{"id":17725,"date":"2016-11-09T13:15:07","date_gmt":"2016-11-09T12:15:07","guid":{"rendered":"https:\/\/beta.cybus.io\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/"},"modified":"2024-02-12T16:45:43","modified_gmt":"2024-02-12T15:45:43","slug":"could-industrial-iot-devices-be-part-of-a-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/","title":{"rendered":"Could industrial IoT devices be part of a DDoS attack?"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">It depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October, could also involve devices of industrial manufacturers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">First of all, not every industrial device is connected to the internet. Some aren\u2019t connected at all and most are connected to isolated networks, which have no connection to the internet for security reasons.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Now, questions might arise if it is really a good idea to connect every possible device, as industry 4.0 companies propagate. We don\u2019t have to stop this industrial revolution. However, the recent events show that connectivity is not as trivial as some companies think. We should question if the planned way of connectivity for our industrial devices is really the most secure one. Lots of industry 4.0 projects pay little attention to the connectivity at all. \u201eConnecting the devices\u201c is a task that should be accomplished along the way, but the focus lies more on tasks which seem to be more relevant for the aspired business case, or at least its visible parts, such as a great monitoring dashboard.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I would like to raise awareness. We neither want to get DDoS\u2019 by our toaster, nor by an elevator or by manufacturing robots. Therefore, I claim \u201eConnectivity first\u201c. The industry 4.0 revolution uses well-tested technology, which has been used for a while in other industries. Security is not a lack of tooling. It\u2019s a lack of priority. Don\u2019t take the cheapest available student and let him configure the cheapest Raspberry Pi with copy and paste software he found on Google. Don\u2019t be satisfied as soon as you have a somewhat working solution and spare the time for security architecture. Don\u2019t assume that network ports don\u2019t have to be secured when you are only opening them within your intranet. Don\u2019t even dare to assume that IP addresses are cryptic enough to act as a security feature. Don\u2019t trust every teenage open source snippet. Don\u2019t use default configurations for databases, MQTT brokers, even popular NodeRed, which usually allow full anonymous access. Don\u2019t expose unsecured, legacy protocols like ModBus to the open internet. We\u2019ve seen all of that in production.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The mechanism to prevent DDoS attacks are well known and tested by the web industry. Examples:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Traffic redirection into a blackhole<br>Intrusion prevention systems (IPS) to identify attacks with signatures<br>DDoS defense system (DDS) to block connection-based DDoS attacks<br>Firewall to block incoming traffic from attackers based on protocol, port or IP address<br>Routers &amp; Switches with rate-limitation and Access Control Layer<br>Upstream traffic filtering via Proxy<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While all of that is a hassle for you, a bunch of stones on your road, we at Cybus have decided to make this our core competence. If you want to make sure that your industrial devices are not part of the next IoT DDoS attack without missing the upcoming industrial revolution, then check out our middleware solution, which provides security and access control on data point level.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">Michael K\u00fchne-Schlinkert is former Head of Development at Cybus, working on Connectware to make it secure and reliable for the industry. Previously, he worked as an independent API specialist for many years on API design, software architecture, authorization standards, development processes and the implementation itself.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Michael K\u00fchne-Schlinkert, former Head of Develeopment at Cybus, is evaluating if IIoT devices could be part of a DDoS attack.<\/p>\n","protected":false},"author":5,"featured_media":18560,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[154],"tags":[],"class_list":["post-17725","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Could industrial IoT devices be part of a DDoS attack? | Cybus.io<\/title>\n<meta name=\"description\" content=\"t depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Could industrial IoT devices be part of a DDoS attack?\" \/>\n<meta property=\"og:description\" content=\"t depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybus.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybusgmbh\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-09T12:15:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T15:45:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/can-industrial-iot-devices-be-attacked-cyber-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lara Ludwigs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cybus_io\" \/>\n<meta name=\"twitter:site\" content=\"@cybus_io\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/\"},\"author\":{\"name\":\"Lara Ludwigs\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/person\\\/7dd0dcc74d898241116e06f83829f1ab\"},\"headline\":\"Could industrial IoT devices be part of a DDoS attack?\",\"datePublished\":\"2016-11-09T12:15:07+00:00\",\"dateModified\":\"2024-02-12T15:45:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/can-industrial-iot-devices-be-attacked-cyber-attack.