{"id":54297,"date":"2023-07-10T13:49:16","date_gmt":"2023-07-10T12:49:16","guid":{"rendered":"https:\/\/www.soitron.com\/narust-zero-click-exploitu\/"},"modified":"2023-12-21T15:36:13","modified_gmt":"2023-12-21T14:36:13","slug":"narust-zero-click-exploitu","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/sk\/narust-zero-click-exploitu\/","title":{"rendered":"Nebezpe\u010dn\u00fd v\u00fdvoj: n\u00e1rast zero-click exploitov sa st\u00e1va hrozbou aj pre be\u017en\u00fdch u\u017e\u00edvate\u013eov"},"content":{"rendered":"\n<p><strong>Kybernetick\u00e9 \u00fatoky prostredn\u00edctvom zero-click exploitov nie s\u00fa ni\u010d\u00edm nov\u00fdm. \u010co v\u0161ak je nov\u00fdm trendom, je to, \u017ee cie\u013eom sa st\u00e1vaj\u00fa u\u017e aj be\u017en\u00ed u\u017e\u00edvatelia.<\/strong><\/p>\n\n\n\n<p>Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9re, ktor\u00e9 umo\u017e\u0148uje \u00fato\u010dn\u00edkovi vzdialene vykona\u0165 \u00fatok na zariadenie bez interakcie u\u017e\u00edvate\u013ea. T\u00e1to technika m\u00f4\u017ee by\u0165 pou\u017eit\u00e1 na \u0161pion\u00e1\u017e, ovl\u00e1dnutie zariadenia, \u0161\u00edrenie malw\u00e9ru, ba dokonca vydieranie. Celkovo ide o ve\u013emi nebezpe\u010dn\u00fa techniku, ktor\u00e1 m\u00f4\u017ee ma\u0165 zna\u010dn\u00fd dopad na bezpe\u010dnos\u0165 a s\u00fakromie u\u017e\u00edvate\u013eov. Zlou spr\u00e1vou je, \u017ee proti t\u00fdmto \u00fatokom sa m\u00f4\u017eu u\u017e\u00edvatelia len ve\u013emi obmedzene br\u00e1ni\u0165.<\/p>\n\n\n\n<p><em>\u201eFakt, \u017ee po\u010dty skup\u00edn, \u0161pecializuj\u00facich sa na tento druh \u00fatoku, narastaj\u00fa, je ve\u013emi znepokojuj\u00faci. \u00dato\u010dn\u00edci si osvojili techniky, predt\u00fdm vyu\u017e\u00edvan\u00e9 iba vysoko profilovan\u00fdmi zlo\u017ekami, ako s\u00fa napr\u00edklad \u0161t\u00e1tne \u010di vl\u00e1dne organiz\u00e1cie a tajn\u00e9 slu\u017eby. Kyberzlo\u010dinci vyu\u017e\u00edvaj\u00fa model, kedy ich pred\u00e1vaj\u00fa za jednorazov\u00fa platbu (Exploit as a Service), na napadnutie s\u00fakromn\u00e9ho sektora, respekt\u00edve be\u017en\u00fdch u\u017e\u00edvate\u013eov, teda nielen vysoko postaven\u00fdch alebo politicky exponovan\u00fdch os\u00f4b, vl\u00e1dnych organiz\u00e1ci\u00ed a \u010fal\u0161\u00edch cie\u013eov s cenn\u00fdmi inform\u00e1ciami,\u201c<\/em> <strong>uv\u00e1dza Petr Kocmich, Global Cyber Security Delivery Manager spolo\u010dnosti Soitron.<\/strong> Preto je pod\u013ea neho d\u00f4le\u017eit\u00e9, aby nielen podniky, ale aj u\u017e\u00edvatelia dodr\u017eiavali met\u00f3dy a postupy najlep\u0161ej praxe, odpor\u00fa\u010dan\u00e9 v oblasti kybernetickej bezpe\u010dnosti, a starali sa o ochranu svojich zariaden\u00ed pred pr\u00edpadn\u00fdmi \u00fatokmi.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dopad zranite\u013enost\u00ed<\/h2>\n\n\n\n<p>Jedn\u00fdm z najzn\u00e1mej\u0161\u00edch a dobre pop\u00edsan\u00fdm zero-click exploitom bol spyware ENDOFDAYS, ktor\u00fd sl\u00fa\u017eil ku kompromit\u00e1ci\u00ed iPhonov, konkr\u00e9tne pozv\u00e1nok v iCloud kalend\u00e1ri. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eENDOFDAYS je uk\u00e1\u017ekov\u00fdm pr\u00edpadom, kedy bez nutnosti akejko\u013evek interakcie zo strany u\u017e\u00edvate\u013ea, \u00fato\u010dn\u00edk dok\u00e1\u017ee ovl\u00e1dnu\u0165 cel\u00e9 zariadenie. A to vr\u00e1tane exfiltr\u00e1cie nahr\u00e1vok hovorov, v\u010faka pr\u00edstupu k mikrof\u00f3nu, a ovl\u00e1dnutia pr\u00edstupu k GPS lok\u00e1cii zariaden\u00ed. \u00dato\u010dn\u00edk \u010falej z\u00edska pr\u00edstup k prednej aj zadnej kamere, mo\u017enos\u0165 preh\u013ead\u00e1vania s\u00faborov v zariaden\u00ed a maskovania samotn\u00e9ho spyware, aby nedo\u0161lo k jeho odhaleniu. Samotn\u00fd spyware sa do zariadenia dostane celkom trivi\u00e1lnou cestou \u2013 a to odoslan\u00edm \u0161peci\u00e1lne vytvorenej pozv\u00e1nky do iCloud kalend\u00e1ra, so star\u0161\u00edmi \u010dasov\u00fdmi pe\u010diatkami (pozv\u00e1nka, ktor\u00e1 u\u017e prebehla v\u00a0minulosti),\u201c<\/em><strong> <\/strong>popisuje Petr Kocmich.