{"id":4042,"date":"2022-09-10T21:29:31","date_gmt":"2022-09-10T21:29:31","guid":{"rendered":"https:\/\/osintme.com\/?p=4042"},"modified":"2022-09-10T21:33:14","modified_gmt":"2022-09-10T21:33:14","slug":"recommended-reading-before-the-end-of-2022","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2022\/09\/10\/recommended-reading-before-the-end-of-2022\/","title":{"rendered":"Recommended reading before the end of 2022"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">This post will contain a subjective list of recommended reading &#8211; stuff that I found either interesting, useful or otherwise beneficial during this year. However, this time it won&#8217;t be all about the books; unlike <a rel=\"noreferrer noopener\" href=\"https:\/\/osintme.com\/index.php\/2021\/04\/30\/my-recently-read-osint-security-books-recommendations\/\" target=\"_blank\">what I wrote last year<\/a>, this list contains freely available publications, booklets and documents from a variety of fields of expertise.<\/p>\n\n\n\n<p class=\"has-text-align-justify\">I do believe this content is relevant when helping us all prepare for what might be coming next in 2023 and beyond. Happy reading.<\/p>\n\n\n\n<p class=\"has-text-align-justify\"><em><strong>PS. <\/strong>Please, do let me know if you are interested in a new post with recommended OSINT and security books.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Common TTPs of modern ransomware groups<\/strong> &#8211; great piece of research from Kaspersky here. Ransomware remains a very significant feature of the digital threats landscape and it can only be expected to rise and adapt in 2023 and beyond. The research makes frequent references to established international frameworks like NIST and MITRE while including some less known ransomware groups that have operated in the space of the last 6 years (although it does not cover the most recent actors, like Karakurt or Vice Society). Kaspersky&#8217;s report does a decent job of combining high level overviews with some technical details that can be used when reviewing event logs.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Common_TTPs_of_modern_ransomware_groups.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Common_TTPs_of_modern_ransomware_groups..\"><\/object><a id=\"wp-block-file--media-8c61a931-5fce-4cae-90b8-b60776c03541\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Common_TTPs_of_modern_ransomware_groups.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Common_TTPs_of_modern_ransomware_groups<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Common_TTPs_of_modern_ransomware_groups.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-8c61a931-5fce-4cae-90b8-b60776c03541\">Download<\/a><\/div>\n\n\n\n<p><strong>The Cyber Intelligence Analyst\u2019s Cookbook<\/strong> &#8211; created in 2020 by The Open Source Research Society, this booklet focuses on various OSINT techniques and methodologies for investigating cyber incidents. Heavily focused on researching post-breach artifacts using tools like Maltego and MISP.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Cyber_Intelligence_Analyst_s_Cookbook.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Cyber_Intelligence_Analyst_s_Cookbook..\"><\/object><a id=\"wp-block-file--media-652bf107-9421-4a10-baaf-7d761f6fc45c\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Cyber_Intelligence_Analyst_s_Cookbook.pdf\">Cyber_Intelligence_Analyst_s_Cookbook<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Cyber_Intelligence_Analyst_s_Cookbook.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-652bf107-9421-4a10-baaf-7d761f6fc45c\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>The DOJ Journal of Federal Law and Practice May 2021<\/strong> &#8211; published by the US Department of Justice. I found this particular volume interesting due to the wide variety of topics it addresses &#8211; from data breach investigations, blockchain analysis, to prosecuting offences committed using drones.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/DOJ_JOURNAL_OF_FEDERAL_LAW_AND_PRACTICE_May_2021.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of DOJ_JOURNAL_OF_FEDERAL_LAW_AND_PRACTICE_May_2021..\"><\/object><a id=\"wp-block-file--media-65411700-09a6-493b-a89b-53ac207ca3ee\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/DOJ_JOURNAL_OF_FEDERAL_LAW_AND_PRACTICE_May_2021.pdf\">DOJ_JOURNAL_OF_FEDERAL_LAW_AND_PRACTICE_May_2021<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/DOJ_JOURNAL_OF_FEDERAL_LAW_AND_PRACTICE_May_2021.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-65411700-09a6-493b-a89b-53ac207ca3ee\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>ENISA Threat Landscape for Ransomware Attacks<\/strong> &#8211; ENISA is The European Union Agency for Cybersecurity and it regularly produces useful and timely publications on cyber threats. This one is dated July 2022, so at the time of writing this blog post, it&#8217;s probably one of the most recent and accurate info booklets out there. Apart from outlining how ransomware works, it contains some recommendations regarding building ransomware resilience and responding to incidents.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/ENISA_Ransomware_Threat_Landscape.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of ENISA_Ransomware_Threat_Landscape..\"><\/object><a id=\"wp-block-file--media-e7b58899-bc9b-458c-95ad-9ba3230a3054\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/ENISA_Ransomware_Threat_Landscape.pdf\">ENISA_Ransomware_Threat_Landscape<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/ENISA_Ransomware_Threat_Landscape.