{"id":61326,"date":"2019-07-24T09:17:11","date_gmt":"2019-07-24T14:17:11","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=61326"},"modified":"2019-07-24T09:17:17","modified_gmt":"2019-07-24T14:17:17","slug":"iranian-hacking-group-cyberwar","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/","title":{"rendered":"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">The cyber war has begun&#8230;  <\/h3>\n\n\n\n<p>The U.S. and their allies have begun cyber strikes against the Iranians and its government.  However, Iran isn&#8217;t going down without a fight.  Considering a large hacking group originates from Iran, the Department of Homeland Security issued a public warning regarding an increase in Iranian hackers targeting public entities.  Today, those concerns have come to fruition.  <\/p>\n\n\n\n<p>Security researchers have confirmed the Iranian hacking group, APT34, has begun targeting U.S. corporations, and are going about it in a very strategic way.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Hackers Use Social Media To Spread Malware<\/h4>\n\n\n\n<p>APT34 is targeting LinkedIn users, specifically those who are employed in the financial, energy and government sectors.  Hackers are sending fraudulent &#8220;connection&#8221; invitations riddled with malicious attachments.  From there, if the user downloads them, they open up a backdoor for hackers to gather and steal user credentials and data.  This may not be too alarming from a business perspective considering the group is targeting individuals on a social network.  However, this can come back on the employer in two ways.  <\/p>\n\n\n\n<p>First, users identify where they work on the LinkedIn platform.  If they were to download malicious attachments, hackers would have the ability to gain user credentials.  Considering those data points are often used across personal and professional systems, the hackers could then conduct a cyber attack on that business using stolen credentials.  It only gets worse if the users are checking social media accounts on company networks.  If they were to do this, the hackers then have a backdoor to the company network.  <\/p>\n\n\n\n<p>According to <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/07\/22\/critical-linkedin-warning-as-irans-hackers-send-fake-invites-laced-with-malware\/#3f33145e6ac1\">Forbes<\/a>, one of the fraudulent invitations comes from &#8220;Rebecca Watts&#8221; claiming to be a Cambridge University researcher.  If you receive this invitation, delete the request immediately.  Additionally, users should proceed with caution when accepting invitations from parties they do not know.  It is best if you do not know the person, to disregard the invitation.  <\/p>\n\n\n\n<p>Stay safe out there! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cyber war has begun&#8230; The U.S. and their allies have begun cyber strikes against the Iranians and its government. However, Iran isn&#8217;t going down without a fight. Considering a large hacking group originates from Iran, the Department of Homeland Security issued a public warning regarding an increase in Iranian hackers targeting public entities. Today, [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":61135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[5659],"class_list":["post-61326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","tag-cyber-war"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users<\/title>\n<meta name=\"description\" content=\"The U.S. and their allies have begun targeting the Iranian government; however it&#039;s hacking group, APT34, is not going down wiithout...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users\" \/>\n<meta property=\"og:description\" content=\"The U.S. and their allies have begun targeting the Iranian government; however it&#039;s hacking group, APT34, is not going down wiithout...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-24T14:17:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-24T14:17:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"441\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users\",\"datePublished\":\"2019-07-24T14:17:11+00:00\",\"dateModified\":\"2019-07-24T14:17:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/\"},\"wordCount\":329,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"keywords\":[\"cyber war\"],\"articleSection\":[\"Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/\",\"name\":\"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"datePublished\":\"2019-07-24T14:17:11+00:00\",\"dateModified\":\"2019-07-24T14:17:17+00:00\",\"description\":\"The U.S. and their allies have begun targeting the Iranian government; however it's hacking group, APT34, is not going down wiithout...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg\",\"width\":730,\"height\":441},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/iranian-hacking-group-cyberwar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users","description":"The U.S. and their allies have begun targeting the Iranian government; however it's hacking group, APT34, is not going down wiithout...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/","og_locale":"en_US","og_type":"article","og_title":"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users","og_description":"The U.S. and their allies have begun targeting the Iranian government; however it's hacking group, APT34, is not going down wiithout...","og_url":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-07-24T14:17:11+00:00","article_modified_time":"2019-07-24T14:17:17+00:00","og_image":[{"width":730,"height":441,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users","datePublished":"2019-07-24T14:17:11+00:00","dateModified":"2019-07-24T14:17:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/"},"wordCount":329,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","keywords":["cyber war"],"articleSection":["Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/","url":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/","name":"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","datePublished":"2019-07-24T14:17:11+00:00","dateModified":"2019-07-24T14:17:17+00:00","description":"The U.S. and their allies have begun targeting the Iranian government; however it's hacking group, APT34, is not going down wiithout...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Remote-Desktop-Protocol-continues-to-be-a-major-attack-vector.jpg","width":730,"height":441},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/iranian-hacking-group-cyberwar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Iranian Hacking Group Begins Targeting US Corporations and LinkedIn Users"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=61326"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/61135"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=61326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=61326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=61326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}