{"id":729,"date":"2023-01-31T11:17:18","date_gmt":"2023-01-31T11:17:18","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=729"},"modified":"2023-03-08T10:14:27","modified_gmt":"2023-03-08T10:14:27","slug":"chatgpt-and-its-threat-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/","title":{"rendered":"ChatGPT and Its Threat to Cybersecurity\u00a0"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried. There are already concerns from its college essay writing ability to StackOverflow&#8217;s recent ban on ChatGPT-generated answers to coding questions. In addition, ChatGPT has already demonstrated its ability to create content which is useful for creating malware as well as phishing emails. The circumstances in which this works are limited at present, but given that artificial intelligence (AI) chatbots are still in their infancy there are potentially serious long-term implications.<\/span><\/p>\n<p><b>What is ChatGPT?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">ChatGPT is a natural language processing tool driven by AI technology that allows you to have human-like conversations and much more with a chatbot. The language model can answer questions, and assist you with tasks such as writing emails, essays, and code. Usage is currently open to the public free of charge because ChatGPT is in its research and feedback-collection phase.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">OpenAI trained the language model by using Reinforcement Learning from Human Feedback (RLHF), according to OpenAI. Human AI trainers provided the model with conversations in which they played both parts, the user and AI assistants.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lensa AI, another online programme which creates digital images from text, was the previous online AI tool to make a big splash. The results were enthusiastically embraced by many, however those in the digital art community were not very happy that their work, which was used to train these models, is now being used against them and without their consent.<\/span><\/p>\n<p><b>Malware<\/b><\/p>\n<p><span style=\"font-weight: 400;\">OpenAI has included some fairly rigorous safeguards that prevent it, in theory, from being used for malicious purposes. This is done by filtering content to look for phrases that suggest someone is attempting to put it to such use. Its parameters prevent it from doing straightforwardly malicious things, like detailing how to build a bomb or writing malicious code. However multiple researchers have found a way to bypass those protections.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Developers have tried various ways to bypass the security protocols and succeeded to get the desired output. If a prompt is detailed enough to explain to the bot steps of writing the malware instead of a direct prompt, it will answer the prompt, effectively constructing malware on demand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Considering there are already criminal groups offering malware-as-a-service, with the assistance of an AI program such as ChatGPT, it may soon become quicker and easier for attackers to launch cyberattacks with the help of AI-generated code. ChatGPT has given the power to even less experienced attackers to be able to write a more accurate malware code, which previously could only be done by experts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dr. Suleyman Ozarslan, a security researcher and co-founder of Picus Security, said he was able to get the program to perform a number of offensive and defensive cybersecurity tasks, including the creation of a World Cup-themed email in \u201cperfect English\u201d as well as generate both Sigma detection rules to spot cybersecurity anomalies and evasion code that can bypass detection rules. Ozarslan was also able to trick the program into writing ransomware for Mac operating systems, despite specific terms of use that prohibit the practice.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other cybersecurity experts have pointed out the potential to make it faster and easier for experienced hackers and scammers to carry out cybercrimes, if they could figure out the right questions to ask the bot.<\/span><\/p>\n<p><b>Phishing<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Security experts believe that ChatGPT\u2019s ability to write legitimate-sounding phishing emails, the most popular course for ransomware, will see the chatbot widely embraced by cybercriminals, particularly those who are not native English speakers. Chester Wisniewski, a principal research scientist at Sophos, said it\u2019s easy to see ChatGPT being abused for \u201call sorts of social engineering attacks\u201d where the perpetrators want to appear to write in a more convincing American English.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAt a basic level, I have been able to write some great phishing lures with it, and I expect it could be utilized to have more realistic interactive conversations for business email compromise and even attacks over Facebook Messenger, WhatsApp, or other chat apps,\u201d Wisniewski told TechCrunch. A malicious actor can add as many variations to the prompt, such as &#8220;making the email look urgent,&#8221; &#8220;email with a high likelihood of recipients clicking on the link,&#8221; &#8220;social engineering email request on wire transfer,&#8221; and so on.