{"id":46836,"date":"2022-02-03T11:55:00","date_gmt":"2022-02-03T10:55:00","guid":{"rendered":"https:\/\/www.soitron.com\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/"},"modified":"2023-12-07T16:38:27","modified_gmt":"2023-12-07T15:38:27","slug":"hackerske-skupiny-verbuji-do-fiktivnich-firem","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/","title":{"rendered":"Hackersk\u00e9 skupiny do fiktivn\u00edch kyberbezpe\u010dnostn\u00edch firem verbuj\u00ed odborn\u00edky"},"content":{"rendered":"\n<p><strong>Drzost hackersk\u00fdch skupin nezn\u00e1 meze. V&nbsp;honb\u011b za financemi ji\u017e nev\u00e1haj\u00ed rekrutovat softwarov\u00e9 in\u017een\u00fdry, kte\u0159\u00ed by jim pod rou\u0161kou penetra\u010dn\u00edho testov\u00e1n\u00ed pomohli prov\u00e9st ransomwarov\u00e9 \u00fatoky. Za t\u00edmto \u00fa\u010delem zakl\u00e1daj\u00ed \u201elegitimn\u00ed\u201c spole\u010dnosti jejich\u017e p\u0159edm\u011btem podnik\u00e1n\u00ed m\u00e1 b\u00fdt kybernetick\u00e1 bezpe\u010dnost. Ale pozor, opak je pravdou! Schopnosti IT odborn\u00edk\u016f jsou zde nev\u011bdomky zneu\u017e\u00edv\u00e1ny k&nbsp;tomu, aby objevili bezpe\u010dnostn\u00ed slabiny, kter\u00e9 by se daly kyberzlo\u010dinci n\u00e1sledn\u011b vyu\u017e\u00edt.<\/strong><\/p>\n\n\n\n<p>Toto po\u010d\u00edn\u00e1n\u00ed dokazuje p\u0159\u00edpad zaveden\u00e9 rusk\u00e9 hackersk\u00e9 skupiny FIN7, kter\u00e1 funguje od roku 2015 a jej\u00ed\u017e celkov\u00e1 \u201etr\u017en\u00ed kapitalizace\u201c se odhaduje u\u017e na miliardu dolar\u016f. Podle v\u00fdzkumn\u00edk\u016f z poradensk\u00e9 jednotky Gemini Advisory spole\u010dnosti Recorded Future skupina zalo\u017eila a provozovala firmu Bastion Secure \u2013 se s\u00eddlem na skute\u010dn\u00e9 adrese, n\u011bkolika pobo\u010dkami po cel\u00e9m sv\u011bt\u011b, telefonn\u00edmi \u010d\u00edsly, vlastn\u00edmi firemn\u00ed webov\u00fdmi str\u00e1nkami, a v\u0161e bylo podpo\u0159eno v\u00fdsledky v&nbsp;Google vyhled\u00e1va\u010di a pozitivn\u00edmi referencemi zast\u0159e\u0161en\u00fdmi renomovan\u00fdmi sv\u011btov\u00fdmi firmami. <em>\u201eFirma Bastion Secure pro soukrom\u00e9 spole\u010dnosti a organizace z&nbsp;ve\u0159ejn\u00e9ho sektoru m\u011bla poskytovat slu\u017eby v&nbsp;oblasti penetra\u010dn\u00edch test\u016f, co\u017e je metoda ov\u011b\u0159en\u00ed zabezpe\u010den\u00ed po\u010d\u00edta\u010dov\u00fdch za\u0159\u00edzen\u00ed, syst\u00e9m\u016f nebo aplikac\u00ed,\u201c<\/em> <strong>vysv\u011btluje<\/strong> <strong>Martin Lohnert, specialista pro oblast kyberbezpe\u010dnosti v technologick\u00e9 spole\u010dnosti Soitron.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">T\u0159et\u00edm krokem ve v\u00fdb\u011brov\u00e9m \u0159\u00edzen\u00ed je \u00fatok<\/h2>\n\n\n\n<p>Fiktivn\u00ed spole\u010dnost p\u0159itom byla pouze z\u00e1st\u011brku pro zve\u0159ej\u0148ov\u00e1n\u00ed inzer\u00e1t\u016f na pracovn\u00edch port\u00e1lech s c\u00edlem najmout na r\u016fzn\u00e9 pozice experty na kybernetickou bezpe\u010dnost. Pracovn\u00ed nab\u00eddky l\u00e1kaly softv\u00e9rov\u00e9 in\u017een\u00fdry, syst\u00e9mov\u00e9 administr\u00e1tory, \u010di C++, Python a PHP program\u00e1tory. Na ty, kte\u0159\u00ed se p\u0159ihl\u00e1sili, \u010dekal t\u0159\u00edf\u00e1zov\u00fd pohovor:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prvn\u00ed kolo:<\/strong> \u017eadatel\u00e9 o zam\u011bstn\u00e1n\u00ed absolvovali videopohovor s HR z\u00e1stupcem Bastion Secure. Po \u00fasp\u011b\u0161n\u00e9m absolvov\u00e1n\u00ed do\u0161lo k&nbsp;podeps\u00e1n\u00ed dohody<br>o ml\u010denlivosti.