{"id":8181,"date":"2023-04-01T11:10:02","date_gmt":"2023-04-01T11:10:02","guid":{"rendered":"https:\/\/khaleej-trend.online\/eng\/?p=8181"},"modified":"2023-04-01T11:10:02","modified_gmt":"2023-04-01T11:10:02","slug":"what-is-3cx-supply-chain-attack","status":"publish","type":"post","link":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/","title":{"rendered":"what is 3cx supply chain attack"},"content":{"rendered":"<div id=\"khale-3186385860\" class=\"khale-- khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><div id=\"khale-2069453618\" class=\"khale-before-content khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p>In recent years, cyberattacks have been on the rise, and supply chain attacks have become increasingly common. One of the latest attacks in this category is the 3CX supply chain attack. In this essay, we will examine the basics of this attack, including what it is, how it works, and what can be done to prevent it.<\/p><div id=\"khale-4111035569\" class=\"khale-- khale-entity-placement\" style=\"margin-left: auto;margin-right: auto;text-align: center;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<h2>What is a Supply Chain Attack?<\/h2>\n<p>A supply chain attack is a type of cyberattack that targets an organization&#8217;s supply chain partners or vendors. In a supply chain attack, hackers target a third-party vendor that supplies software, hardware, or services to the target organization. The goal of the attack is to exploit vulnerabilities in the vendor&#8217;s systems to gain access to the target organization&#8217;s network. Once the hackers gain access, they can steal data, install malware, or launch other types of attacks.<\/p>\n<h2>What is 3CX?<\/h2>\n<p>3CX is a software-based communication system that allows businesses to make and receive calls over the internet. It is commonly used by small and medium-sized businesses (SMBs) and is known for its ease of use and affordability.<\/p>\n<h2>How Does the 3CX Supply Chain Attack Work?<\/h2>\n<p>In the 3CX supply chain attack, hackers targeted the update mechanism used by 3CX to distribute updates to its customers. The attackers managed to compromise the update server and insert malicious code into the updates. When customers downloaded and installed the updates, they unwittingly installed the malware onto their systems.<\/p>\n<p>The malware used in the attack is known as Kobalos. It is a Linux-based backdoor that allows hackers to remotely control the infected system. Once the hackers gain access to a system, they can steal data, install additional malware, or use the system as a launching pad for other attacks.<\/p>\n<h2>What Can Be Done to Prevent a 3CX Supply Chain Attack?<\/h2>\n<p>To prevent a 3CX supply chain attack, there are several steps that businesses can take. First, it is essential to keep all software and systems up to date with the latest security patches. Second, businesses should use multi-factor authentication to prevent unauthorized access to their systems. Third, it is important to monitor network traffic for signs of suspicious activity.<\/p>\n<p>In addition, businesses should vet their vendors and supply chain partners carefully. Before working with a vendor or supplier, businesses should assess their security practices and protocols. They should also ensure that vendors and suppliers have appropriate security certifications and follow best practices for cybersecurity.<\/p>\n<div id=\"khale-3626677603\" class=\"khale-after-content khale-entity-placement\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"autorelaxed\"\r\n     data-ad-client=\"ca-pub-9610686647069611\"\r\n     data-ad-slot=\"3780750108\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/div>","protected":false},"excerpt":{"rendered":"<p>In recent years, cyberattacks have been on the rise, and supply chain attacks have become increasingly common. One of the latest attacks in this category is the 3CX supply chain attack. In this essay, we will examine the basics of this attack, including what it is, how it works, and what can be done to &hellip;<\/p>\n","protected":false},"author":10,"featured_media":8183,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[11110,11109,11108],"class_list":["post-8181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-what-can-be-done-to-prevent-a-3cx-supply-chain-attack","tag-what-is-3cx","tag-what-is-a-supply-chain-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>what is 3cx supply chain attack - kworld trend<\/title>\n<meta name=\"description\" content=\"what is 3cx supply chain attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"what is 3cx supply chain attack - kworld trend\" \/>\n<meta property=\"og:description\" content=\"what is 3cx supply chain attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"kworld trend\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-01T11:10:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/04\/images-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"728\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"magedabdelnaser83\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"magedabdelnaser83\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/\"},\"author\":{\"name\":\"magedabdelnaser83\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/53c6785fe4b5a2b5d883e4e9a7e6469a\"},\"headline\":\"what is 3cx supply chain attack\",\"datePublished\":\"2023-04-01T11:10:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/\"},\"wordCount\":411,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/images-1.png\",\"keywords\":[\"What Can Be Done to Prevent a 3CX Supply Chain Attack?\",\"What is 3CX?\",\"What is a Supply Chain Attack?