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-e7b58899-bc9b-458c-95ad-9ba3230a3054\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Finding Beacons in the Dark<\/strong> &#8211; this is a guide to cyber threat intelligence written by the BlackBerry Research and Intelligence Team. Written from a very practical standpoint, without the usual academic padding and theorising overhang, it reads well and is relevant. This is a great example of something written by people who engage hands-on with the subject matter.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/FINDING_BEACONS_IN_THE_DARK_Cyber_Threat_Intelligence.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of FINDING_BEACONS_IN_THE_DARK_Cyber_Threat_Intelligence..\"><\/object><a id=\"wp-block-file--media-01173641-27f8-42ad-9210-ef01b8c18f64\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/FINDING_BEACONS_IN_THE_DARK_Cyber_Threat_Intelligence.pdf\">FINDING_BEACONS_IN_THE_DARK_Cyber_Threat_Intelligence<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/FINDING_BEACONS_IN_THE_DARK_Cyber_Threat_Intelligence.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-01173641-27f8-42ad-9210-ef01b8c18f64\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Guidelines for Digital Forensics First Responders<\/strong> &#8211; since this is an Interpol publication, its primary target audience is law enforcement personnel. However, like any set of best practices, the contents of this guide are easily applicable for other professions. Search and seizure might be a very law enforcement specific area of investigations, but it does exist in adapted iterations within the private industry too. Regardless &#8211; an interesting read, especially when it comes to virtual assets, vehicles and maritime equipment.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Guidelines_for_Digital_Forensics.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Guidelines_for_Digital_Forensics..\"><\/object><a id=\"wp-block-file--media-c3d88c60-d86b-4480-8847-c3c22b05b3ac\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Guidelines_for_Digital_Forensics.pdf\">Guidelines_for_Digital_Forensics<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Guidelines_for_Digital_Forensics.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-c3d88c60-d86b-4480-8847-c3c22b05b3ac\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>OSINT Navigator for Investigative Journalists<\/strong> &#8211; a very handy, concise and to the point manual on how to conduct OSINT investigations. It offers comprehensive instructions on how to set up an investigative environment, how to leverage various sources and how to clean up the acquired data. A solid resource for OSINT beginners and casual enthusiasts who want to level up their game.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/INTELLIGENCE_NAVIGATOR_FOR_INVESTIGATIVE_JOURNALISTS.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of INTELLIGENCE_NAVIGATOR_FOR_INVESTIGATIVE_JOURNALISTS..\"><\/object><a id=\"wp-block-file--media-a185d025-16c0-41be-bde3-4c4f892995fa\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/INTELLIGENCE_NAVIGATOR_FOR_INVESTIGATIVE_JOURNALISTS.pdf\">INTELLIGENCE_NAVIGATOR_FOR_INVESTIGATIVE_JOURNALISTS<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/INTELLIGENCE_NAVIGATOR_FOR_INVESTIGATIVE_JOURNALISTS.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-a185d025-16c0-41be-bde3-4c4f892995fa\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\">Introduction to Malware Analysis &#8211; a booklet for beginners from LetsDefend; this is a noob-friendly guide on how to gain some hands on experience with malicious software examination. From breaking down categories of various types of malware, to VM setup and conducting static vs dynamic analysis. A good resource for self starters.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Introduction_to_Malware_Analysis.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Introduction_to_Malware_Analysis..\"><\/object><a id=\"wp-block-file--media-92fe24aa-cc41-41e8-9648-d3facb65ac22\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Introduction_to_Malware_Analysis.pdf\">Introduction_to_Malware_Analysis<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Introduction_to_Malware_Analysis.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-92fe24aa-cc41-41e8-9648-d3facb65ac22\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>The Nmap Cookbook<\/strong> &#8211; an oldie (2010) but goldie. Nmap remains a very relevant tool for conducting network scans and can be used for both defence and offence. Contains lots of commands and various Nmap parameters for network discovery &#8211; all ready to be tried out and tested. Particularly useful when preparing for industry certifications and other exams.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Nmap-CookBook.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Nmap-CookBook..\"><\/object><a id=\"wp-block-file--media-4fc5b92b-3b89-4b86-a98b-1212f09da57e\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Nmap-CookBook.pdf\">Nmap-CookBook<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Nmap-CookBook.