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/\",\"name\":\"Could industrial IoT devices be part of a DDoS attack? | Cybus.io\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/can-industrial-iot-devices-be-attacked-cyber-attack.png\",\"datePublished\":\"2016-11-09T12:15:07+00:00\",\"dateModified\":\"2024-02-12T15:45:43+00:00\",\"description\":\"t depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/can-industrial-iot-devices-be-attacked-cyber-attack.png\",\"contentUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/can-industrial-iot-devices-be-attacked-cyber-attack.png\",\"width\":600,\"height\":350,\"caption\":\"Can industrial IoT devices be attacked by cyber attack?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/could-industrial-iot-devices-be-part-of-a-ddos-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Could industrial IoT devices be part of a DDoS attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/\",\"name\":\"Cybus.io\",\"description\":\"Real-time data flow for the Manufacturing Industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#organization\",\"name\":\"Cybus GmbH\",\"alternateName\":\"Cybus\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cropped-cybus-logo-bildmarke300x290.png\",\"contentUrl\":\"https:\\\/\\\/www.cybus.io\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cropped-cybus-logo-bildmarke300x290.png\",\"width\":512,\"height\":512,\"caption\":\"Cybus GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybusgmbh\\\/\",\"https:\\\/\\\/x.com\\\/cybus_io\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybus\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCkp33a41zYUZ1QwilQtfAUQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cybus.io\\\/en\\\/#\\\/schema\\\/person\\\/7dd0dcc74d898241116e06f83829f1ab\",\"name\":\"Lara Ludwigs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g\",\"caption\":\"Lara Ludwigs\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Could industrial IoT devices be part of a DDoS attack? | Cybus.io","description":"t depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"Could industrial IoT devices be part of a DDoS attack?","og_description":"t depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October.","og_url":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/","og_site_name":"Cybus.io","article_publisher":"https:\/\/www.facebook.com\/cybusgmbh\/","article_published_time":"2016-11-09T12:15:07+00:00","article_modified_time":"2024-02-12T15:45:43+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/can-industrial-iot-devices-be-attacked-cyber-attack.png","type":"image\/png"}],"author":"Lara Ludwigs","twitter_card":"summary_large_image","twitter_creator":"@cybus_io","twitter_site":"@cybus_io","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/"},"author":{"name":"Lara Ludwigs","@id":"https:\/\/www.cybus.io\/en\/#\/schema\/person\/7dd0dcc74d898241116e06f83829f1ab"},"headline":"Could industrial IoT devices be part of a DDoS attack?","datePublished":"2016-11-09T12:15:07+00:00","dateModified":"2024-02-12T15:45:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/"},"wordCount":560,"publisher":{"@id":"https:\/\/www.cybus.io\/en\/#organization"},"image":{"@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/can-industrial-iot-devices-be-attacked-cyber-attack.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/","url":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/","name":"Could industrial IoT devices be part of a DDoS attack? | Cybus.io","isPartOf":{"@id":"https:\/\/www.cybus.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/can-industrial-iot-devices-be-attacked-cyber-attack.png","datePublished":"2016-11-09T12:15:07+00:00","dateModified":"2024-02-12T15:45:43+00:00","description":"t depends, but: yes, it could. In the light of current events, I was asked if IoT DDoS attacks, such as the latest on DynDNS end of October.","breadcrumb":{"@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#primaryimage","url":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/can-industrial-iot-devices-be-attacked-cyber-attack.png","contentUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/02\/can-industrial-iot-devices-be-attacked-cyber-attack.png","width":600,"height":350,"caption":"Can industrial IoT devices be attacked by cyber attack?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybus.io\/en\/could-industrial-iot-devices-be-part-of-a-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.cybus.io\/en\/"},{"@type":"ListItem","position":2,"name":"Could industrial IoT devices be part of a DDoS attack?"}]},{"@type":"WebSite","@id":"https:\/\/www.cybus.io\/en\/#website","url":"https:\/\/www.cybus.io\/en\/","name":"Cybus.io","description":"Real-time data flow for the Manufacturing Industry","publisher":{"@id":"https:\/\/www.cybus.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybus.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cybus.io\/en\/#organization","name":"Cybus GmbH","alternateName":"Cybus","url":"https:\/\/www.cybus.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cybus.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/03\/cropped-cybus-logo-bildmarke300x290.png","contentUrl":"https:\/\/www.cybus.io\/wp-content\/uploads\/2022\/03\/cropped-cybus-logo-bildmarke300x290.png","width":512,"height":512,"caption":"Cybus GmbH"},"image":{"@id":"https:\/\/www.cybus.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cybusgmbh\/","https:\/\/x.com\/cybus_io","https:\/\/www.linkedin.com\/company\/cybus\/","https:\/\/www.youtube.com\/channel\/UCkp33a41zYUZ1QwilQtfAUQ"]},{"@type":"Person","@id":"https:\/\/www.cybus.io\/en\/#\/schema\/person\/7dd0dcc74d898241116e06f83829f1ab","name":"Lara Ludwigs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e0d1ba557d8129e681a18154c8868c047801e84168cfbe27d742cd0908dc971e?s=96&d=mm&r=g","caption":"Lara Ludwigs"}}]}},"_links":{"self":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/posts\/17725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/comments?post=17725"}],"version-history":[{"count":0,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/posts\/17725\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/media\/18560"}],"wp:attachment":[{"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/media?parent=17725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/categories?post=17725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybus.io\/en\/wp-json\/wp\/v2\/tags?post=17725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}