{"id":1171,"date":"2025-12-18T10:34:20","date_gmt":"2025-12-18T10:34:20","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=1171"},"modified":"2025-12-18T11:59:52","modified_gmt":"2025-12-18T11:59:52","slug":"top-10-data-breaches-of-2025","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/","title":{"rendered":"Top 10 Data Breaches of 2025"},"content":{"rendered":"<p><b>Top 10 Data Breaches of 2025<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The year 2025 marked one of the most volatile periods in cybersecurity history, with data breaches reaching unprecedented scale and sophistication across industries. From retail giants and financial platforms to media organizations and critical healthcare networks, attackers exploited vulnerabilities in cloud systems, third-party vendors and aging digital infrastructure to access millions of personal records worldwide. These incidents not only exposed sensitive information but also triggered executive upheavals, regulatory scrutiny, and a renewed urgency for stronger digital resilience. Together, 2025\u2019s largest breaches paint a stark picture of an evolving threat landscape and the growing challenges of safeguarding data in an increasingly interconnected world.<\/span><\/p>\n<p><b>16 Million Passwords Leaked<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: June 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 16 billion credentials<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the largest credential-stuffing datasets ever assembled emerged in June, aggregating stolen credentials from infostealer malware, historical breaches, and massive password reuse across platforms such as Google, Apple, and Facebook. While this wasn\u2019t a singular attack but rather cumulative records discovered since the beginning of the year, it still highlights the importance of good security practices.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Passwords alone are obsolete. MFA and credential hygiene are mandatory, not optional.<\/span><\/p>\n<p><b>SK Telecom Malware Intrusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: April 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 27 million users<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Attackers deployed a stealthy Linux-based RAT (BPFDoor) across 28 servers, exploiting the Berkeley Packet Filter (BPF) mechanism in the Linux kernel to monitor and manipulate network traffic. SIM data, IMSI numbers, and authentication keys were exposed. The breach was believed to be the work of an advanced persistent threat (APT) group, potentially linked to Chinese or North Korean actors, although definitive attribution has not been established.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SK Telecom was fined $96.9M, and the attack was attributed to state-sponsored APT actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Advanced threats exploit low-level visibility gaps &#8211; Linux servers and telecom stacks are not exempt.<\/span><\/p>\n<p><b>Red Hat GitLab Repository Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: October 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 570 GB, 28,000 repositories<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threat group Crimson Collective exfiltrated sensitive data across thousands of internal repositories, leaking credentials, API keys, VPN configs, and customer infrastructure details tied to major enterprises and government agencies. The attackers claimed to have exfiltrated 570GB of compressed data from over 28,000 repositories, including sensitive Customer Engagement Reports (CERs) affecting approximately 800 organizations worldwide.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Source control platforms are high-value targets when access isn\u2019t continuously audited.<\/span><\/p>\n<p><b>Qantas Data Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: June 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 5.7 million records<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A third-party Salesforce integration was exploited to access customer personally identifiable information (PII) and frequent flyer data. The attack was confirmed after ransom demands went unpaid and was claimed by Scattered Lapsus$ Hunters. The airline was one of more than 40 firms globally caught up in the hack, reported to contain up to 1bn customer records.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Your third-party stack defines your real attack surface.<\/span><\/p>\n<p><b>Allianz Life Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: July 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 2.8 million records<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Attackers used social engineering to access Salesforce, a cloud-based CRM, then leveraged legitimate Salesforce admin features to export sensitive customer data. Contained within 24 hours, but damage was already done. The ShinyHunters threat group is notorious for advanced vishing attacks that exploit human error to gain Salesforce CRM access, bypassing technical defences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: \u201cLegitimate access\u201d is the most dangerous access when abused.<\/span><\/p>\n<p><b>TransUnion Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: July 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 4.4 million records<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sensitive personal information belonging to 4.4 million customers, including their names and Social Security numbers, was exposed in a data breach on credit bureau TransUnion which was yet another cyber attack targeting companies&#8217; Salesforce databases. Sensitive personal information belonging to 4.4 million customers, including their names and Social Security numbers, was exposed in a data breach on credit bureau TransUnion, in what is believed to be the latest in a string of attacks targeting companies&#8217; Salesforce databases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: APIs are silent data exfiltration channels when misconfigured.<\/span><\/p>\n<p><b>Farmers Insurance Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: August 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 1.1 million records<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A third-party vendor\u2019s overprivileged Salesforce integration enabled data extraction at scale. Public disclosure was delayed for nearly three months. The third-party vendor had monitoring tools in place, which allowed the vendor to quickly detect the activity and take appropriate containment measures, including blocking the unauthorized actor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Vendor access must be treated as internal risk and governed accordingly.