<\/li>\n\n\n\n<li><strong>Druh\u00e9 kolo:<\/strong> ji\u017e zam\u011bstnanci obdr\u017eeli od spole\u010dnosti legitimn\u00ed n\u00e1stroje pot\u0159ebn\u00e9 k&nbsp;penetra\u010dn\u00edmu testov\u00e1n\u00ed, aby mohli plnit \u00fakoly.<\/li>\n\n\n\n<li><strong>T\u0159et\u00ed kolo:<\/strong> zam\u011bstnanci obdr\u017eeli zad\u00e1n\u00ed, ve kter\u00e9m byli vyzv\u00e1ni, aby provedli penetra\u010dn\u00ed test pro jedno ze z\u00e1kazn\u00edk\u016f Bastion Secure.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Odpov\u011bdnost v&nbsp;tomto p\u0159\u00edpad\u011b nese tester<\/h2>\n\n\n\n<p>Je pot\u0159eba zd\u016fraznit, \u017ee v&nbsp;tomto procesu se nikde neobjevily \u017e\u00e1dn\u00e9 pr\u00e1vn\u00ed dokumenty oprav\u0148uj\u00edc\u00ed testera penetra\u010dn\u00ed test prov\u00e9st, jak je v&nbsp;takov\u00fdchto p\u0159\u00edpadech zvykem. <em>\u201eT\u00edm existuje riziko, \u017ee pokud by byl tester odhalen, mohl by b\u00fdt podle platn\u00e9 legislativy st\u00e1tu, ve kter\u00e9 spole\u010dnost, kterou testuje, st\u00edh\u00e1n. On jako jednotlivec, nikoliv hackersk\u00fd gang, pro kter\u00fd pracoval. Byl by to toti\u017e on, kdo pokusy o \u00fatok prov\u00e1d\u00ed,\u201c<\/em> <strong>zd\u016fraz\u0148uje Martin Lohnert<\/strong>.<\/p>\n\n\n\n<p>Z\u00e1stupci Bastion Secure po t\u011bchto sv\u00fdch zam\u011bstnanc\u00edch d\u00e1le po\u017eadovali, aby v&nbsp;p\u0159\u00edpad\u011b \u00fasp\u011b\u0161n\u00e9ho proniknut\u00ed do podnikov\u00e9ho syst\u00e9mu hledali p\u0159edev\u0161\u00edm firemn\u00ed data, v\u010detn\u011b z\u00e1loh. V\u0161e vlastn\u011b odpov\u00eddalo krok\u016fm, kter\u00e9 se prov\u00e1d\u00ed p\u0159i pokusu<br>o ransomwarov\u00fd \u00fatok.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zam\u011bstnat testery je levn\u011bj\u0161\u00ed a snaz\u0161\u00ed<\/h2>\n\n\n\n<p>Pokud jde o d\u016fvody, pro\u010d zlo\u010dineck\u00e1 skupina jako FIN7 za\u0161la tak daleko, aby provozovala fale\u0161nou bezpe\u010dnostn\u00ed spole\u010dnost, odpov\u011b\u010f je nasnad\u011b. <em>\u201eNajmout \u010dlov\u011bka pro neleg\u00e1ln\u00ed aktivity nen\u00ed v\u016fbec snadn\u00e9. \u0160ikovn\u00fdch pen-tester\u016f je nedostatek a na trhu jsou atraktivn\u00ed nab\u00eddky od renomovan\u00fdch firem, kde jim rozhodn\u011b nehroz\u00ed trestn\u00ed st\u00edhan\u00ed. Pro FIN7 bude proto snaz\u0161\u00ed i levn\u011bj\u0161\u00ed z\u00edskat takto nic netu\u0161\u00edc\u00ed zam\u011bstnance ne\u017e spolupracovat s jin\u00fdmi hackersk\u00fdmi skupinami nebo hackery rekrutovan\u00fdmi z&nbsp;darknetu, kte\u0159\u00ed by t\u0159eba po\u017eadovali ur\u010dit\u00e9 procento ze zisku,\u201c<\/em><strong> prozrazuje Martin Lohnert.<\/strong> V\u00fdkupn\u00e9 po\u017eadovan\u00e9 po napaden\u00fdch firm\u00e1ch m\u016f\u017ee v&nbsp;n\u011bkter\u00fdch p\u0159\u00edpadech dos\u00e1hnout milion\u016f americk\u00fdch dolar\u016f.