{"id":35595,"date":"2024-01-25T14:13:56","date_gmt":"2024-01-25T14:13:56","guid":{"rendered":"https:\/\/www.cyberguru.it\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/"},"modified":"2024-02-16T14:11:27","modified_gmt":"2024-02-16T14:11:27","slug":"google-accounts-hacked-another-taboo-is-broken","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/","title":{"rendered":"Google accounts hacked: another taboo is broken"},"content":{"rendered":"\n<p>Saying <a href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a> today means entering a world whose borders are difficult to see. <br\/>Some see it as <strong>a big brother in an Orwellian sense<\/strong>, a kind of entity that spies on our every move, knows our tastes, and collects our data. <br\/>The most optimistic consider the goals to be only economic, while for the doomsayers they are diabolical and seek the manipulation and control of the population.<\/p>\n\n<p>On the other hand, there are the fanatics, who are totally addicted to it, taking advantage of all the possibilities and services that this search engine makes available today. In short, those who hand over to Google and all its offshoots, the totality of their activities on the web, i.e., practically their lives, without making too much fuss, indeed happy to do so.<\/p>\n\n<p>Here, especially for the latter, which includes, let&#8217;s face it, many of us who spend so many hours in front of a monitor,<strong> one of the latest malware we are hearing about, discovered by <a href=\"https:\/\/www.cloudsek.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CloudSek<\/a> researchers, could be a serious concern<\/strong>.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-la-nuova-minaccia\">The new threat<\/h2>\n\n<p>This is a <strong>new threat that puts users&#8217; Google accounts at risk. <\/strong> <br\/>It does this by leveraging third-party cookies to gain unauthorised access to people&#8217;s private data, using a rather sophisticated method to circumvent defences.<\/p>\n\n<p>Last October, <strong>a hacker revealed the details of the operation on a Telegram group<\/strong>, showing a vulnerability linked to cookies, elements used by websites and browsers to monitor the user experience.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>The malware manages to recover Google&#8217;s authentication cookies, allowing criminals to bypass even two-factor authentication.<\/strong> <\/p>\n<\/blockquote>\n\n<p>So once an account is compromised, attackers can maintain continuous access to Google services, even following a password change by the victim.<\/p>\n\n<p><strong>A rude awakening for the victims, who find themselves practically blocked on all fronts, both at work and in everyday activities.<\/strong><\/p>\n\n<p>CloudSEK researchers stated that malware that steals information by abusing this function will now steal more tokens from Google Chrome.<\/p>\n\n<p>In addition to all authentication cookies for Google sites, these tokens also include a special token that can be used to update, or generate, new authentication tokens that replace expired ones, allowing access to accounts for a much longer period of time than normally permitted.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-la-reazione-di-google\">Google&#8217;s reaction<\/h2>\n\n<p>Google, on the other hand, downplayed the issue and reassured users in a statement issued to <a href=\"https:\/\/www.bleepingcomputer.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>: <\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Attacks involving malware that steals <em>cookies <\/em>and <em>tokens <\/em>are not new; we regularly update our defences against these techniques to protect malware victims. In this case, Google has taken steps to secure all the compromised accounts identified&#8221;.<\/p>\n<\/blockquote>\n\n<p>The search engine also proposes a solution that seems rather simplistic to some: suggesting that victims exit the Chrome browser or close all active sessions from the <a href=\"http:\/\/g.co\/mydevices\" target=\"_blank\" rel=\"noreferrer noopener\">g.co\/mydevices<\/a> page.<\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;In the meantime \u2013 Google recommends \u2013 users should continue to remove any malware from their computer and activate the <em><a href=\"https:\/\/myaccount.google.com\/account-enhanced-safe-browsing\" target=\"_blank\" rel=\"noreferrer noopener\">Enhanced Safe Browsing feature for your account<\/a><\/em> in Chrome to protect against phishing and malware downloads&#8221;.<\/p>\n<\/blockquote>\n\n<p>But the problem, according to some, is that <strong>most of the time, victims are unaware that they have been infected by this type of malware, at least until the abuse becomes apparent<\/strong>. It will therefore be difficult for them to know when to perform the various steps suggested by Google.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-il-caso-di-orange-espana\">The case of Orange Espa\u00f1a<\/h2>\n\n<p>In this regard, <strong> <a href=\"https:\/\/www.xataka.com\/empresas-y-economia\/ataque-a-orange-ha-dejado-al-descubierto-enorme-influencia-alguien-invisible-para-casi-todos-ripe-ncc\" target=\"_blank\" rel=\"noreferrer noopener\">the case of Orange Espa\u00f1a<\/a><\/strong>was reported. The second-largest Iberian mobile phone provider suffered an attack of this type on 3 January. <\/p>\n\n<p>A cyber criminal managed to steal a company employee&#8217;s administration password for the network equipment, and then access the <em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Routing_table#:~:text=A%20routing%20table%20is%20a,directly%20connected%20and%20remote%20networks.\" target=\"_blank\" rel=\"noreferrer noopener\">routing table<\/a> <\/em>that regulates the company&#8217;s traffic. However, no one noticed until the login details were used to access<strong> the company&#8217;s RIPE<\/strong><sup data-fn=\"47d61c5c-5422-4cc5-a2fb-6b0b51f9f9ce\" class=\"fn\"><a href=\"#47d61c5c-5422-4cc5-a2fb-6b0b51f9f9ce\" id=\"47d61c5c-5422-4cc5-a2fb-6b0b51f9f9ce-link\">1<\/a><\/sup><strong> account<\/strong>.<\/p>\n\n<p>According to information circulating on the net, Google claims to have identified the affected persons and to have warned them, but apart from that, it has so far taken no further steps to solve the problem.