-skadlig programvara \u00e4r det viktigt att avinstallera alla misst\u00e4nkta appar och \u00e4ndra dina l\u00f6senord omedelbart. Du b\u00f6r ocks\u00e5 aktivera tv\u00e5faktorsautentisering p\u00e5 alla konton som st\u00f6der det. Och slutligen, se till att bara ladda ner appar fr\u00e5n betrodda k\u00e4llor som Google Play Store.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>F\u00f6r tre \u00e5r sedan hade antalet infektioner med skadlig kod \u00f6kat och ny skadlig kod hade uppt\u00e4ckts. Denna skadliga kod kunde stj\u00e4la finansiella data genom att kringg\u00e5 multifaktorautentisering. Forskare vid F5 Labs... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/skadlig-kod\/android-malware-kan-stjala-finansiell-data\/\">Continue reading <span class=\"screen-reader-text\">Android Malware kan stj\u00e4la finansiell data<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Malware Can Steal Financial Data | Security Briefing<\/title>\n<meta name=\"description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/skadlig-kod\/android-malware-kan-stjala-finansiell-data\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Can Steal Financial Data | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/skadlig-kod\/android-malware-kan-stjala-finansiell-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-22T15:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Android Malware Can Steal Financial Data\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\",\"name\":\"Android Malware Can Steal Financial Data | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"datePublished\":\"2022-06-22T15:22:03+00:00\",\"description\":\"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg\",\"width\":1000,\"height\":719,\"caption\":\"android-malware-can-steal-financial-data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Malware Can Steal Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android-skadlig programvara kan stj\u00e4la finansiella data | S\u00e4kerhetsgenomg\u00e5ng","description":"Hur du skyddar dig mot androidskadlig programvara som stj\u00e4l finansiella data och kan kringg\u00e5 multifaktorautentisering.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/skadlig-kod\/android-malware-kan-stjala-finansiell-data\/","og_locale":"sv_SE","og_type":"article","og_title":"Android Malware Can Steal Financial Data | Security Briefing","og_description":"How to protect yourself from android malware that steals financial data and can bypass multi-factor authentication.","og_url":"https:\/\/securitybriefing.net\/sv\/skadlig-kod\/android-malware-kan-stjala-finansiell-data\/","og_site_name":"Security Briefing","article_published_time":"2022-06-22T15:22:03+00:00","og_image":[{"width":1000,"height":719,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Android Malware Can Steal Financial Data","datePublished":"2022-06-22T15:22:03+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"},"wordCount":585,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","articleSection":["Malware"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","url":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/","name":"Android-skadlig programvara kan stj\u00e4la finansiella data | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","datePublished":"2022-06-22T15:22:03+00:00","description":"Hur du skyddar dig mot androidskadlig programvara som stj\u00e4l finansiella data och kan kringg\u00e5 multifaktorautentisering.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_64742815_S-min.jpg","width":1000,"height":719,"caption":"android-malware-can-steal-financial-data"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/android-malware-can-steal-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Malware Can Steal Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}