<\/p>\n\n\n\n<p>Taktika provozov\u00e1n\u00ed fale\u0161n\u00e9 bezpe\u010dnostn\u00ed firmy nen\u00ed nijak zvl\u00e1\u0161\u0165 nov\u00e1. Sama skupina FIN7 ji u\u017e vyu\u017eila v&nbsp;roce 2010, kdy pou\u017e\u00edvala dal\u0161\u00ed fale\u0161nou bezpe\u010dnostn\u00ed firmu s n\u00e1zvem Combi Security. <em>\u201eAlarmuj\u00edc\u00ed na tomto p\u0159\u00edkladu je v\u0161ak to, \u017ee v&nbsp;dne\u0161n\u00ed dob\u011b pr\u00e1ce z&nbsp;domova, lidi hledaj\u00edc\u00ed pr\u00e1ci, \u010di p\u0159iv\u00fdd\u011blek mnohdy nenapadne verifikovat zak\u00e1zky zam\u011bstnavatele. A u\u017e v\u016fbec je nemus\u00ed napadnout, k&nbsp;\u010demu v\u0161emu mohou b\u00fdt zneu\u017eit\u00ed. Automaticky p\u0159edpokl\u00e1daj\u00ed, \u017ee spole\u010dnost, kter\u00e1 o n\u011b m\u00e1 z\u00e1jem je legitimn\u00ed, a tud\u00ed\u017e ji d\u016fv\u011b\u0159uj\u00ed ve v\u0161em. V\u010detn\u011b toho, \u017ee od sv\u00e9ho z\u00e1kazn\u00edka m\u00e1 povolen\u00ed prov\u00e1d\u011bt penetra\u010dn\u00ed testy,\u201c<\/em> <strong>uzav\u00edr\u00e1 Martin Lohnert.<\/strong><\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Drzost hackersk\u00fdch skupin nezn\u00e1 meze. V&nbsp;honb\u011b za financemi ji\u017e nev\u00e1haj\u00ed rekrutovat softwarov\u00e9 in\u017een\u00fdry, kte\u0159\u00ed by jim pod rou\u0161kou penetra\u010dn\u00edho testov\u00e1n\u00ed pomohli prov\u00e9st ransomwarov\u00e9 \u00fatoky. Za t\u00edmto \u00fa\u010delem zakl\u00e1daj\u00ed \u201elegitimn\u00ed\u201c spole\u010dnosti jejich\u017e p\u0159edm\u011btem podnik\u00e1n\u00ed m\u00e1 b\u00fdt kybernetick\u00e1 bezpe\u010dnost. Ale pozor, opak je pravdou! Schopnosti IT odborn\u00edk\u016f jsou zde nev\u011bdomky zneu\u017e\u00edv\u00e1ny k&nbsp;tomu, aby objevili bezpe\u010dnostn\u00ed slabiny, kter\u00e9 [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":46833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[144,352,143],"tags":[313,338],"news_categories":[371],"class_list":["post-46836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky-cs","category-bezpecnost-cs","category-uncategorized-cs","tag-kyberneticka-bezpecnost-cs","tag-kyberneticka-bezpecnost-cs-2","news_categories-bezpecnost-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackersk\u00e9 skupiny do verbuj\u00ed odborn\u00edky dofiktivn\u00edch firem<\/title>\n<meta name=\"description\" content=\"Zalo\u017een\u00ed fale\u0161n\u00e9 bezpe\u010dnostn\u00ed firmy nen\u00ed novinka. Hacke\u0159i l\u00e1kaj\u00ed odborn\u00edky a jejich schopnosti vyu\u017e\u00edvaj\u00ed k odhalen\u00ed bezpe\u010dnostn\u00edch slabin\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackersk\u00e9 skupiny do verbuj\u00ed odborn\u00edky dofiktivn\u00edch firem\" \/>\n<meta property=\"og:description\" content=\"Zalo\u017een\u00ed fale\u0161n\u00e9 bezpe\u010dnostn\u00ed firmy nen\u00ed novinka. Hacke\u0159i l\u00e1kaj\u00ed odborn\u00edky a jejich schopnosti vyu\u017e\u00edvaj\u00ed k odhalen\u00ed bezpe\u010dnostn\u00edch slabin\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T10:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T15:38:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Natalia Jurakova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Natalia Jurakova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackersk\u00e9 skupiny do verbuj\u00ed odborn\u00edky dofiktivn\u00edch firem","description":"Zalo\u017een\u00ed fale\u0161n\u00e9 bezpe\u010dnostn\u00ed firmy nen\u00ed novinka. Hacke\u0159i l\u00e1kaj\u00ed odborn\u00edky a jejich schopnosti vyu\u017e\u00edvaj\u00ed k odhalen\u00ed bezpe\u010dnostn\u00edch slabin","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"Hackersk\u00e9 skupiny do verbuj\u00ed odborn\u00edky