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-4fc5b92b-3b89-4b86-a98b-1212f09da57e\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Money laundering through the gambling industry<\/strong> &#8211; freshly out of the digital printing press of the Basel Institute on Governance (September 2022), this booklet focuses on using AML measures within the gambling industry. Interesting examples of how money is laundered through gambling and what should be done to stop it.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Money_laundering_through_gambling.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Money_laundering_through_gambling..\"><\/object><a id=\"wp-block-file--media-dac86b73-3e25-4d75-9062-7d638babe715\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Money_laundering_through_gambling.pdf\">Money_laundering_through_gambling<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Money_laundering_through_gambling.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-dac86b73-3e25-4d75-9062-7d638babe715\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Russian Intelligence<\/strong> &#8211; an absolute must-read and one of my private highlights of this list. I could not believe this is a freely accessible publication, as it would definitely be worth paying money for it. Russia and its kleptocratic regime has been and most likely will remain a relevant threat for the foreseeable future. This book focuses on the why and the how of Russian intelligence agencies and their operations. If you wish to gain a good understanding of the FSB, GRU and SVR tradecraft, read this book.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Russian-Intelligence.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Russian-Intelligence..\"><\/object><a id=\"wp-block-file--media-2f595138-8203-4bdf-9039-a8dd7590e941\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Russian-Intelligence.pdf\">Russian-Intelligence<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Russian-Intelligence.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-2f595138-8203-4bdf-9039-a8dd7590e941\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>SOC Analyst Interview Questions<\/strong> &#8211; I have no idea who the author of this is, but they did a good job on compiling various sample questions asked during a SOC analyst interview. If you consider a career in cybersecurity or are about to interview for cybersecurity analysts jobs, this should come in handy.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/SOC_Interview_Questions.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of SOC_Interview_Questions..\"><\/object><a id=\"wp-block-file--media-d7ad779d-3d21-4848-b23f-ef4923092cd3\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/SOC_Interview_Questions.pdf\">SOC_Interview_Questions<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/SOC_Interview_Questions.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-d7ad779d-3d21-4848-b23f-ef4923092cd3\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Threat Hunting Playbook<\/strong> &#8211; publication by Rank Software. A very clear breakdown of threat attack indicators and threat hunting scenarios. Contains examples of queries that can be used within a SIEM. Highly recommended for cybersecurity specialists and incident responders.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Threat_Hunting_Playbook.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of Threat_Hunting_Playbook..\"><\/object><a id=\"wp-block-file--media-d987a0a1-5d08-4cfc-b83d-0c2d3f400e17\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Threat_Hunting_Playbook.pdf\">Threat_Hunting_Playbook<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/Threat_Hunting_Playbook.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-d987a0a1-5d08-4cfc-b83d-0c2d3f400e17\">Download<\/a><\/div>\n\n\n\n<p class=\"has-text-align-justify\"><strong>Top 50 Security Threats<\/strong> &#8211; we all probably heard about the OWASP Top 10 &#8211; but who can name the top 50 security threats? Well, now we can, thanks to this list created by Splunk. The notes under each threat provide a high level overview of what it does and how. An easy read, useful for quickly expanding your knowledge of the current cyber threat ecosystem.<\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/top_50_security_threats.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Embed of top_50_security_threats..\"><\/object><a id=\"wp-block-file--media-dd889f08-430a-4bea-8546-44b0b60510d1\" href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/top_50_security_threats.pdf\">top_50_security_threats<\/a><a href=\"https:\/\/osintme.com\/wp-content\/uploads\/2022\/09\/top_50_security_threats.pdf\" class=\"wp-block-file__button\" download aria-describedby=\"wp-block-file--media-dd889f08-430a-4bea-8546-44b0b60510d1\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A list of publications and free content I found useful and that I recommend reading before the end of the year.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[133,143,83,87],"class_list":["post-4042","post","type-post","status-publish","format-standard","hentry","category-open-source-intelligence","tag-books","tag-learning","tag-manuals","tag-training"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=4042"}],"version-history":[{"count":10,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4042\/revisions"}],"predecessor-version":[{"id":4066,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4042\/revisions\/4066"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=4042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=4042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=4042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}