{"id":52633,"date":"2023-07-10T13:49:16","date_gmt":"2023-07-10T12:49:16","guid":{"rendered":"https:\/\/www.soitron.com\/?p=52633"},"modified":"2023-12-21T15:34:16","modified_gmt":"2023-12-21T14:34:16","slug":"narust-zero-click-exploitu","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/narust-zero-click-exploitu\/","title":{"rendered":"Nebezpe\u010dn\u00fd v\u00fdvoj: n\u00e1r\u016fst zero-click exploit\u016f se st\u00e1v\u00e1 hrozbou i pro b\u011b\u017en\u00e9 u\u017eivatele"},"content":{"rendered":"\n<p><strong>Kybernetick\u00e9 \u00fatoky prost\u0159ednictv\u00edm zero-click exploit\u016f nejsou ni\u010d\u00edm nov\u00fdm. Co v\u0161ak je nov\u00fdm trendem, je to, \u017ee c\u00edlem se st\u00e1vaj\u00ed u\u017e i b\u011b\u017en\u00ed u\u017eivatel\u00e9.<\/strong><\/p>\n\n\n\n<p>Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru, kter\u00e9 umo\u017e\u0148uje \u00fato\u010dn\u00edkovi vzd\u00e1len\u011b prov\u00e9st \u00fatok na za\u0159\u00edzen\u00ed bez interakce u\u017eivatele. Tato technika m\u016f\u017ee b\u00fdt pou\u017eita k&nbsp;\u00fa\u010del\u016fm jako je \u0161pion\u00e1\u017e, ovl\u00e1dnut\u00ed za\u0159\u00edzen\u00ed, \u0161\u00ed\u0159en\u00ed malwaru, a dokonce vyd\u00edr\u00e1n\u00ed. Celkov\u011b jde o velmi nebezpe\u010dnou techniku, kter\u00e1 m\u016f\u017ee m\u00edt zna\u010dn\u00fd dopad na bezpe\u010dnost a soukrom\u00ed u\u017eivatel\u016f. \u0160patnou zpr\u00e1vou je, \u017ee proti t\u011bmto \u00fatok\u016fm maj\u00ed u\u017eivatel\u00e9 jen velmi omezenou obranu.<\/p>\n\n\n\n<p><em>\u201eFakt, \u017ee po\u010dty skupin specializuj\u00edc\u00ed se na tento druh \u00fatoku nar\u016fstaj\u00ed, je velmi znepokojiv\u00fd. \u00dato\u010dn\u00edci si osvojili techniky, d\u0159\u00edve vyu\u017e\u00edvan\u00e9 pouze vysoce profilovan\u00fdmi slo\u017ekami, jako jsou nap\u0159\u00edklad st\u00e1tn\u00ed \u010di vl\u00e1dn\u00ed organizace a tajn\u00e9 slu\u017eby. Kyberzlo\u010dinci vyu\u017e\u00edvaj\u00ed modelu, kdy je prod\u00e1vaj\u00ed za jednor\u00e1zovou platbu (Exploit as a Service), pro napaden\u00ed soukrom\u00e9ho sektoru, respektive b\u011b\u017en\u00fdch u\u017eivatel\u016f, tedy nejen vysoko postaven\u00fdch nebo politicky exponovan\u00fdch osob, vl\u00e1dn\u00edch organizac\u00ed a dal\u0161\u00edch c\u00edl\u016f s cenn\u00fdmi informacemi,\u201c<\/em> <strong>uv\u00e1d\u00ed Petr Kocmich, Global Cyber Security Delivery Manager spole\u010dnosti Soitron.<\/strong> Proto je podle n\u011bj d\u016fle\u017eit\u00e9, aby nejen podniky, ale i u\u017eivatel\u00e9 dodr\u017eovali metody a postupy nejlep\u0161\u00ed praxe doporu\u010dovan\u00e9 v oblasti kybernetick\u00e9 bezpe\u010dnosti a starali se o ochranu sv\u00fdch za\u0159\u00edzen\u00ed p\u0159ed p\u0159\u00edpadn\u00fdmi \u00fatoky.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dopad zranitelnost\u00ed<\/h2>\n\n\n\n<p>Jedn\u00edm z\u00a0nejzn\u00e1m\u011bj\u0161\u00edch a dob\u0159e popsan\u00fdm zero-click exploitem, byl spyware ENDOFDAYS, kter\u00fd slou\u017eil ke kompromitaci iPhon\u016f, konkr\u00e9tn\u011b pozv\u00e1nek v\u00a0iCloud kalend\u00e1\u0159i. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eENDOFDAYS je uk\u00e1zkov\u00fdm p\u0159\u00edpadem, kdy bez nutnosti jak\u00e9koliv interakce ze strany u\u017eivatele, \u00fato\u010dn\u00edk dok\u00e1\u017ee ovl\u00e1dnout cel\u00e9 za\u0159\u00edzen\u00ed. A to v\u010detn\u011b exfiltrace nahr\u00e1vek hovor\u016f d\u00edky p\u0159\u00edstupu k mikrofonu, ovl\u00e1dnut\u00ed p\u0159\u00edstupu k\u00a0GPS lokaci za\u0159\u00edzen\u00ed. \u00dato\u010dn\u00edk d\u00e1le z\u00edsk\u00e1 p\u0159\u00edstup k\u00a0p\u0159edn\u00ed i zadn\u00ed kame\u0159e, mo\u017enost prohled\u00e1v\u00e1n\u00ed soubor\u016f v\u00a0za\u0159\u00edzen\u00ed a maskov\u00e1n\u00ed samotn\u00e9ho spyware, aby nedo\u0161lo k\u00a0jeho odhalen\u00ed. Samotn\u00fd spyware se do za\u0159\u00edzen\u00ed dostane zcela trivi\u00e1ln\u00ed cestou \u2013 a to odesl\u00e1n\u00edm speci\u00e1ln\u011b vytvo\u0159en\u00e9 pozv\u00e1nky do iCloud kalend\u00e1\u0159e, se star\u0161\u00edmi \u010dasov\u00fdmi raz\u00edtky (pozv\u00e1nka, kter\u00e1 ji\u017e prob\u011bhla v\u00a0minulosti,\u201c<\/em><strong> <\/strong>popisuje Petr Kocmich.<\/p>\n<\/blockquote>\n\n\n\n<p>Takov\u00e1 to pozv\u00e1nka je automaticky p\u0159id\u00e1na do kalend\u00e1\u0159e u\u017eivatele bez jak\u00e9hokoliv upozorn\u011bn\u00ed nebo v\u00fdzvy, co\u017e umo\u017e\u0148uje, aby exploit ENDOFDAYS b\u011b\u017eel bez interakce u\u017eivatele a \u00fatoky byly pro c\u00edle neodhaliteln\u00e9. Zranitelnost byla v&nbsp;nov\u00fdch verz\u00edch syst\u00e9mu opravena, ale chyba se t\u00fdkala v\u0161ech verz\u00ed iOS od verze 1.4 a\u017e do verze 14.4.2 a podle informac\u00ed plynouc\u00edch z&nbsp;v\u00fdzkumu, byla aktivn\u011b zneu\u017e\u00edv\u00e1na p\u0159edev\u0161\u00edm v&nbsp;roce 2021<\/p>\n\n\n\n<p>Navzdory tomu se i dnes objevuj\u00ed pokro\u010dil\u00e9 aplikace, kter\u00e9 se um\u00ed vyhnout detekci a zam\u011b\u0159it se na konkr\u00e9tn\u00ed zranitelnost. <em>\u201eTady se jasn\u011b ukazuje i to, pro\u010d je nutn\u00e9 za\u0159\u00edzen\u00ed pravideln\u011b aktualizovat. Zero-click exploit toti\u017e m\u016f\u017ee b\u00fdt p\u0159\u00edtomen v&nbsp;za\u0159\u00edzen\u00ed po neomezen\u011b dlouhou dobu, ani\u017e by si toho u\u017eivatel byl v\u011bdom. Proto je nutn\u00e9 dodr\u017eovat z\u00e1sady kybernetick\u00e9 bezpe\u010dnosti a zajistit, aby byl software v\u017edy aktu\u00e1ln\u00ed a aby byla pou\u017eita dal\u0161\u00ed bezpe\u010dnostn\u00ed opat\u0159en\u00ed,<\/em>\u201c<strong> <\/strong>upozor\u0148uje Petr Kocmich.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ter\u010dem jsou i dal\u0161\u00ed<\/h2>\n\n\n\n<p>Pro Apple to v\u0161ak nen\u00ed prvn\u00ed a ani posledn\u00ed objeven\u00fd p\u0159\u00edklad zero-click exploitu. Nap\u0159\u00edklad v roce 2020 byla odhalena chyba v aplikaci iMessage, kterou mohli \u00fato\u010dn\u00edci vyu\u017e\u00edt k vzd\u00e1len\u00e9mu spu\u0161t\u011bn\u00ed \u0161kodliv\u00e9ho k\u00f3du na za\u0159\u00edzen\u00edch u\u017eivatel\u016f, ani\u017e by bylo t\u0159eba kliknout na odkaz nebo otev\u0159\u00edt p\u0159\u00edlohu. Tyto chyby se v\u0161ak zdaleka nevyh\u00fdbaj\u00ed ani konkuren\u010dn\u00edmu opera\u010dn\u00edmu syst\u00e9mu Android a ani jednotliv\u00fdm mobiln\u00edm aplikac\u00edm.<\/p>\n\n\n\n<p><em>\u201eO n\u011bkter\u00fdch zneu\u017eiteln\u00fdch zranitelnostech v aktu\u00e1ln\u00edch verz\u00edch opera\u010dn\u00edch syst\u00e9m\u016f a aplikac\u00edch je\u0161t\u011b ani nev\u00edme, a\u010dkoliv mohou b\u00fdt ji\u017e zneu\u017e\u00edv\u00e1ny. Dokud se na tyto zranitelnosti nep\u0159ijde, mohou b\u00fdt nejprve vyu\u017e\u00edv\u00e1ny pro \u00fa\u010dely \u0161pion\u00e1\u017ee a \u201evy\u0161\u0161\u00edch z\u00e1jm\u016f\u201c, posl\u00e9ze zpen\u011b\u017eeny formou prodeje Exploit as a Service slu\u017eby z\u00e1kazn\u00edk\u016fm na Dark Webu\u201c<\/em> <strong>dod\u00e1v\u00e1 Petr Kocmich. <\/strong>Ukazuje se tedy, \u017ee i b\u011b\u017en\u00ed u\u017eivatel\u00e9 mohou b\u00fdt ohro\u017eeni zero-click exploitem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sofistikovanost \u00fato\u010dn\u00edk\u016f se zvy\u0161uje<\/h2>\n\n\n\n<p>Zero-click \u00fatoky jsou obvykle zalo\u017eeny na chyb\u00e1ch v softwaru, a to v\u010detn\u011b opera\u010dn\u00edch syst\u00e9m\u016f, aplikac\u00ed a slu\u017eeb. Nezodpov\u011bzenou ot\u00e1zkou v\u0161ak z\u016fst\u00e1v\u00e1 to, zda jde jen o chyby, nebo n\u011b\u010d\u00ed \u00famysl.