{"id":6750,"date":"2018-06-19T15:26:00","date_gmt":"2018-06-19T07:26:00","guid":{"rendered":"https:\/\/version-2.com\/?p=6750"},"modified":"2020-11-04T13:23:13","modified_gmt":"2020-11-04T05:23:13","slug":"eset-threat-intelligence-data-improves-detection","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2018\/06\/eset-threat-intelligence-data-improves-detection\/","title":{"rendered":"ESET Threat Intelligence data improves detection"},"content":{"rendered":"<p>A test conducted by&nbsp;<a href=\"https:\/\/whalebone.io\/solution\/\" target=\"_blank\" rel=\"noreferrer noopener\">Whalebone, a provider of DNS filtering services<\/a>, showed that adding Indicators of Compromise from ESET to DNS filtering detection data significantly improves detection.<\/p>\n\n\n\n<p><br>Experts from Whalebone and ESET&nbsp;<a href=\"https:\/\/www.eset.com\/blog\/enterprise\/testing-threat-intelligence-data-for-dns-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">revealed<\/a>&nbsp;the results of a DNS filtering test in their joint presentation at the&nbsp;<a href=\"https:\/\/tate.cz\/en\/is2\" target=\"_blank\" rel=\"noreferrer noopener\">IS2 Conference<\/a>, an information security event held in Prague, Czech Republic. The test was run on a sample of 100,000 internet connections, representing around half a million connected devices in two countries, the Czech Republic and Slovakia.<\/p>\n\n\n\n<p><br>Before, Whalebone had utilized Indicators of Compromise (IoC) generated via methods such as sandbox simulations, analysis of network traffic or utilizing known malware patterns. \u201eWe wanted to include detection data from endpoints as a new source of IoC, hoping for improved detection capability,\u201c said Robert \u0160efr, Whalebone\u2019s Chief Technology Officer.<\/p>\n\n\n\n<p>The test was aimed at confirming the expectation that including IoC from&nbsp;<a href=\"https:\/\/version-2.com\/en\/business\/threat-intelligence\/\">ESET Threat Intelligence<\/a>&nbsp;would lead to new, previously unavailable detections \u2013 while keeping false positives at a minimum.<\/p>\n\n\n\n<p><br>The test was run in the first quarter of 2018 and involved around 55,000 unique malicious domains in the tested IoC feed. Out of those, around 1100 domains were detected. 18.5% of the devices in the test made at least one attempt to contact a malicious domain from the feed; the overall number of incidents in the test was around 1.75 million. Out of those, around &nbsp;half (866,000 incidents, precisely 49.51%) were detected based solely on the IoC provided by ESET \u2013 i.e., without data from ESET, these incidents would have gone undetected. Only 0.47% of incidents were detected based on both ESET\u2019s and original Whalebone data; the remaining 50.02% of incidents were detected independently from ESET.<\/p>\n\n\n\n<p><br>Out of the 866,000 incidents detected based on the IoC by ESET, only one single domain blocking was found to be a false positive.<\/p>\n\n\n\n<p>\u201eThe Whalebone test clearly showed that rigorous categorization of data, which is paramount for ESET, allows for both a high detection rate and keeping false positives close to zero,\u201c comments Peter Dek\u00fd\u0161, ESET\u2019s IT Security Director.<\/p>\n\n\n\n<p><br>\u201cThe testing has shown that by including IoC from ESET Threat Intelligence, detections significantly increased, with false positives amounting virtually to zero. Overall, the test has proven that it is appropriate to use endpoint-sourced IoC for DNS-level protection\u201d, concludes Whalebone\u2019s Robert \u0160efr.<\/p>\n\n\n\n<p><br>For more information about ESET Threat Intelligence, please visit\u00a0<a href=\"https:\/\/version-2.com\/en\/business\/threat-intelligence\/\">ESET Threat Intelligence<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>About Version 2 Limited<\/strong><\/p>\n\n\n\n<p>Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<br><\/p>\n\n\n\n<p><strong>About ESET<\/strong><\/p>\n\n\n\n<p>Founded in 1992, ESET is a global provider of security software for enterprises and consumers. ESET\u2019s award-winning, antivirus software system, NOD32, provides real-time protection from known and unknown viruses, spyware, rootkits and other malware. ESET NOD32 offers the smallest, fastest and most advanced protection available, with more Virus Bulletin 100 Awards than any other antivirus product. ESET was named to Deloitte\u2019s Technology Fast 500 five years running, and has an extensive partner network, including corporations like Canon, Dell and Microsoft. ESET has offices in Bratislava, SK; Bristol, U.K.; Buenos Aires, AR; Prague, CZ; San Diego, USA; and is represented worldwide in more than 100 countries.&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>A test conducted by&nbsp;Whalebone, a provider of DNS f [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":3289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,40,61,102],"tags":[41,163,172],"class_list":["post-6750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-v2","category-eset","category-press-release","category-year2018","tag-eset","tag-163","tag-eset-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESET Threat Intelligence data improves detection - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2018\/06\/eset-threat-intelligence-data-improves-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Threat Intelligence data improves detection - Version 2\" \/>\n<meta property=\"og:description\" content=\"A test conducted by&nbsp;Whalebone, a provider of DNS f [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2018\/06\/eset-threat-intelligence-data-improves-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-19T07:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-04T05:23:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg?fit=1200%2C675&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"ESET Threat Intelligence data improves detection\",\"datePublished\":\"2018-06-19T07:26:00+00:00\",\"dateModified\":\"2020-11-04T05:23:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"keywords\":[\"ESET\",\"2018\",\"ESET Threat Intelligence\"],\"articleSection\":[\"Version 2 Limited\",\"ESET\",\"Press Release\",\"2018\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/\",\"name\":\"ESET Threat Intelligence data improves detection - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"datePublished\":\"2018-06-19T07:26:00+00:00\",\"dateModified\":\"2020-11-04T05:23:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"contentUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/eset-news.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2018\\\/06\\\/eset-threat-intelligence-data-improves-detection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Threat Intelligence data improves detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESET Threat Intelligence data improves detection - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2018\/06\/eset-threat-intelligence-data-improves-detection\/","og_locale":"en_US","og_type":"article","og_title":"ESET Threat Intelligence data improves detection - Version 2","og_description":"A test conducted by&nbsp;Whalebone, a provider of DNS f [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2018\/06\/eset-threat-intelligence-data-improves-detection\/","og_site_name":"Version 2","article_published_time":"2018-06-19T07:26:00+00:00","article_modified_time":"2020-11-04T05:23:13+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg?fit=1200%2C675&ssl=1","type":"image\/jpeg"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"ESET Threat Intelligence data improves detection","datePublished":"2018-06-19T07:26:00+00:00","dateModified":"2020-11-04T05:23:13+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/"},"wordCount":598,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","keywords":["ESET","2018","ESET Threat Intelligence"],"articleSection":["Version 2 Limited","ESET","Press Release","2018"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/","url":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/","name":"ESET Threat Intelligence data improves detection - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","datePublished":"2018-06-19T07:26:00+00:00","dateModified":"2020-11-04T05:23:13+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#primaryimage","url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","contentUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2018\/06\/eset-threat-intelligence-data-improves-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"ESET Threat Intelligence data improves detection"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/eset-news.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-1KS","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/6750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=6750"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/6750\/revisions"}],"predecessor-version":[{"id":15504,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/6750\/revisions\/15504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media\/3289"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=6750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=6750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=6750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}