{"id":1795,"date":"2021-04-22T15:08:52","date_gmt":"2021-04-22T19:08:52","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1795"},"modified":"2021-04-22T15:08:55","modified_gmt":"2021-04-22T19:08:55","slug":"pulse-secure-vpn-vulnerabilities-exploited","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/","title":{"rendered":"Pulse Secure VPN Vulnerabilities Exploited"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-pulse-secure-vpn-appliances-are-under-attack-two-known-vulnerabilities-already-have-patches-while-a-novel-vulnerability-has-a-workaround-until-a-patch-is-released\">Pulse Secure VPN appliances are under attack. Two known vulnerabilities already have patches, while a novel vulnerability has a workaround until a patch is released.<\/h2>\n\n\n\n<p>One of the biggest security tools in an organizations toolbox is a Virtual Private Network (VPN). Businesses that did not have remote workers prior to the pandemic quickly learned the value of a good VPN. Those that did have remote workers learned even more about how a VPN can protect the business and how to make it available to each employee. As with all things in life, though, nothing is perfect. We\u2019ve talked about Pulse Secure VPN <a href=\"https:\/\/www.pwvconsultants.com\/blog\/ransomware-targets-vpns-in-healthcare-industry\/\" target=\"_blank\" rel=\"noreferrer noopener\">in the past<\/a>, it\u2019s used by many businesses in the healthcare industry and it has known vulnerabilities. Those vulnerabilities, along with a new one, are causing major problems for the VPN provider.<\/p>\n\n\n\n<p>&#8220;Mandiant is currently tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices,&#8221; <a href=\"https:\/\/www.csoonline.com\/article\/3615283\/spy-groups-hack-into-companies-using-zero-day-flaw-in-pulse-secure-vpn.html\" target=\"_blank\" rel=\"noreferrer noopener\">researchers from Mandiant<\/a>, the MDR and incident response arm of security vendor FireEye, said in a newly released report. &#8220;These families are related to the circumvention of authentication and backdoor access to these devices, but they are not necessarily related to each other and have been observed in separate investigations. It is likely that multiple actors are responsible for the creation and deployment of these various code families.&#8221;<\/p>\n\n\n\n<p>The Mandiant team continued finding malicious activity they traced back to the Pulse Secure VPN, but they couldn\u2019t figure out how the hackers gained administrating credentials. Pulse Secure (PCS) parent company, Ivanti, conducted an investigation and determined the threat actors were using the two known vulnerabilities, plus a zero-day vulnerability now tracked as CVE-2021-22893. The flaw, a critical vulnerability with a CVSS score of 10, allows threat actors to circumvent authentication on the VPN and execute arbitrary code.&nbsp;<\/p>\n\n\n\n<p>Patches for the first two vulnerabilities were released last year, the new patch will be released in the next PCS release. Version 9.1R.11.4 has not been released yet, so the company provided a workaround. A .xml configuration file was created that can be imported into the appliance. This will disable the Windows File Share Browser and Pulse Secure Collaboration features, which blocks the attack vector. It\u2019s a temporary fix until the patch is released, which will hopefully be sooner than later since the workaround has some limitations.<\/p>\n\n\n\n<p>In addition to the workaround, Pulse Secure released a tool that helps admins to check the integrity of the file system of their PCS appliances. This will detect any file modifications or additional malicious files deployed by the hackers.<\/p>\n\n\n\n<p>When it comes to the new flaw that needs to be patched, Pulse Security is doing all of the right things in response to an incident. They\u2019ve conducted an investigation and know what the problem is, they\u2019ve notified users that there is a problem, they\u2019re working on a patch to release and in the meantime have created a workaround for businesses. This is an instance where the company executed a proper incident response, and despite being the target of malicious activity, they are taking steps to ensure the safety and security of their customers.<\/p>\n\n\n\n<p>Any user of a PCS appliance should do a full review and utilize the tool created by the company to ensure nothing nefarious is happening in their systems. Pulse Security can only do so much, after that, business leaders must do their part as well. Apply the patches, check your systems, make sure your business isn\u2019t compromised. And, as always, consult an expert to help with complicated processes you don\u2019t fully understand. Security is more than just following steps, so it\u2019s best to trust those things to people who eat, breathe and sleep security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.<\/p>\n","protected":false},"author":1,"featured_media":1808,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,14,2071],"tags":[36,2267,2266,2265,2264,2263,17,689,1997],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pulse Secure VPN Vulnerabilities Exploited - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pulse Secure VPN Vulnerabilities Exploited\" \/>\n<meta property=\"og:description\" content=\"The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-22T19:08:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-22T19:08:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Pulse Secure VPN Vulnerabilities Exploited\",\"datePublished\":\"2021-04-22T19:08:52+00:00\",\"dateModified\":\"2021-04-22T19:08:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg\",\"keywords\":[\"Business\",\"Ivanti\",\"Mandiant\",\"PCS\",\"Pulse Connect Security\",\"Pulse Secure VPN\",\"Security\",\"VPN\",\"vulnerability\"],\"articleSection\":[\"Business\",\"Security\",\"VPN\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\",\"name\":\"Pulse Secure VPN Vulnerabilities Exploited - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg\",\"datePublished\":\"2021-04-22T19:08:52+00:00\",\"dateModified\":\"2021-04-22T19:08:55+00:00\",\"description\":\"The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Pulse Secure sign at headquarters of an American computer networking company - San Jose, California, USA - 2020\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pulse Secure VPN Vulnerabilities Exploited\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pulse Secure VPN Vulnerabilities Exploited - PWV Consultants","description":"The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/","og_locale":"en_US","og_type":"article","og_title":"Pulse Secure VPN Vulnerabilities Exploited","og_description":"The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-04-22T19:08:52+00:00","article_modified_time":"2021-04-22T19:08:55+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Pulse Secure VPN Vulnerabilities Exploited","datePublished":"2021-04-22T19:08:52+00:00","dateModified":"2021-04-22T19:08:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/"},"wordCount":625,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg","keywords":["Business","Ivanti","Mandiant","PCS","Pulse Connect Security","Pulse Secure VPN","Security","VPN","vulnerability"],"articleSection":["Business","Security","VPN"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/","url":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/","name":"Pulse Secure VPN Vulnerabilities Exploited - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg","datePublished":"2021-04-22T19:08:52+00:00","dateModified":"2021-04-22T19:08:55+00:00","description":"The Pulse Secure VPN is under attack via two known and one new vulnerability. Users should take action now to ensure their systems are clean.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Pulse-Secure-VPN-Vulnerability-scaled.jpeg","width":2560,"height":1707,"caption":"Pulse Secure sign at headquarters of an American computer networking company - San Jose, California, USA - 2020"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/pulse-secure-vpn-vulnerabilities-exploited\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Pulse Secure VPN Vulnerabilities Exploited"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1795"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1795"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1795\/revisions"}],"predecessor-version":[{"id":1811,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1795\/revisions\/1811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1808"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}