{"id":1492,"date":"2024-09-09T08:13:03","date_gmt":"2024-09-09T13:13:03","guid":{"rendered":"https:\/\/blog.motorolasolutions.com\/en_us\/?p=1492"},"modified":"2024-09-09T08:13:03","modified_gmt":"2024-09-09T13:13:03","slug":"cyber-attack-techniques-continue-to-evolve-and-advance","status":"publish","type":"post","link":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/","title":{"rendered":"Cyber Attack Techniques Continue to Evolve and Advance"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1493 alignright\" title=\"ibm-quote\" src=\"https:\/\/blog.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/11\/ibm-quote.jpg\" alt=\"ibm-quote\" width=\"315\" height=\"219\" \/>If your organization has ever wondered whether it is making measurable progress in combating cyber crime, you\u2019re not alone.<\/p>\n<p>The emergence of new technologies have lowered the bar for modern cybercriminals, expanding the cyber crime landscape beyond a limited group of skilled individuals. This widening pool of cybercriminals is creating new vulnerabilities and new threats on an almost daily basis. Amid this evolving reality, it can be difficult to keep up.<\/p>\n<p>According to the seventh annual\u00a0<a href=\"https:\/\/www.agcs.allianz.com\/insights\/white-papers-and-case-studies\/allianz-risk-barometer-2018\/\" target=\"_blank\" rel=\"noopener\">Allianz Risk Barometer Survey<\/a>, cyber risk is now one of the top two global business risks. And there are a number of specific attack avenues organizations are increasingly concerned about:<\/p>\n<ol>\n<li><strong>Malware:\u00a0<\/strong>Fake download links and phony email attachments \u2013 we\u2019ve all seen them. When successful, these malware attacks enable criminals to take control of your machine, monitor actions and keystrokes, and send confidential data from your computer and network. Despite our knowledge of these sorts of attacks, nearly\u00a0<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/Accenture-2017CostCybercrime-US-FINAL.pdf\" target=\"_blank\" rel=\"noopener\">100 percent<\/a> of companies report having experienced some form of Malware crime. A recent malware attack on\u00a0<a href=\"http:\/\/www.mcall.com\/news\/breaking\/mc-nws-allentown-computer-virus-20180220-story.html\" target=\"_blank\" rel=\"noopener\">Allentown, Pennsylvania<\/a>\u00a0struck the city\u2019s most critical systems \u2013 including surveillance camera networks \u2013 costing nearly $1 million and forcing the shutdown of some public safety operations.<\/li>\n<li><strong>Web-Based Attacks:<\/strong>\u00a0Much like malware, the\u00a0<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/2010-ponemon_Cost_of_Cyber_Crime_study-1.pdf\" target=\"_blank\" rel=\"noopener\">majority<\/a>\u00a0of organizations have experienced a web-based attack. Unfortunately, these types of crimes can cost companies\u00a0<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/DS_Web_Security_Threats.pdf\" target=\"_blank\" rel=\"noopener\">100 times<\/a>\u00a0more than malware annually. In fact, one recent event saw hackers steal 45 million records, costing the affected organization nearly\u00a0<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/DS_Web_Security_Threats.pdf\" target=\"_blank\" rel=\"noopener\">$260 million<\/a>.<\/li>\n<li><strong>Botnets:\u00a0<\/strong>Blending the words \u201crobot\u201d and \u201cnetwork,\u201d botnets are a network of \u201cbots\u201d that criminals can remotely manage to deploy malware, initiate attacks on websites and steal personal information. These attacks can infect a multitude of devices \u2013 devastating an organization. In fact, the recent\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3127263\/security\/iot-botnet-highlights-the-dangers-of-default-passwords.html\" target=\"_blank\" rel=\"noopener\">Mirai botnet<\/a>\u00a0saw the shut down of major areas of the internet, including Twitter, Netflix and CNN, as well as the entire country of Liberia.<\/li>\n<li><strong>Lost and Stolen Devices:<\/strong>\u00a0We do everything on our mobile devices and laptops \u2013 send emails and text messages, conduct banking, store personal and corporate information and more! With this wealth of information available, it\u2019s no wonder that nearly\u00a0<a href=\"https:\/\/www.databreachtoday.com\/stolen-devices-persistent-problem-a-5133\" target=\"_blank\" rel=\"noopener\">54 percent\u00a0<\/a>of the major data breaches tracked by federal regulators since 2009 have been the result of lost or stolen devices.<\/li>\n<li><strong>Denial of Service (DoS):\u00a0<\/strong>Have you ever tried to access a website and failed? Ever tried to reach a number and got a busy signal? The website or phone line may have been the victim of a DoS attack. These attacks overload an organization\u2019s web or telephony service, flooding it with more traffic than it can withstand. As a result, visitors attempting to access the service are unable to view its content or make a call. That was the case with\u00a0<a href=\"https:\/\/www.nena.org\/news\/119592\/DHS-Bulletin-on-Denial-of-Service-TDoS-Attacks-on-PSAPs.htm\" target=\"_blank\" rel=\"noopener\">recent attacks<\/a>on administrative public safety answering points (PSAP) and emergency communications centers. Perpetrators launched a high volume of calls against the target networks, tying up the service and preventing legitimate calls.