<\/span><\/p>\n<p><b>Cybersecurity Defense\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Researchers have been able to leverage the program to unlock capabilities that could make life easier for both cybersecurity defenders and malicious hackers. The dual-use nature of the program has spurred some comparisons to programs Cobalt Strike and Metasploit, which function both as legitimate penetration testing and adversary simulation software while also serving as some of the most popular tools for real cybercriminals and malicious hacking groups to break into victim systems.<\/span><\/p>\n<p><b>Monitoring Remote Sessions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v6 will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.tsfactory.com\/\">Click here<\/a> to learn more about secure remote session recording.<\/span><\/p>\n<p><b>Sources<\/b><\/p>\n<p><a href=\"https:\/\/cyberscoop.com\/chatgpt-ai-malware\/\"><b>https:\/\/cyberscoop.com\/chatgpt-ai-malware\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/omdia\/chatgpt-artificial-intelligence-an-upcoming-cybersecurity-threat-\"><b>https:\/\/www.darkreading.com\/omdia\/chatgpt-artificial-intelligence-an-upcoming-cybersecurity-threat-<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2023\/01\/25\/how-dangerous-are-chatgpt-and-natural-language-technology-for-cybersecurity\/?sh=5b82b96f4aa6\"><b>https:\/\/www.forbes.com\/sites\/bernardmarr\/2023\/01\/25\/how-dangerous-are-chatgpt-and-natural-language-technology-for-cybersecurity\/?sh=5b82b96f4aa6<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/analysis\/emerging-technology\/how-chatgpt-is-changing-the-way-cybersecurity-practitioners-look-at-the-potential-of-ai\"><b>https:\/\/www.scmagazine.com\/analysis\/emerging-technology\/how-chatgpt-is-changing-the-way-cybersecurity-practitioners-look-at-the-potential-of-ai<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.cbc.ca\/news\/science\/chatgpt-cybercriminals-warning-1.6710854\"><b>https:\/\/www.cbc.ca\/news\/science\/chatgpt-cybercriminals-warning-1.6710854<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/could-ai-chatbots-become-a-security-risk-chatgpt-demonstrates-ability-to-find-vulnerabilities-in-smart-contracts-write-malicious-code\/\"><b>https:\/\/www.cpomagazine.com\/cyber-security\/could-ai-chatbots-become-a-security-risk-chatgpt-demonstrates-ability-to-find-vulnerabilities-in-smart-contracts-write-malicious-code\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/techcrunch.com\/2023\/01\/11\/chatgpt-cybersecurity-threat\/\"><b>https:\/\/techcrunch.com\/2023\/01\/11\/chatgpt-cybersecurity-threat\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/what-is-chatgpt-and-why-does-it-matter-heres-everything-you-need-to-know\/\"><b>https:\/\/www.zdnet.com\/article\/what-is-chatgpt-and-why-does-it-matter-heres-everything-you-need-to-know\/<\/b><\/a><\/p>\n<p><b>https:\/\/www.tsfactory.com\/forums\/blogs\/7-different-types-of-hackers-black-white-red-beyond\/<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried. There are already concerns from its college essay writing ability to StackOverflow&#8217;s recent ban on ChatGPT-generated answers to coding questions. In addition, ChatGPT has already demonstrated its [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ChatGPT and Its Threat to Cybersecurity\u00a0 - Blogs<\/title>\n<meta name=\"description\" content=\"While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ChatGPT and Its Threat to Cybersecurity\u00a0 - Blogs\" \/>\n<meta property=\"og:description\" content=\"While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-31T11:17:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T10:14:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"851\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/\",\"name\":\"ChatGPT and Its Threat to Cybersecurity\u00a0 - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg\",\"datePublished\":\"2023-01-31T11:17:18+00:00\",\"dateModified\":\"2023-03-08T10:14:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg\",\"width\":1280,\"height\":851},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ChatGPT and Its Threat to Cybersecurity\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ChatGPT and Its Threat to Cybersecurity\u00a0 - Blogs","description":"While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"ChatGPT and Its Threat to Cybersecurity\u00a0 - Blogs","og_description":"While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2023-01-31T11:17:18+00:00","article_modified_time":"2023-03-08T10:14:27+00:00","og_image":[{"width":1280,"height":851,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/","name":"ChatGPT and Its Threat to Cybersecurity\u00a0 - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg","datePublished":"2023-01-31T11:17:18+00:00","dateModified":"2023-03-08T10:14:27+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"While ChatGPT has been the new favorite toy of the internet since its release late last year, it has had those who work in the cybersecurity industry worried.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2023\/01\/pexels-miguel-a-padrinan-1111369.jpg","width":1280,"height":851},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/chatgpt-and-its-threat-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"ChatGPT and Its Threat to Cybersecurity\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=729"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/729\/revisions"}],"predecessor-version":[{"id":749,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/729\/revisions\/749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/731"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}