{"id":9977,"date":"2021-01-04T15:07:13","date_gmt":"2021-01-04T15:07:13","guid":{"rendered":"https:\/\/xelere.com\/?p=9977"},"modified":"2021-01-04T15:51:41","modified_gmt":"2021-01-04T15:51:41","slug":"implementacion-de-servicios-de-red-team","status":"publish","type":"post","link":"https:\/\/xelere.com\/en\/implementacion-de-servicios-de-red-team\/","title":{"rendered":"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.4.8&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.8&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243;]<\/p>\n<h4>Por: <strong>Diego Bruno,<\/strong> Consultor Senior en Red Teaming y Ciberseguridad, Xelere<\/h4>\n<p>Art\u00edculo escrito para la revista Cybersecurity de ITware Latam <a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/Redteamarticulo.jpg\" target=\"_blank\" rel=\"noopener noreferrer\">Ver art\u00edculo original<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>La adopci\u00f3n de nuevas tecnolog\u00edas para la automatizaci\u00f3n y crecimiento del negocio es cada vez m\u00e1s r\u00e1pida, lo que adem\u00e1s de hacer compleja su administraci\u00f3n, complica a\u00fan m\u00e1s su aseguramiento.<\/p>\n<p>En materia de seguridad ofensiva, desde hace tiempo hay empresas que suelen contratar una vez al a\u00f1o un servicio \u201cpenetration test\u201d externo. Aunque a veces es mejor que no hacer nada, este m\u00e9todo puede dar resultados limitados. De la \u201cfoto anual\u201d, se evolucion\u00f3 hacia el pentest continuo (mensual, trimestral), para detectar temas a mitigar con mayor rapidez.<\/p>\n<p>La siguiente evoluci\u00f3n es el servicio de\u00a0<strong>Red Team<\/strong>, que realiza actividades similares, pero con una perspectiva m\u00e1s hol\u00edstica que tiene como finalidad pasar por debajo del radar de cualquier m\u00e9todo de protecci\u00f3n que pueda tener implementado la organizaci\u00f3n (Firewalls, WAF, DLP, IDS, IPS, Antivirus, EDR, etc).<\/p>\n<p>El Red Team est\u00e1 basado en tres pilares de an\u00e1lisis: Personas, Procesos y Tecnolog\u00eda. Busca probar las defensas tecnol\u00f3gicas, los mecanismos de monitoreo, respuesta y recuperaci\u00f3n entre incidentes para luego mejorar los tiempos de detecci\u00f3n (<strong>TTD<\/strong>) y de mitigaci\u00f3n (<strong>TTM<\/strong>).<\/p>\n<p>El servicio de Red Team est\u00e1 orientado a aquellas empresas y organizaciones que ya tienen un determinado nivel de madurez, probablemente con un Blue Team que se encarga de manejar la seguridad defensiva. De esta manera se busca saber si en caso de ser atacados se pueden detectar, contener y erradicar esos ataques y cu\u00e1nto tiempo llevar\u00eda.<\/p>\n<p>Los escenarios pueden basarse en actores de amenaza internos o externos o incluso de terceras partes, como por ejemplo proveedores externos que brindanun servicio espec\u00edfico a la empresa y que pueden ser vectores de ataque.<\/p>\n<p>Tambi\u00e9n pueden estar basados en APT conocidos y espec\u00edficos a la industria a la cual pertenece la empresa. En estos casos seutilizan enfoques de tipo Adversary Emulation o Adversary Simulation.Adem\u00e1s los escenarios o \u201cengagements\u201d del Red Team se basan en los TTP (T\u00e1cticas, T\u00e9cnicas y Procedimientos) utilizados por las campa\u00f1as de APT (Advance Persistent Threats).<\/p>\n<p>Una fuente de referencia es la MITRE ATT&amp;CK Matrix, que analiza en detalle estas TTPs <a href=\"https:\/\/attack.mitre.org\/\">https:\/\/attack.mitre.org<\/a> y brinda un modelo para el comportamiento del adversario cibern\u00e9tico, sus diversas fases del ciclo de vida y las plataformas a las que se sabe que se dirigen. Esto permite planificar mejoras de seguridad y verificar el correcto funcionamiento de las defensas.<\/p>\n<p>Desde la \u00f3ptica del servicio de Red Team, y en relaci\u00f3n al modelado de los escenarios, tanto propuestos como aquellos que van surgiendo a pedido del cliente, nos sirve para tomar dichos TTP y emular comportamientos en un determinado escenario de ejecuci\u00f3n.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Por: Diego Bruno, Consultor Senior en Red Teaming y Ciberseguridad, Xelere Art\u00edculo escrito para la revista Cybersecurity de ITware Latam Ver art\u00edculo original &nbsp; La adopci\u00f3n de nuevas tecnolog\u00edas para la automatizaci\u00f3n y crecimiento del negocio es cada vez m\u00e1s r\u00e1pida, lo que adem\u00e1s de hacer compleja su administraci\u00f3n, complica a\u00fan m\u00e1s su aseguramiento. En [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9981,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[78],"tags":[],"class_list":["post-9977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva - Xelere<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xelere.com\/en\/implementacion-de-servicios-de-red-team\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva - Xelere\" \/>\n<meta property=\"og:description\" content=\"Por: Diego Bruno, Consultor Senior en Red Teaming y Ciberseguridad, Xelere Art\u00edculo escrito para la revista Cybersecurity de ITware Latam Ver art\u00edculo original &nbsp; La adopci\u00f3n de nuevas tecnolog\u00edas para la automatizaci\u00f3n y crecimiento del negocio es cada vez m\u00e1s r\u00e1pida, lo que adem\u00e1s de hacer compleja su administraci\u00f3n, complica a\u00fan m\u00e1s su aseguramiento. En [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xelere.com\/en\/implementacion-de-servicios-de-red-team\/\" \/>\n<meta property=\"og:site_name\" content=\"Xelere\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XelereSA\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-04T15:07:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-04T15:51:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/redteam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"950\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"xelere\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Xelere\" \/>\n<meta name=\"twitter:site\" content=\"@Xelere\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"xelere\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/\"},\"author\":{\"name\":\"xelere\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\"},\"headline\":\"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva\",\"datePublished\":\"2021-01-04T15:07:13+00:00\",\"dateModified\":\"2021-01-04T15:51:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/\"},\"wordCount\":565,\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/redteam.jpg\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/\",\"name\":\"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva - Xelere\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/redteam.jpg\",\"datePublished\":\"2021-01-04T15:07:13+00:00\",\"dateModified\":\"2021-01-04T15:51:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/redteam.jpg\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/redteam.jpg\",\"width\":1920,\"height\":950},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xelere.com\\\/implementacion-de-servicios-de-red-team\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xelere.