{"id":7944,"date":"2022-02-15T10:18:42","date_gmt":"2022-02-15T10:18:42","guid":{"rendered":"https:\/\/cybersmart.com\/?p=7944"},"modified":"2022-02-15T10:18:42","modified_gmt":"2022-02-15T10:18:42","slug":"what-is-a-zero-day-attack","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/","title":{"rendered":"What is a zero-day attack?"},"content":{"rendered":"

Provided you\u2019ve read any cybersecurity story in the media recently, you\u2019ve probably come across the phrase \u2018zero-day attack\u2019 before. It\u2019s often dropped into reports by journalists with little explanation of what it means or why you should worry about it. So, in the interest of clearing up some confusion, here\u2019s everything you need to know.\u00a0<\/span><\/p>\n

What does \u2018zero-day\u2019 mean?<\/b><\/h3>\n

Usually, software companies and developers will periodically fix flaws in their products. However, there are some rare instances where this doesn\u2019t happen and a flaw goes unnoticed. <\/span>
\n<\/span>
\n<\/span>The term \u2018zero-day\u2019 refers to those security vulnerabilities that fall through the cracks. It\u2019s neat shorthand for developers having only just discovered the flaw and limited time (zero days) to fix it. <\/span>
\n<\/span>
\n<\/span>A zero-day attack happens when the bad guys get there first and hackers exploit the flaw before the developers discover it.\u00a0<\/span><\/p>\n

How do zero-day attacks work?\u00a0<\/b><\/h3>\n

All software, no matter how robust initially, develops vulnerabilities over time. It could be that the software was built with vulnerabilities that weren\u2019t anticipated at the time or it might be that a new cyber threat has emerged since it was created.<\/span>
\n<\/span>
\n<\/span>Whatever the reason, the fix is usually simple. Developers create a <\/span>patch<\/span><\/a>, release it in an update to users, and the vulnerability is dealt with. Think of it as being a bit like your mum fixing your school trousers after you fell over in the playground for the umpteenth time. <\/span>
\n<\/span>
\n<\/span>Unfortunately, this doesn\u2019t always happen and hackers get there first. And, as long as the vulnerability goes undetected, cybercriminals can write and implement code to exploit it. This could allow them to steal confidential data, <\/span>
launch social engineering attacks<\/span><\/a>,<\/b> or even release malware onto users computers.\u00a0<\/span><\/p>\n

This can go on for as long as the vulnerability remains undetected; sometimes days or even months. What\u2019s more, even when the flaw has been fixed and an update released, it may take some time before every user updates their device. After all, an update is only as good as the number of users who download it.\u00a0<\/span><\/p>\n

How do you know when a zero-day attack has happened?<\/b><\/h3>\n

A zero-day attack is particularly dangerous because the only people who know about it are the cybercriminals themselves. This allows them to pick their moment, either attacking instantly or biding their time.<\/p>\n

Because vulnerabilities come in many shapes and sizes from problems with password security to broken algorithms, they can be very hard to detect. Often, a business won\u2019t know there\u2019s anything wrong until the vulnerability has been identified. <\/span>
\n<\/span>
\n<\/span>Nevertheless, there are some telltale signs. You might see sudden surges in unexpected traffic, odd behaviour from software you\u2019re using, or suspicious scanning activity.\u00a0<\/span><\/p>\n

Are there any famous examples?<\/b><\/h3>\n

Incidents involving zero-day vulnerabilities are more common than you might think. Only days ago (early Feb 2022), it was revealed that <\/span>three critical flaws in the code for a WordPress plugin threatened 30,000 websites worldwide<\/span><\/a>. Fortunately, on this occasion, WordPress appear to have got there before the bad guys, but there are plenty of examples when businesses weren\u2019t so lucky.<\/span>
\n<\/span><\/b><\/p>\n

Zoom, 2020<\/strong><\/h4>\n

In this instance, hackers found <\/span>a vulnerability in the popular video conferencing platform Zoom<\/span><\/a>. It allowed cybercriminals to remotely take over the computer of anyone using Zoom and running an older version of Windows.<\/span><\/p>\n

Microsoft Word, 2017<\/b><\/h4>\n

In a horribly alarming twist, this attack used a vulnerability in <\/span>Microsoft Word to steal users banking login data. <\/span><\/a>\u00a0Users who opened seemingly normal Microsoft Word documents unwittingly installed malware on their device that was able to collect banking login credentials.\u00a0<\/span><\/p>\n

Apple iOS, 2020<\/b><\/h4>\n

Apple is generally famous for its impregnable security (remember the old myth that Apple Macs couldn\u2019t get viruses?). However, in 2020, hackers did <\/i>discover a vulnerability in its iOS mobile operating system. This flaw allowed cybercriminals to remotely access and control unlucky users iPhones.<\/p>\n