<\/li>\n<li><strong>Malicious Insiders:<\/strong>\u00a0Taking a step beyond insider threats caused by employee negligence, malicious insiders include current or former employees, contractors or business associates looking to gain access to insider information on security practices, data and computer systems. These attacks are difficult to detect and remediation can be extremely costly \u2013 with\u00a0<a href=\"https:\/\/crowdresearchpartners.com\/portfolio\/insider-threat-report\/\" target=\"_blank\" rel=\"noopener\">fifty-three percent<\/a>\u00a0of companies estimating remediation costs of $100,000 or more and 12 percent estimating a cost of more than $1 million.<\/li>\n<li><strong>Ransomware:<\/strong>\u00a0Much like it\u2019s name conveys, ransomware takes over a computer and denies access to data unless a ransom is paid. These attacks pose a serious organizational threat, with more than\u00a0<a href=\"https:\/\/healthitsecurity.com\/news\/ransomware-attacks-topped-list-of-cyber-insurance-claims\" target=\"_blank\" rel=\"noopener\">one-quarter<\/a>\u00a0of cyber insurance claims resulting from ransomware attacks. And no one is immune. In 2017, WannaCry ransomware hit a number of high-profile targets around the world \u2013 impacting more than\u00a0<a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cyber-security\/10-significant-ransomware-attacks-2017\/\" target=\"_blank\" rel=\"noopener\">300,000 organizations<\/a>\u00a0worldwide, with victims receiving a note demanding a ransom of $300 in bitcoin. PSAPs are not immune.\u00a0<a href=\"http:\/\/www.baltimoresun.com\/news\/maryland\/crime\/bs-md-ci-hack-folo-20180328-story.html\" target=\"_blank\" rel=\"noopener\">Baltimore\u2019s 9-1-1 dispatch system<\/a>\u00a0recently experienced a ransomware attack, with hackers infiltrating a server that runs the city\u2019s CAD system for 9-1-1 and 3-1-1 calls, causing the city to revert to manual dispatching for nearly 24 hours. This attack is just one of a\u00a0<a href=\"http:\/\/www.govtech.com\/security\/Nearly-Two-Weeks-Post-Cyberattack-Atlanta-Continues-Its-Recovery.html\" target=\"_blank\" rel=\"noopener\">recent slew of attacks<\/a>\u00a0targeting municipal systems across the country.<\/li>\n<\/ol>\n<p>In the world of cybersecurity, things are changing at a rapid pace. And while organizations continue to acknowledge the importance of protecting their networks, keeping up with reality can be a challenge. That\u2019s where cyber \u201cresilience\u201d comes in. Moving beyond individual cybersecurity efforts, resilience looks at security as an integral part of an organization\u2019s core business \u2013 enabling them to better prepare, prevent, respond and recover from cyber breaches.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1494 aligncenter\" title=\"cyber-stats\" src=\"https:\/\/blog.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/11\/cyber-stats.png\" alt=\"cyber-stats\" width=\"835\" height=\"319\" \/><\/p>\n<p>Read the full Motorola Solutions White Paper\u00a0<a href=\"\/wp-content\/uploads\/sites\/3\/2018\/11\/cyber-resilience-whitepaper.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0to learn more about cyber resilience and how your organization can better protect against the growing cyber threat.<\/p>\n<p>Attending\u00a0<a href=\"http:\/\/motorolasolutions.com\/apco\" target=\"_blank\" rel=\"noopener\">APCO<\/a>? Please join me during the Cybersecurity information track (August 6, 4:30 &#8211; 5:30 PM) when I will present \u201cWelcome to the \u2018No FUD\u2019 Zone\u201d. During my talk I will explore real events, real impacts and offer a view of the trends in public safety technology to combat cyber threats, as well as what Public Safety personnel can do to help manage the risk.<\/p>\n","protected":false},"excerpt":{"rendered":"If your organization has ever wondered whether it is making measurable progress in combating cyber crime, you\u2019re not alone. The emergence of new technologies have lowered the bar for modern cybercriminals, expanding the cyber crime landscape beyond a limited group of skilled individuals. This widening pool of cybercriminals is creating new vulnerabilities and new threats&#8230; <a class=\"btn-featured test\" href=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/\" data-uet=\"{&#39;event_category&#39;:&#39;blog featured post interaction&#39;,&#39;event_action&#39;:&#39;blog read more button click&#39;,&#39;event_label&#39;:&#39;Cyber Attack Techniques Continue to Evolve and Advance&#39;,&#39;event_page_area&#39;:&#39;body&#39;,&#39;restriction_status&#39;:&#39;public&#39;,&#39;link_text&#39;:&#39;Cyber Attack Techniques Continue to Evolve and Advance&#39;,&#39;link_url&#39;:&#39;https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/&#39;,&#39;tealium_event&#39;:&#39;link_click&#39;,&#39;page_type&#39;:&#39;&#39;}\" >Read More<\/a>","protected":false},"author":12,"featured_media":1647,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,3,8],"tags":[12,17,21],"class_list":["post-1492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-enforcement","category-energy-industries","category-fire-and-emergency-medical-services","tag-astro-p25-infrastructure","tag-cybersecurity","tag-infrastructure-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Attack Techniques Continue to Evolve and Advance - Motorola Solutions Blog<\/title>\n<meta name=\"description\" content=\"Read the article Cyber Attack Techniques Continue to Evolve and Advance and learn more about our solutions and services.