<\/p>\n<\/blockquote>\n\n\n\n<p>Tak\u00e1to pozv\u00e1nka je automaticky pridan\u00e1 do kalend\u00e1ra u\u017e\u00edvate\u013ea bez ak\u00e9hoko\u013evek upozornenia alebo v\u00fdzvy, \u010do umo\u017e\u0148uje, aby exploit ENDOFDAYS be\u017eal bez interakcie u\u017e\u00edvate\u013ea a \u00fatoky boli neodhalite\u013en\u00e9. Zranite\u013enos\u0165 bola v nov\u00fdch verzi\u00e1ch syst\u00e9mu opraven\u00e1, ale chyba sa t\u00fdkala v\u0161etk\u00fdch verzi\u00ed iOS od verzie 1.4 a\u017e po verziu 14.4.2 a pod\u013ea inform\u00e1ci\u00ed vypl\u00fdvaj\u00facich z v\u00fdskumu, boli akt\u00edvne zneu\u017e\u00edvan\u00e9 predov\u0161etk\u00fdm v roku 2021.<\/p>\n\n\n\n<p>Napriek tomu sa i dnes objavuj\u00fa pokro\u010dil\u00e9 aplik\u00e1cie, ktor\u00e9 sa vedia vyhn\u00fa\u0165 detekcii a zamera\u0165 sa na konkr\u00e9tnu zranite\u013enos\u0165. <em>\u201eTu sa jasne ukazuje aj to, pre\u010do je potrebn\u00e9 zariadenie pravidelne aktualizova\u0165. Zero-click exploit toti\u017e m\u00f4\u017ee by\u0165 pr\u00edtomn\u00fd v zariaden\u00ed neobmedzene dlh\u00fa dobu, bez toho, aby o tom u\u017e\u00edvate\u013e vedel. Preto je nutn\u00e9 dodr\u017eiava\u0165 z\u00e1sady kybernetickej bezpe\u010dnosti a zaisti\u0165, aby bol softv\u00e9r v\u017edy aktu\u00e1lny a aby boli pou\u017eit\u00e9 \u010fal\u0161ie bezpe\u010dnostn\u00e9 opatrenia,<\/em>\u201c<strong> <\/strong>upozor\u0148uje Petr Kocmich.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ter\u010dom s\u00fa aj \u010fal\u0161\u00ed<\/h2>\n\n\n\n<p>Pre Apple to v\u0161ak nie je prv\u00fd a ani posledn\u00fd objaven\u00fd pr\u00edklad zero-click exploitu. Napr\u00edklad v roku 2020 bola odhalen\u00e1 chyba v aplik\u00e1cii iMessage, ktor\u00fa mohli \u00fato\u010dn\u00edci vyu\u017ei\u0165 k vzdialen\u00e9mu spusteniu \u0161kodliv\u00e9ho k\u00f3du na zariadeniach u\u017e\u00edvate\u013eov, bez toho, aby bolo treba klikn\u00fa\u0165 na odkaz alebo otvori\u0165 pr\u00edlohu. Tieto chyby sa v\u0161ak z\u010faleka nevyh\u00fdbaj\u00fa ani konkuren\u010dn\u00e9mu opera\u010dn\u00e9mu syst\u00e9mu Android a ani jednotliv\u00fdm mobiln\u00fdm aplik\u00e1ci\u00e1m.<\/p>\n\n\n\n<p><em>\u201eO niektor\u00fdch zneu\u017eite\u013en\u00fdch zranite\u013enostiach v aktu\u00e1lnych verzi\u00e1ch opera\u010dn\u00fdch syst\u00e9mov a aplik\u00e1ci\u00e1ch e\u0161te ani nevieme, hoci m\u00f4\u017eu by\u0165 u\u017e zneu\u017e\u00edvan\u00e9. Pokia\u013e sa na tieto zranite\u013enosti nepr\u00edde, m\u00f4\u017eu by\u0165 najprv vyu\u017e\u00edvan\u00e9 pre \u00fa\u010dely \u0161pion\u00e1\u017ee a \u201evy\u0161\u0161\u00edch z\u00e1ujmov\u201c, nesk\u00f4r spe\u0148a\u017een\u00e9 formou predaja Exploit as a Service slu\u017eby z\u00e1kazn\u00edkom na Dark Webe\u201c<\/em> dod\u00e1va Petr Kocmich.<strong> <\/strong>Ukazuje sa teda, \u017ee aj be\u017en\u00ed u\u017e\u00edvatelia m\u00f4\u017eu by\u0165 ohrozen\u00ed zero-click exploitom.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sofistikovanos\u0165 \u00fato\u010dn\u00edkov sa zvy\u0161uje<\/h2>\n\n\n\n<p>Zero-click \u00fatoky s\u00fa obvykle zalo\u017een\u00e9 na chyb\u00e1ch v softv\u00e9re, a to vr\u00e1tane opera\u010dn\u00fdch syst\u00e9mov, aplik\u00e1ci\u00ed a slu\u017eieb. Nezodpovedanou ot\u00e1zkou v\u0161ak zost\u00e1va to, \u010di ide len o chyby alebo nie\u010d\u00ed \u00famysel.