dofiktivn\u00edch firem","og_description":"Zalo\u017een\u00ed fale\u0161n\u00e9 bezpe\u010dnostn\u00ed firmy nen\u00ed novinka. Hacke\u0159i l\u00e1kaj\u00ed odborn\u00edky a jejich schopnosti vyu\u017e\u00edvaj\u00ed k odhalen\u00ed bezpe\u010dnostn\u00edch slabin","og_url":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/","og_site_name":"Soitron","article_published_time":"2022-02-03T10:55:00+00:00","article_modified_time":"2023-12-07T15:38:27+00:00","og_image":[{"width":1280,"height":1920,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","type":"image\/jpeg"}],"author":"Natalia Jurakova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Natalia Jurakova","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/"},"author":{"name":"Natalia Jurakova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/da4bfcbfdc7cb1175aef5d403061c986"},"headline":"Hackersk\u00e9 skupiny do fiktivn\u00edch kyberbezpe\u010dnostn\u00edch firem verbuj\u00ed odborn\u00edky","datePublished":"2022-02-03T10:55:00+00:00","dateModified":"2023-12-07T15:38:27+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/"},"wordCount":854,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost","Kybernetick\u00e1 bezpe\u010dnos\u0165"],"articleSection":["\u010dl\u00e1nky","Kybernetick\u00e1 bezpe\u010dnost","Uncategorized @cs"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/","url":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/","name":"Hackersk\u00e9 skupiny do verbuj\u00ed odborn\u00edky dofiktivn\u00edch firem","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","datePublished":"2022-02-03T10:55:00+00:00","dateModified":"2023-12-07T15:38:27+00:00","description":"Zalo\u017een\u00ed fale\u0161n\u00e9 bezpe\u010dnostn\u00ed firmy nen\u00ed novinka. Hacke\u0159i l\u00e1kaj\u00ed odborn\u00edky a jejich schopnosti vyu\u017e\u00edvaj\u00ed k odhalen\u00ed bezpe\u010dnostn\u00edch slabin","breadcrumb":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","width":1280,"height":1920,"caption":"kyberneticka bezpecnost hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/cs\/hackerske-skupiny-verbuji-do-fiktivnich-firem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Hackersk\u00e9 skupiny do fiktivn\u00edch kyberbezpe\u010dnostn\u00edch firem verbuj\u00ed odborn\u00edky"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/da4bfcbfdc7cb1175aef5d403061c986","name":"Natalia Jurakova","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1acd0f0b322c56059c32d84e222e637666ee594f4a6dde61c2fc4ac19b571a9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1acd0f0b322c56059c32d84e222e637666ee594f4a6dde61c2fc4ac19b571a9c?s=96&d=mm&r=g","caption":"Natalia Jurakova"},"url":"https:\/\/new.soitron.com\/cs\/author\/naty\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/46836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=46836"}],"version-history":[{"count":2,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/46836\/revisions"}],"predecessor-version":[{"id":54403,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/46836\/revisions\/54403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/46833"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=46836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=46836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=46836"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=46836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}