What can you do to protect your business?<\/b>
\n<\/b><\/h3>\n

Update your software regularly<\/b>
\n<\/b><\/h4>\n

The easiest way to protect your business against zero-day attacks is to regularly <\/span>patch your software and operating systems<\/span><\/a>. It shouldn\u2019t take you more than a couple of minutes each month. All it requires is that you check now and then for any new updates to tools and software you use. Or, if you want an even easier solution, simply turn on auto-updates in your device\u2019s settings, and you won\u2019t even have to think about it.<\/span><\/p>\n

Use a firewall and anti-malware<\/b><\/h4>\n

Firewalls<\/span><\/a> and <\/span>anti-malware<\/span><\/a> tools are the first line of defence for most cybersecurity threats and zero-day attacks are no different. Good firewalls and anti-malware can thwart some zero-day attacks the minute they enter your system.\u00a0<\/span><\/p>\n

Limit the number of applications you use<\/b><\/h4>\n

Most businesses already do this to some extent, software costs money after all. However, when it comes to protecting your business against zero-day threats a simple maxim applies: the less software you have, the smaller the number of potential vulnerabilities. So try to use only the software and tools your business really needs.\u00a0<\/span><\/p>\n

Educate your team\u00a0<\/b><\/h4>\n

Most zero-day attacks capitalise on human error in some way. So educating your employees on good security practices and habits can help reduce the risk of a successful zero-day attack. For more on how to go about this, check out our blog on <\/span>security training<\/span><\/a>.\u00a0<\/span><\/p>\n

Protecting your business on a budget is tricky. Calling in the experts or investing in the latest tools is expensive. So what can you do? CyberSmart Active Protect secures your business around the clock with no need for costly consultants, tools or an in-house team. Try it today<\/a>.<\/span><\/p>\n

 <\/p>\n

\"Active<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Provided you\u2019ve read any cybersecurity story in the media recently, you\u2019ve probably come across the phrase \u2018zero-day attack\u2019 before. It\u2019s often dropped into reports by journalists with little explanation of…<\/p>\n","protected":false},"author":8,"featured_media":7945,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[221,83,216,27,16,228],"yoast_head":"\nWhat is a zero-day attack? - CyberSmart<\/title>\n<meta name=\"description\" content=\"What is a zero-day attack and why should your business be worried about it? And more importantly, what can you do to protect yourself?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a zero-day attack? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"What is a zero-day attack and why should your business be worried about it? And more importantly, what can you do to protect yourself?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-15T10:18:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob S\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob S\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\"},\"author\":{\"name\":\"Rob S\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\"},\"headline\":\"What is a zero-day attack?\",\"datePublished\":\"2022-02-15T10:18:42+00:00\",\"dateModified\":\"2022-02-15T10:18:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg\",\"keywords\":[\"Anti-malware\",\"cybersecurity\",\"CyberSmart Active Protect\",\"firewall\",\"SMEs\",\"zero-day attack\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\",\"name\":\"What is a zero-day attack? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg\",\"datePublished\":\"2022-02-15T10:18:42+00:00\",\"dateModified\":\"2022-02-15T10:18:42+00:00\",\"description\":\"What is a zero-day attack and why should your business be worried about it? And more importantly, what can you do to protect yourself?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg\",\"width\":1200,\"height\":627,\"caption\":\"zero-day attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a zero-day attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\",\"name\":\"Rob S\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"caption\":\"Rob S\"},\"url\":\"https:\/\/cybersmart.com\/author\/rob-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a zero-day attack? - CyberSmart","description":"What is a zero-day attack and why should your business be worried about it? And more importantly, what can you do to protect yourself?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is a zero-day attack? - CyberSmart","og_description":"What is a zero-day attack and why should your business be worried about it? And more importantly, what can you do to protect yourself?","og_url":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2022-02-15T10:18:42+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg","type":"image\/jpeg"}],"author":"Rob S","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Rob S","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/"},"author":{"name":"Rob S","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff"},"headline":"What is a zero-day attack?","datePublished":"2022-02-15T10:18:42+00:00","dateModified":"2022-02-15T10:18:42+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/"},"wordCount":935,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg","keywords":["Anti-malware","cybersecurity","CyberSmart Active Protect","firewall","SMEs","zero-day attack"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/","url":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/","name":"What is a zero-day attack? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg","datePublished":"2022-02-15T10:18:42+00:00","dateModified":"2022-02-15T10:18:42+00:00","description":"What is a zero-day attack and why should your business be worried about it? And more importantly, what can you do to protect yourself?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2022\/02\/Social_Images2022_Blog-2.jpg","width":1200,"height":627,"caption":"zero-day attack"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/what-is-a-zero-day-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"What is a zero-day attack?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff","name":"Rob S","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","caption":"Rob S"},"url":"https:\/\/cybersmart.com\/author\/rob-s\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/7944"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=7944"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/7944\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/7945"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=7944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=7944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=7944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}