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201e\u010c\u00edm r\u00fdchlej\u0161ie sa nov\u00fd softv\u00e9r vyv\u00edja, t\u00fdm viac rastie snaha o riadenie a zabezpe\u010denie k\u00f3du a cel\u00e9ho softv\u00e9rov\u00e9ho v\u00fdvojov\u00e9ho cyklu. Automatizujeme testovanie, zara\u010fujeme dodato\u010dn\u00e9 bezpe\u010dnostn\u00e9 testy v rannom \u0161t\u00e1diu v\u00fdvoja (Shift-Left do CI-CD pipeline), vykon\u00e1vame statick\u00fa a dynamick\u00fa kontrolu k\u00f3du, vyu\u017e\u00edvame umel\u00fa inteligenciu k doh\u013eadaniu ch\u00fdb v k\u00f3de, v\u00fdsledn\u00fd celok podrob\u00edme automatizovan\u00e9mu, ale aj manu\u00e1lnemu penetra\u010dn\u00e9mu testovaniu, av\u0161ak bolo by pochab\u00e9 sa domnieva\u0165, \u017ee v\u0161etky typy zranite\u013enost\u00ed vznikaj\u00fa len be\u017en\u00fdmi chybami v k\u00f3de a potom sa teda nat\u00edska ot\u00e1zka, \u010di nie s\u00fa niektor\u00e9 zranite\u013enosti sk\u00f4r z\u00e1mern\u00fdmi zadn\u00fdmi dvierkami, sl\u00fa\u017eiacimi na konkr\u00e9tne \u00fa\u010dely,<\/em>\u201c zakon\u010duje Petr Kocmich.<\/p>\n<\/blockquote>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kybernetick\u00e9 \u00fatoky prostredn\u00edctvom zero-click exploitov nie s\u00fa ni\u010d\u00edm nov\u00fdm. \u010co v\u0161ak je nov\u00fdm trendom, je to, \u017ee cie\u013eom sa st\u00e1vaj\u00fa u\u017e aj be\u017en\u00ed u\u017e\u00edvatelia. Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9re, ktor\u00e9 umo\u017e\u0148uje \u00fato\u010dn\u00edkovi vzdialene vykona\u0165 \u00fatok na zariadenie bez interakcie u\u017e\u00edvate\u013ea. T\u00e1to technika m\u00f4\u017ee by\u0165 pou\u017eit\u00e1 na \u0161pion\u00e1\u017e, ovl\u00e1dnutie zariadenia, \u0161\u00edrenie malw\u00e9ru, ba [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":52636,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[538],"news_categories":[370],"class_list":["post-54297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nezaradene","tag-kyberneticka-bezpecnost-cs-sk","news_categories-bezpecnost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00fakromie mobiln\u00fdch u\u017e\u00edvate\u013eov v ohrozen\u00ed | Soitron<\/title>\n<meta name=\"description\" content=\"Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9ri. Ide o ve\u013emi nebezpe\u010dn\u00fa techniku, ktor\u00e1 m\u00f4\u017ee ma\u0165 zna\u010dn\u00fd vplyv na bezpe\u010dnos\u0165 a s\u00fakromie pou\u017e\u00edvate\u013eov cez mobil.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00fakromie mobiln\u00fdch u\u017e\u00edvate\u013eov v ohrozen\u00ed | Soitron\" \/>\n<meta property=\"og:description\" content=\"Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9ri. Ide o ve\u013emi nebezpe\u010dn\u00fa techniku, ktor\u00e1 m\u00f4\u017ee ma\u0165 zna\u010dn\u00fd vplyv na bezpe\u010dnos\u0165 a s\u00fakromie pou\u017e\u00edvate\u013eov cez mobil.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/rise-zero-click-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T12:49:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-21T14:36:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leona Dundrova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leona Dundrova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 min\u00fat\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00fakromie mobiln\u00fdch u\u017e\u00edvate\u013eov v ohrozen\u00ed | Soitron","description":"Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9ri. Ide o ve\u013emi nebezpe\u010dn\u00fa techniku, ktor\u00e1 m\u00f4\u017ee ma\u0165 zna\u010dn\u00fd vplyv na bezpe\u010dnos\u0165 a s\u00fakromie pou\u017e\u00edvate\u013eov cez mobil.