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"name\":\"Xelere\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xelere.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\",\"name\":\"Xelere\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"width\":810,\"height\":283,\"caption\":\"Xelere\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XelereSA\\\/\",\"https:\\\/\\\/x.com\\\/Xelere\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xelere\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCq796T-Uv9WHCogZPJ8uXaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\",\"name\":\"xelere\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"caption\":\"xelere\"},\"url\":\"https:\\\/\\\/xelere.com\\\/en\\\/author\\\/lalonso\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva - Xelere","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xelere.com\/en\/implementacion-de-servicios-de-red-team\/","og_locale":"en_US","og_type":"article","og_title":"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva - Xelere","og_description":"Por: Diego Bruno, Consultor Senior en Red Teaming y Ciberseguridad, Xelere Art\u00edculo escrito para la revista Cybersecurity de ITware Latam Ver art\u00edculo original &nbsp; La adopci\u00f3n de nuevas tecnolog\u00edas para la automatizaci\u00f3n y crecimiento del negocio es cada vez m\u00e1s r\u00e1pida, lo que adem\u00e1s de hacer compleja su administraci\u00f3n, complica a\u00fan m\u00e1s su aseguramiento. En [&hellip;]","og_url":"https:\/\/xelere.com\/en\/implementacion-de-servicios-de-red-team\/","og_site_name":"Xelere","article_publisher":"https:\/\/www.facebook.com\/XelereSA\/","article_published_time":"2021-01-04T15:07:13+00:00","article_modified_time":"2021-01-04T15:51:41+00:00","og_image":[{"width":1920,"height":950,"url":"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/redteam.jpg","type":"image\/jpeg"}],"author":"xelere","twitter_card":"summary_large_image","twitter_creator":"@Xelere","twitter_site":"@Xelere","twitter_misc":{"Written by":"xelere","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#article","isPartOf":{"@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/"},"author":{"name":"xelere","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d"},"headline":"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva","datePublished":"2021-01-04T15:07:13+00:00","dateModified":"2021-01-04T15:51:41+00:00","mainEntityOfPage":{"@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/"},"wordCount":565,"publisher":{"@id":"https:\/\/xelere.com\/#organization"},"image":{"@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/redteam.jpg","articleSection":["Ciberseguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/","url":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/","name":"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva - Xelere","isPartOf":{"@id":"https:\/\/xelere.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#primaryimage"},"image":{"@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/redteam.jpg","datePublished":"2021-01-04T15:07:13+00:00","dateModified":"2021-01-04T15:51:41+00:00","breadcrumb":{"@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#primaryimage","url":"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/redteam.jpg","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2021\/01\/redteam.jpg","width":1920,"height":950},{"@type":"BreadcrumbList","@id":"https:\/\/xelere.com\/implementacion-de-servicios-de-red-team\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xelere.com\/"},{"@type":"ListItem","position":2,"name":"Implementaci\u00f3n de Servicios de Red Team como evoluci\u00f3n de la seguridad ofensiva preventiva"}]},{"@type":"WebSite","@id":"https:\/\/xelere.com\/#website","url":"https:\/\/xelere.com\/","name":"Xelere","description":"","publisher":{"@id":"https:\/\/xelere.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xelere.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xelere.com\/#organization","name":"Xelere","url":"https:\/\/xelere.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/","url":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","width":810,"height":283,"caption":"Xelere"},"image":{"@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XelereSA\/","https:\/\/x.com\/Xelere","https:\/\/www.linkedin.com\/company\/xelere","https:\/\/www.youtube.com\/channel\/UCq796T-Uv9WHCogZPJ8uXaQ"]},{"@type":"Person","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d","name":"xelere","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","caption":"xelere"},"url":"https:\/\/xelere.com\/en\/author\/lalonso\/"}]}},"_links":{"self":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/9977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/comments?post=9977"}],"version-history":[{"count":7,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/9977\/revisions"}],"predecessor-version":[{"id":9990,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/9977\/revisions\/9990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media\/9981"}],"wp:attachment":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media?parent=9977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/categories?post=9977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/tags?post=9977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}