{"id":932,"date":"2020-10-12T15:04:07","date_gmt":"2020-10-12T19:04:07","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=932"},"modified":"2020-10-13T18:44:00","modified_gmt":"2020-10-13T22:44:00","slug":"apple-fixing-bugs-found-in-white-hat-hack","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/","title":{"rendered":"Apple Fixing Bugs Found in White Hat Hack"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">A white hat hack found 55 bugs on Apple&#8217;s network, 11 of them critical. The cost to fix them is not small.<\/h2>\n\n\n\n<p>Recently, there has been an uptick in cyber-attacks worldwide, which is why we have discussed the importance of white hat testing and how to handle the results of those tests. Many of the recent attacks have been on the healthcare industry. Attackers know the system is strained and the likelihood of receiving a ransom payment is pretty high. Apple should be thankful that attacks have been focused elsewhere, as a recent white hat hack revealed 55 vulnerabilities, 11 of them critical.<\/p>\n\n\n\n<p>Sam Curry, who specializes in website security, is the researcher who led the team that conducted the white hat hack. \u201cIf the issues were used by an attacker, Apple would\u2019ve faced massive information disclosure and integrity loss,\u201d <a rel=\"noreferrer noopener\" href=\"https:\/\/www.wired.com\/story\/researchers-found-55-flaws-in-apples-corporate-network\/\" target=\"_blank\">Curry said in an online chat<\/a> a few hours after posting a 9,200-word write up titled <a href=\"https:\/\/samcurry.net\/hacking-apple\/\"><em>We Hacked Apple for 3 Months: Here\u2019s What We Found<\/em><\/a>. \u201cFor instance, attackers would have access to the internal tools used for managing user information and additionally be able to change the systems around to work as the hackers intend.\u201d <\/p>\n\n\n\n<p>The 11 critical vulnerabilities allowed Curry to take control of core Apple infrastructure. From there he could steal private emails, iCloud data and other private information. Those 11 instances are as follows:<\/p>\n\n\n\n<ul><li>Remote Code Execution via Authorization and Authentication Bypass<\/li><li>Authentication Bypass via Misconfigured Permissions allows Global Administrator Access<\/li><li>Command Injection via Unsanitized Filename Argument<\/li><li>Remote Code Execution via Leaked Secret and Exposed Administrator Tool<\/li><li>Memory Leak leads to Employee and User Account Compromise allowing access to various internal applications<\/li><li>Vertica SQL Injection via Unsanitized Input Parameter<\/li><li>Wormable Stored XSS allows Attacker to Fully Compromise Victim iCloud Account<\/li><li>Wormable Stored XSS allows Attacker to Fully Compromise Victim iCloud Account<\/li><li>Full Response SSRF allows Attacker to Read Internal Source Code and Access Protected Resources<\/li><li>Blind XSS allows Attacker to Access Internal Support Portal for Customer and Employee Issue Tracking<\/li><li>Server-Side PhantomJS Execution allows attacker to Access Internal Resources and Retrieve AWS IAM Keys<\/li><\/ul>\n\n\n\n<p>Apple has since fixed these violations and is in the process of fixing the rest. This is why it is so important to <a href=\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-is-ethical-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">stay on top of testing<\/a>, why it\u2019s important to do that <a href=\"https:\/\/www.pwvconsultants.com\/blog\/pen-testing-timing-is-everything\/\" target=\"_blank\" rel=\"noreferrer noopener\">testing prior to prod<\/a> and anytime a configuration or security setting has been changed. It\u2019s not just about ensuring weaknesses are patched, but also to ensure that functionality is not impaired (a la Microsoft\u2019s recent Azure issue).<\/p>\n\n\n\n<p>Apple is a giant corporation that can afford to spend the money to fix their vulnerabilities, but that cannot be said for the vast majority of businesses worldwide. Even with the company\u2019s worth, you can be sure that they would much prefer to not have those vulnerabilities in the first place. Not only for the security aspect, but it would have cost far less to ensure stability instead of locating the problems after changes are implemented for customers. Still, the problems were caught hopefully before a hacker could exploit them, which likely would have presented a major hit to Apple\u2019s business.<\/p>\n\n\n\n<p>Most companies cannot afford the repercussions of a data breach. As a business owner, leader or manager, you must do your part to keep your business secure. Testing is an integral part of the security process, and it\u2019s most cost effective when done properly. White hat, prior to deployment, on any first version and annually thereafter. Proactive preparation will protect you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A white hat hack revealed 11 critical vulnerabilities on Apple&#8217;s network. Fixing these bugs is expensive, which is why testing is important.<\/p>\n","protected":false},"author":1,"featured_media":938,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4],"tags":[1874,1877,31,575,1876,17,1878,1875],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple Fixing Bugs Found in White Hat Hack - PWV Consultants<\/title>\n<meta name=\"description\" content=\"A white hat hack revealed 11 critical vulnerabilities on Apple&#039;s network. Fixing these bugs is expensive, which is why testing is important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Fixing Bugs Found in White Hat Hack\" \/>\n<meta property=\"og:description\" content=\"A white hat hack revealed 11 critical vulnerabilities on Apple&#039;s network. Fixing these bugs is expensive, which is why testing is important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T19:04:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-13T22:44:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Apple Fixing Bugs Found in White Hat Hack\",\"datePublished\":\"2020-10-12T19:04:07+00:00\",\"dateModified\":\"2020-10-13T22:44:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\"},\"wordCount\":590,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg\",\"keywords\":[\"Apple\",\"critical vulnerability\",\"Cybersecurity\",\"Information Security\",\"network\",\"Security\",\"testing\",\"White Hat Hack\"],\"articleSection\":[\"Cyber Security\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\",\"name\":\"Apple Fixing Bugs Found in White Hat Hack - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg\",\"datePublished\":\"2020-10-12T19:04:07+00:00\",\"dateModified\":\"2020-10-13T22:44:00+00:00\",\"description\":\"A white hat hack revealed 11 critical vulnerabilities on Apple's network. Fixing these bugs is expensive, which is why testing is important.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Image by Jan Kuss from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Fixing Bugs Found in White Hat Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Apple Fixing Bugs Found in White Hat Hack - PWV Consultants","description":"A white hat hack revealed 11 critical vulnerabilities on Apple's network. Fixing these bugs is expensive, which is why testing is important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/","og_locale":"en_US","og_type":"article","og_title":"Apple Fixing Bugs Found in White Hat Hack","og_description":"A white hat hack revealed 11 critical vulnerabilities on Apple's network. Fixing these bugs is expensive, which is why testing is important.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-12T19:04:07+00:00","article_modified_time":"2020-10-13T22:44:00+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Apple Fixing Bugs Found in White Hat Hack","datePublished":"2020-10-12T19:04:07+00:00","dateModified":"2020-10-13T22:44:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/"},"wordCount":590,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg","keywords":["Apple","critical vulnerability","Cybersecurity","Information Security","network","Security","testing","White Hat Hack"],"articleSection":["Cyber Security","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/","url":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/","name":"Apple Fixing Bugs Found in White Hat Hack - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg","datePublished":"2020-10-12T19:04:07+00:00","dateModified":"2020-10-13T22:44:00+00:00","description":"A white hat hack revealed 11 critical vulnerabilities on Apple's network. Fixing these bugs is expensive, which is why testing is important.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/apple-2385198_1920.jpg","width":1920,"height":1280,"caption":"Image by Jan Kuss from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/apple-fixing-bugs-found-in-white-hat-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple Fixing Bugs Found in White Hat Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/932"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=932"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/932\/revisions"}],"predecessor-version":[{"id":949,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/932\/revisions\/949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/938"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}