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201e\u010c\u00edm rychleji se nov\u00fd software vyv\u00edj\u00ed, t\u00edm v\u00edce roste snaha o \u0159\u00edzen\u00ed a zabezpe\u010den\u00ed k\u00f3du a cel\u00e9ho softwarov\u00e9ho v\u00fdvojov\u00e9ho cyklu. Automatizujeme testov\u00e1n\u00ed, za\u0159azujeme dodate\u010dn\u00e9 bezpe\u010dnostn\u00ed testy v&nbsp;ran\u00e9m st\u00e1diu v\u00fdvoje (Shift-Left do&nbsp; CI-CD pipeline), prov\u00e1d\u00edme statickou a dynamickou kontrolu k\u00f3du, vyu\u017e\u00edv\u00e1me um\u011blou inteligenci k&nbsp;dohled\u00e1n\u00ed chyb v&nbsp;k\u00f3du, v\u00fdsledn\u00fd celek podrob\u00edme automatizovan\u00e9mu, ale i manu\u00e1ln\u00edmu penetra\u010dn\u00edmu testov\u00e1n\u00ed, av\u0161ak bylo by po\u0161etil\u00e9 se domn\u00edvat, \u017ee v\u0161echny typy zranitelnost\u00ed vznikaj\u00ed jen b\u011b\u017en\u00fdmi chybami v&nbsp;k\u00f3du a pak tedy vyvst\u00e1v\u00e1 ot\u00e1zka, zda nejsou n\u011bkter\u00e9 zranitelnosti sp\u00ed\u0161e z\u00e1m\u011brn\u00fdmi zadn\u00edmi vr\u00e1tky, slou\u017e\u00edc\u00edmi pro konkr\u00e9tn\u00ed \u00fa\u010dely,<\/em>\u201c zakon\u010duje Petr Kocmich.<\/p>\n<\/blockquote>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kybernetick\u00e9 \u00fatoky prost\u0159ednictv\u00edm zero-click exploit\u016f nejsou ni\u010d\u00edm nov\u00fdm. Co v\u0161ak je nov\u00fdm trendem, je to, \u017ee c\u00edlem se st\u00e1vaj\u00ed u\u017e i b\u011b\u017en\u00ed u\u017eivatel\u00e9. Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru, kter\u00e9 umo\u017e\u0148uje \u00fato\u010dn\u00edkovi vzd\u00e1len\u011b prov\u00e9st \u00fatok na za\u0159\u00edzen\u00ed bez interakce u\u017eivatele. Tato technika m\u016f\u017ee b\u00fdt pou\u017eita k&nbsp;\u00fa\u010del\u016fm jako je \u0161pion\u00e1\u017e, ovl\u00e1dnut\u00ed za\u0159\u00edzen\u00ed, \u0161\u00ed\u0159en\u00ed malwaru, [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":52634,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[143],"tags":[313],"news_categories":[371],"class_list":["post-52633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-cs","tag-kyberneticka-bezpecnost-cs","news_categories-bezpecnost-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Soukrom\u00ed u\u017eivatel\u016f mobil\u016f ohro\u017eeno | Soitron<\/title>\n<meta name=\"description\" content=\"Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru. Jde o velmi nebezpe\u010dnou techniku, kter\u00e1 m\u016f\u017ee m\u00edt zna\u010dn\u00fd dopad na bezpe\u010dnost a soukrom\u00ed u\u017eivatel\u016f p\u0159es mobil.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Soukrom\u00ed u\u017eivatel\u016f mobil\u016f ohro\u017eeno | Soitron\" \/>\n<meta property=\"og:description\" content=\"Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru. Jde o velmi nebezpe\u010dnou techniku, kter\u00e1 m\u016f\u017ee m\u00edt zna\u010dn\u00fd dopad na bezpe\u010dnost a soukrom\u00ed u\u017eivatel\u016f p\u0159es mobil.