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"sk_SK","og_type":"article","og_title":"S\u00fakromie mobiln\u00fdch u\u017e\u00edvate\u013eov v ohrozen\u00ed | Soitron","og_description":"Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9ri. Ide o ve\u013emi nebezpe\u010dn\u00fa techniku, ktor\u00e1 m\u00f4\u017ee ma\u0165 zna\u010dn\u00fd vplyv na bezpe\u010dnos\u0165 a s\u00fakromie pou\u017e\u00edvate\u013eov cez mobil.","og_url":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/","og_site_name":"Soitron","article_published_time":"2023-07-10T12:49:16+00:00","article_modified_time":"2023-12-21T14:36:13+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","type":"image\/jpeg"}],"author":"Leona Dundrova","twitter_card":"summary_large_image","twitter_misc":{"Autor":"Leona Dundrova","Predpokladan\u00fd \u010das \u010d\u00edtania":"5 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/"},"author":{"name":"Leona Dundrova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238"},"headline":"Nebezpe\u010dn\u00fd v\u00fdvoj: n\u00e1rast zero-click exploitov sa st\u00e1va hrozbou aj pre be\u017en\u00fdch u\u017e\u00edvate\u013eov","datePublished":"2023-07-10T12:49:16+00:00","dateModified":"2023-12-21T14:36:13+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/"},"wordCount":1016,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/","url":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/","name":"S\u00fakromie mobiln\u00fdch u\u017e\u00edvate\u013eov v ohrozen\u00ed | Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","datePublished":"2023-07-10T12:49:16+00:00","dateModified":"2023-12-21T14:36:13+00:00","description":"Zero-click exploit je zneu\u017eitie bezpe\u010dnostnej chyby v softv\u00e9ri. Ide o ve\u013emi nebezpe\u010dn\u00fa techniku, ktor\u00e1 m\u00f4\u017ee ma\u0165 zna\u010dn\u00fd vplyv na bezpe\u010dnos\u0165 a s\u00fakromie pou\u017e\u00edvate\u013eov cez mobil.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/rise-zero-click-exploit\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/07\/Zero-click-exploit.jpg","width":1920,"height":1080,"caption":"Zero click exploit"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/rise-zero-click-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Nebezpe\u010dn\u00fd v\u00fdvoj: n\u00e1rast zero-click exploitov sa st\u00e1va hrozbou aj pre be\u017en\u00fdch u\u017e\u00edvate\u013eov"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s viac ako 30 ro\u010dnou trad\u00edciou.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238","name":"Leona Dundrova","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","caption":"Leona Dundrova"},"url":"https:\/\/new.soitron.com\/sk\/author\/leona\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/54297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/comments?post=54297"}],"version-history":[{"count":5,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/54297\/revisions"}],"predecessor-version":[{"id":54753,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/54297\/revisions\/54753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media\/52636"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media?parent=54297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/categories?post=54297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/tags?post=54297"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/news_categories?post=54297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}