<\/p>\n\n<p>It almost seems, but this is only an interpretation, that the California-based giant with its headquarters in Mountain View does not quite know which way to turn and is holding back in giving definite answers.<\/p>\n\n<p><strong>In this very nebulous and entangled situation, the only clear thing is that the danger of our Google accounts being tampered with with serious consequences, especially in the professional sphere, is quite real. <\/strong><br\/>This not only gives cause for concern but also encourages us to be increasingly careful during our online activities.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-la-soluzione\">The solution<\/h2>\n\n<p>Once again, apart from the usual recommendations to create strong passwords and store them correctly, <strong>the real and radical solution has only one name: top-quality training<\/strong>. <\/p>\n\n<p>In order to pre-empt the moves of the criminals lurking around every virtual corner, companies must choose training platforms that are up to today&#8217;s challenge: to make their organisations immune to cyber-attacks and ready to defend themselves adequately at all times. <br\/><strong>A goal that can be easily achieved if each employee is provided with the appropriate knowledge and training tools to recognise and manage any type of attack. <\/strong><\/p>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Only this can guarantee effective and long-lasting protection for the entire company.<\/p>\n<\/blockquote>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Saying Google today means entering a world whose borders are difficult to see. Some see it as a big brother in an Orwellian sense, a kind of entity that spies on our every move, knows our tastes, and collects our data. The most optimistic consider the goals to be only economic, while for the doomsayers [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":35420,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[],"class_list":["post-35595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Google accounts hacked: another taboo is broken<\/title>\n<meta name=\"description\" content=\"According to a CloudSek report, accounts were compromised thanks to malware exploiting the MFA\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google accounts hacked: another taboo is broken\" \/>\n<meta property=\"og:description\" content=\"According to a CloudSek report, accounts were compromised thanks to malware exploiting the MFA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-25T14:13:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-16T14:11:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/01\/google-auth.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"Google accounts hacked: another taboo is broken\",\"datePublished\":\"2024-01-25T14:13:56+00:00\",\"dateModified\":\"2024-02-16T14:11:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/\"},\"wordCount\":846,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/google-auth.webp\",\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/\",\"name\":\"Google accounts hacked: another taboo is broken\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/google-auth.webp\",\"datePublished\":\"2024-01-25T14:13:56+00:00\",\"dateModified\":\"2024-02-16T14:11:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"According to a CloudSek report, accounts were compromised thanks to malware exploiting the MFA\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/google-auth.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/google-auth.webp\",\"width\":1200,\"height\":788,\"caption\":\"Account Google a Rischio\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/01\\\/25\\\/google-accounts-hacked-another-taboo-is-broken\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google accounts hacked: another taboo is broken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google accounts hacked: another taboo is broken","description":"According to a CloudSek report, accounts were compromised thanks to malware exploiting the MFA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/","og_locale":"en_US","og_type":"article","og_title":"Google accounts hacked: another taboo is broken","og_description":"According to a CloudSek report, accounts were compromised thanks to malware exploiting the MFA","og_url":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-01-25T14:13:56+00:00","article_modified_time":"2024-02-16T14:11:27+00:00","og_image":[{"width":1200,"height":788,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/01\/google-auth.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"simona derubis","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"Google accounts hacked: another taboo is broken","datePublished":"2024-01-25T14:13:56+00:00","dateModified":"2024-02-16T14:11:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/"},"wordCount":846,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/01\/google-auth.webp","articleSection":["Security Awareness"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/","url":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/","name":"Google accounts hacked: another taboo is broken","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/01\/google-auth.webp","datePublished":"2024-01-25T14:13:56+00:00","dateModified":"2024-02-16T14:11:27+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"According to a CloudSek report, accounts were compromised thanks to malware exploiting the MFA","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/01\/google-auth.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/01\/google-auth.webp","width":1200,"height":788,"caption":"Account Google a Rischio"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2024\/01\/25\/google-accounts-hacked-another-taboo-is-broken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Google accounts hacked: another taboo is broken"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/en\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/35595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=35595"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/35595\/revisions"}],"predecessor-version":[{"id":35596,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/35595\/revisions\/35596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/35420"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=35595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=35595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=35595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}