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/rise-zero-click-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T12:49:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-21T14:34:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leona Dundrova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leona Dundrova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Soukrom\u00ed u\u017eivatel\u016f mobil\u016f ohro\u017eeno | Soitron","description":"Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru. Jde o velmi nebezpe\u010dnou techniku, kter\u00e1 m\u016f\u017ee m\u00edt zna\u010dn\u00fd dopad na bezpe\u010dnost a soukrom\u00ed u\u017eivatel\u016f p\u0159es mobil.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"Soukrom\u00ed u\u017eivatel\u016f mobil\u016f ohro\u017eeno | Soitron","og_description":"Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru. Jde o velmi nebezpe\u010dnou techniku, kter\u00e1 m\u016f\u017ee m\u00edt zna\u010dn\u00fd dopad na bezpe\u010dnost a soukrom\u00ed u\u017eivatel\u016f p\u0159es mobil.","og_url":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/","og_site_name":"Soitron","article_published_time":"2023-07-10T12:49:16+00:00","article_modified_time":"2023-12-21T14:34:16+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","type":"image\/jpeg"}],"author":"Leona Dundrova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leona Dundrova","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/"},"author":{"name":"Leona Dundrova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238"},"headline":"Nebezpe\u010dn\u00fd v\u00fdvoj: n\u00e1r\u016fst zero-click exploit\u016f se st\u00e1v\u00e1 hrozbou i pro b\u011b\u017en\u00e9 u\u017eivatele","datePublished":"2023-07-10T12:49:16+00:00","dateModified":"2023-12-21T14:34:16+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/"},"wordCount":1033,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["Uncategorized @cs"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/","url":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/","name":"Soukrom\u00ed u\u017eivatel\u016f mobil\u016f ohro\u017eeno | Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","datePublished":"2023-07-10T12:49:16+00:00","dateModified":"2023-12-21T14:34:16+00:00","description":"Zero-click exploit je zneu\u017eit\u00ed bezpe\u010dnostn\u00ed chyby v softwaru. Jde o velmi nebezpe\u010dnou techniku, kter\u00e1 m\u016f\u017ee m\u00edt zna\u010dn\u00fd dopad na bezpe\u010dnost a soukrom\u00ed u\u017eivatel\u016f p\u0159es mobil.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/rise-zero-click-exploit\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","width":1920,"height":1080,"caption":"Zero click exploit"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Nebezpe\u010dn\u00fd v\u00fdvoj: n\u00e1r\u016fst zero-click exploit\u016f se st\u00e1v\u00e1 hrozbou i pro b\u011b\u017en\u00e9 u\u017eivatele"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238","name":"Leona Dundrova","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","caption":"Leona Dundrova"},"url":"https:\/\/new.soitron.com\/cs\/author\/leona\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/52633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=52633"}],"version-history":[{"count":5,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/52633\/revisions"}],"predecessor-version":[{"id":54751,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/52633\/revisions\/54751"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/52634"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=52633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=52633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=52633"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=52633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}