<\/span><\/p>\n<p><b>Yale New Haven Health System Breach<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: March 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 5.5 million patients<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yale New Haven Health System (YNHHS) experienced a massive data breach in March 2025, affecting over 5.5 million individuals, exposing sensitive data like names, Social Security numbers, and health info, stemming from a misconfigured storage server, leading to significant investigations, class-action lawsuits, and an $18 million settlement for victims, as reported in late 2025.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Healthcare data is only as secure as the weakest external service.<\/span><\/p>\n<p><b>Blue Shield of California Exposure<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: April 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: 4.7 million records<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Blue Shield of California experienced a major data breach (not a traditional hack) where misconfigured Google Analytics tools shared private health info (PHI) of 4.7M members with Google Ads from April 2021 to January 2024, including names, plan details, claim dates, and &#8220;Find a Doctor&#8221; searches, but not SSNs or financial data, leading to potential ad targeting and class action lawsuits, prompting Blue Shield to halt the sharing and notify members.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Client-side tracking and analytics tools can be breach vectors.<\/span><\/p>\n<p><b>Marks &amp; Spencer Ransomware Attack<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Date: April 2025<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Impact: \u00a3300 million in losses<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Marks &amp; Spencer (M&amp;S) suffered a major ransomware attack, attributed to the Scattered Spider\/DragonForce group, starting in April 2025, which crippled its online sales for months, emptied some store shelves, cost millions in lost revenue (estimated \u00a3300m hit), and involved data theft, prompting warnings about phishing for customers. Attackers used social engineering via a third-party IT supplier (Tata Consultancy Services) to breach the network, deploying DragonForce ransomware for double extortion (encryption + data theft).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key takeaway: Identity compromise is the gateway to ransomware.<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><b>Monitoring Remote Sessions<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security monitoring is crucial for preventing ransomware attacks as it enables early detection, identification of vulnerabilities, monitoring for anomalies, data protection, and compliance with regulatory requirements.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">RecordTS<\/span><\/a><span style=\"font-weight: 400;\"> will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top 10 Data Breaches of 2025 The year 2025 marked one of the most volatile periods in cybersecurity history, with data breaches reaching unprecedented scale and sophistication across industries. From retail giants and financial platforms to media organizations and critical healthcare networks, attackers exploited vulnerabilities in cloud systems, third-party vendors and aging digital infrastructure to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 10 Data Breaches of 2025 - Blogs<\/title>\n<meta name=\"description\" content=\"In 2025, cybersecurity saw extreme volatility as massive, sophisticated data breaches struck industries worldwide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 Data Breaches of 2025 - Blogs\" \/>\n<meta property=\"og:description\" content=\"In 2025, cybersecurity saw extreme volatility as massive, sophisticated data breaches struck industries worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-18T10:34:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T11:59:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1043\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/\",\"name\":\"Top 10 Data Breaches of 2025 - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg\",\"datePublished\":\"2025-12-18T10:34:20+00:00\",\"dateModified\":\"2025-12-18T11:59:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"In 2025, cybersecurity saw extreme volatility as massive, sophisticated data breaches struck industries worldwide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg\",\"width\":1920,\"height\":1043,\"caption\":\"2025 top 10 data breaches\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 Data Breaches of 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 10 Data Breaches of 2025 - Blogs","description":"In 2025, cybersecurity saw extreme volatility as massive, sophisticated data breaches struck industries worldwide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 Data Breaches of 2025 - Blogs","og_description":"In 2025, cybersecurity saw extreme volatility as massive, sophisticated data breaches struck industries worldwide.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-12-18T10:34:20+00:00","article_modified_time":"2025-12-18T11:59:52+00:00","og_image":[{"width":1920,"height":1043,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/","name":"Top 10 Data Breaches of 2025 - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg","datePublished":"2025-12-18T10:34:20+00:00","dateModified":"2025-12-18T11:59:52+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"In 2025, cybersecurity saw extreme volatility as massive, sophisticated data breaches struck industries worldwide.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/12\/databreaches.jpg","width":1920,"height":1043,"caption":"2025 top 10 data breaches"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-10-data-breaches-of-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Top 10 Data Breaches of 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=1171"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1171\/revisions"}],"predecessor-version":[{"id":1175,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1171\/revisions\/1175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/1173"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=1171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=1171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=1171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}