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Attack Techniques Continue to Evolve and Advance - Motorola Solutions Blog\" \/>\n<meta property=\"og:description\" content=\"Read the article Cyber Attack Techniques Continue to Evolve and Advance and learn more about our solutions and services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/\" \/>\n<meta property=\"og:site_name\" content=\"Motorola Solutions Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MotorolaSolutions\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T13:13:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:site\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/\",\"name\":\"Cyber Attack Techniques Continue to Evolve and Advance - Motorola Solutions Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg\",\"datePublished\":\"2024-09-09T13:13:03+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Read the article Cyber Attack Techniques Continue to Evolve and Advance and learn more about our solutions and services.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#primaryimage\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg\",\"contentUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg\",\"width\":500,\"height\":333,\"caption\":\"Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Attack Techniques Continue to Evolve and Advance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\",\"name\":\"Motorola Solutions Blog\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Attack Techniques Continue to Evolve and Advance - Motorola Solutions Blog","description":"Read the article Cyber Attack Techniques Continue to Evolve and Advance and learn more about our solutions and services.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cyber Attack Techniques Continue to Evolve and Advance - Motorola Solutions Blog","og_description":"Read the article Cyber Attack Techniques Continue to Evolve and Advance and learn more about our solutions and services.","og_url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/","og_site_name":"Motorola Solutions Blog","article_publisher":"https:\/\/www.facebook.com\/MotorolaSolutions","article_published_time":"2024-09-09T13:13:03+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@motosolutions","twitter_site":"@motosolutions","twitter_misc":{"Written by":"","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/","name":"Cyber Attack Techniques Continue to Evolve and Advance - Motorola Solutions Blog","isPartOf":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#primaryimage"},"image":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#primaryimage"},"thumbnailUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg","datePublished":"2024-09-09T13:13:03+00:00","author":{"@id":""},"description":"Read the article Cyber Attack Techniques Continue to Evolve and Advance and learn more about our solutions and services.","breadcrumb":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#primaryimage","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg","contentUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/08\/Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance-1.jpg","width":500,"height":333,"caption":"Cyber-Attack-Techniques-Continue-to-Evolve-and-Advance"},{"@type":"BreadcrumbList","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/cyber-attack-techniques-continue-to-evolve-and-advance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog-test.motorolasolutions.com\/en_us\/"},{"@type":"ListItem","position":2,"name":"Cyber Attack Techniques Continue to Evolve and Advance"}]},{"@type":"WebSite","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/","name":"Motorola Solutions Blog","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/comments?post=1492"}],"version-history":[{"count":1,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1492\/revisions"}],"predecessor-version":[{"id":2219,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/1492\/revisions\/2219"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media\/1647"}],"wp:attachment":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media?parent=1492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/categories?post=1492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/tags?post=1492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}