\"],\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/\",\"name\":\"what is 3cx supply chain attack - kworld trend\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/images-1.png\",\"datePublished\":\"2023-04-01T11:10:02+00:00\",\"description\":\"what is 3cx supply chain attack\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/images-1.png\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/images-1.png\",\"width\":728,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/what-is-3cx-supply-chain-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"what is 3cx supply chain attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\",\"name\":\"kworld trend\",\"description\":\"site care about apps and trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\",\"name\":\"hasadwan2020\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"width\":512,\"height\":512,\"caption\":\"hasadwan2020\"},\"logo\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\"},\"sameAs\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/53c6785fe4b5a2b5d883e4e9a7e6469a\",\"name\":\"magedabdelnaser83\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0646eebe2efae11c696e23899ebf57097b8ba612dd659bcd5555852c01c8408?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0646eebe2efae11c696e23899ebf57097b8ba612dd659bcd5555852c01c8408?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b0646eebe2efae11c696e23899ebf57097b8ba612dd659bcd5555852c01c8408?s=96&d=mm&r=g\",\"caption\":\"magedabdelnaser83\"},\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/author\\\/magedabdelnaser83\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"what is 3cx supply chain attack - kworld trend","description":"what is 3cx supply chain attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/","og_locale":"en_US","og_type":"article","og_title":"what is 3cx supply chain attack - kworld trend","og_description":"what is 3cx supply chain attack","og_url":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/","og_site_name":"kworld trend","article_published_time":"2023-04-01T11:10:02+00:00","og_image":[{"width":728,"height":380,"url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/04\/images-1.png","type":"image\/png"}],"author":"magedabdelnaser83","twitter_card":"summary_large_image","twitter_misc":{"Written by":"magedabdelnaser83","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#article","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/"},"author":{"name":"magedabdelnaser83","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/53c6785fe4b5a2b5d883e4e9a7e6469a"},"headline":"what is 3cx supply chain attack","datePublished":"2023-04-01T11:10:02+00:00","mainEntityOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/"},"wordCount":411,"commentCount":0,"publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/04\/images-1.png","keywords":["What Can Be Done to Prevent a 3CX Supply Chain Attack?","What is 3CX?","What is a Supply Chain Attack?"],"articleSection":["news"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/","url":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/","name":"what is 3cx supply chain attack - kworld trend","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/#website"},"primaryImageOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#primaryimage"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/04\/images-1.png","datePublished":"2023-04-01T11:10:02+00:00","description":"what is 3cx supply chain attack","breadcrumb":{"@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#primaryimage","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/04\/images-1.png","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/04\/images-1.png","width":728,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/khaleej-trend.online\/eng\/what-is-3cx-supply-chain-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/khaleej-trend.online\/eng\/"},{"@type":"ListItem","position":2,"name":"what is 3cx supply chain attack"}]},{"@type":"WebSite","@id":"https:\/\/khaleej-trend.online\/eng\/#website","url":"https:\/\/khaleej-trend.online\/eng\/","name":"kworld trend","description":"site care about apps and trends","publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/khaleej-trend.online\/eng\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c","name":"hasadwan2020","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","width":512,"height":512,"caption":"hasadwan2020"},"logo":{"@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg"},"sameAs":["https:\/\/khaleej-trend.online\/eng"]},{"@type":"Person","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/53c6785fe4b5a2b5d883e4e9a7e6469a","name":"magedabdelnaser83","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b0646eebe2efae11c696e23899ebf57097b8ba612dd659bcd5555852c01c8408?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b0646eebe2efae11c696e23899ebf57097b8ba612dd659bcd5555852c01c8408?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b0646eebe2efae11c696e23899ebf57097b8ba612dd659bcd5555852c01c8408?s=96&d=mm&r=g","caption":"magedabdelnaser83"},"url":"https:\/\/khaleej-trend.online\/eng\/author\/magedabdelnaser83\/"}]}},"_links":{"self":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/8181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/comments?post=8181"}],"version-history":[{"count":1,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/8181\/revisions"}],"predecessor-version":[{"id":8184,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/8181\/revisions\/8184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media\/8183"}],"wp:attachment":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media?parent=8181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/categories?post=8181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/tags?post=8181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}