{"id":7365,"date":"2017-07-14T09:00:54","date_gmt":"2017-07-14T07:00:54","guid":{"rendered":"https:\/\/hansesecure.de\/2017\/07\/detect-phishing-emails\/"},"modified":"2017-07-14T09:00:54","modified_gmt":"2017-07-14T07:00:54","slug":"detect-phishing-emails","status":"publish","type":"post","link":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/","title":{"rendered":"Detect phishing emails"},"content":{"rendered":"<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing.png\"><img decoding=\"async\" class=\"alignright wp-image-515 size-thumbnail\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png\" alt=\"\" width=\"150\" height=\"150\"><\/a>Almost every day, users become victims of so-called<a href=\"https:\/\/de.wikipedia.org\/wiki\/Phishing\" target=\"_blank\" rel=\"noopener\"> phishing emails<\/a>.<br \/>\nTherefore, in this short post, I would like to point out the details that can be paid attention to in order to identify malicious emails.<\/p>\n<p>Of course, this is not a protection against <a href=\"https:\/\/www.kaspersky.de\/resource-center\/definitions\/spear-phishing\" target=\"_blank\" rel=\"noopener\">spear phishing emails<\/a> as used by professional hackers or <a href=\"https:\/\/hansesecure.de\/en\/services\/penetration-test\/\" target=\"_blank\" rel=\"noopener\">penetration testers<\/a>. I have also attached an example of such an email below.<\/p>\n<p>Phishing emails can vary greatly, most usually contain file attachments or links. Below I explain two examples of how you end up in the mailbox almost every day.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>#1 File attachments<\/h2>\n<p>These attachments often contain malicious code, which is executed when opened. Here, the effects can range from the installation of adware (e.g. unwanted adverts in the Internet browser) to the complete compromise of the system.<\/p>\n<h2>#2 Links<\/h2>\n<p>These can either lead to websites that load malicious code via <a href=\"https:\/\/de.wikipedia.org\/wiki\/Drive-by-Download\" target=\"_blank\" rel=\"noopener\">drive-by downloads<\/a> and have the same impact as file attachments. Or the user is redirected to a website which is a copy of a login (e.g. savings bank, PayPal, amazon, etc.). If the user enters his access data there, it is transmitted to the attacker so that he can take over the respective account.<\/p>\n<h1>How do you recognize these emails?<\/h1>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/mail.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-511\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/mail-300x189.png\" alt=\"\" width=\"450\" height=\"283\"><\/a><\/p>\n<ol>\n<li>E-mail sender<br \/>\nIn addition to the displayed name, the actual sender should also be checked. A displayed name &#8220;PayPal&#8221; with the sender beate.meier@web.de makes little sense.<\/li>\n<li>Time<br \/>\nEmails which are sent at 03:38 do not speak good working conditions of the sender&#8230;. Of course, these are often sent by so-called <a href=\"https:\/\/de.wikipedia.org\/wiki\/Bot\" target=\"_blank\" rel=\"noopener\">bots<\/a>, which do not pay attention to the local time.<\/li>\n<li>Salutation<br \/>\nA general and impersonal salutation, such as &#8220;Dear Sir or Madam&#8221; or &#8220;Dear Customer&#8221;, can also be a sign of an automatically generated phishing e-mail.<\/li>\n<li>Spelling &amp; Formatting<br \/>\nReputable companies do not send emails with gross spelling or formatting errors (As a rule ;-).<\/li>\n<li>Close<br \/>\nNo name under &#8220;Sincerely yours&#8221; or false information about the company are also an indication of a phishing email. Check even trivial things, such as the company&#8217;s registered office, when you receive such emails. This is as trivial to find out as a correct spelling. For example, Amazon is not based in &#8220;Amazon EU S.a r.l. (Societe a responsabilite limitee), 3 Rue Paerer, L-2358 Paris&#8221; \ud83d\ude09<\/li>\n<\/ol>\n<p><strong>With these fairly simple control steps, many phishing emails can be detected and safely deleted. For more information on technical protection options and user awareness, just <a href=\"mailto:info@hansesecure.de\">contact<\/a> me.<\/strong><\/p>\n<p>Finally, here is the announced example of a spear phishing email as it could have been sent in July 2017. This would have a much higher probability of the attachment being opened by the recipient than the above example.<\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/spearPhishing.png\"><img decoding=\"async\" class=\"aligncenter wp-image-517\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/spearPhishing-300x216.png\" alt=\"\" width=\"450\" height=\"325\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost every day, users become victims of so-called phishing emails. Therefore, in this short post, I would like to point out the details that can be paid attention to in order to identify malicious emails. Of course, this is not a protection against spear phishing emails as used by professional hackers or penetration testers. I [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[259],"tags":[264,265,266],"class_list":["post-7365","post","type-post","status-publish","format-standard","hentry","category-practical-advice","tag-awareness-en-2","tag-it-security-en-2","tag-migration-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to look out for in order to identify phishing emails<\/title>\n<meta name=\"description\" content=\"This short article shows which details should be paid attention to in order to identify malicious emails. Links, attachments or embedded code\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to look out for in order to identify phishing emails\" \/>\n<meta property=\"og:description\" content=\"This short article shows which details should be paid attention to in order to identify malicious emails. Links, attachments or embedded code\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"HanseSecure GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/hansesecure\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-14T07:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png\" \/>\n<meta name=\"author\" content=\"HanseSecure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberWarship\" \/>\n<meta name=\"twitter:site\" content=\"@CyberWarship\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HanseSecure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/\"},\"author\":{\"name\":\"HanseSecure\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/person\\\/6ec6ef4887ff2fc97a14f1a7f390f593\"},\"headline\":\"Detect phishing emails\",\"datePublished\":\"2017-07-14T07:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2017\\\/07\\\/phishing-150x150.png\",\"keywords\":[\"Awareness\",\"IT Security\",\"Migration\"],\"articleSection\":[\"Practical Advice\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/\",\"name\":\"What to look out for in order to identify phishing emails\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2017\\\/07\\\/phishing-150x150.png\",\"datePublished\":\"2017-07-14T07:00:54+00:00\",\"description\":\"This short article shows which details should be paid attention to in order to identify malicious emails. Links, attachments or embedded code\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2017\\\/07\\\/phishing-150x150.png\",\"contentUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2017\\\/07\\\/phishing-150x150.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2017\\\/07\\\/detect-phishing-emails\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detect phishing emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\",\"name\":\"HanseSecure GmbH\",\"description\":\"Choose the Intruder\",\"publisher\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\",\"name\":\"HanseSecure GmbH\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png\",\"contentUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png\",\"width\":512,\"height\":512,\"caption\":\"HanseSecure GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/hansesecure\",\"https:\\\/\\\/x.com\\\/CyberWarship\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/hansesecure\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCAABbKOA_stDFkEKS3MSF7Q\",\"https:\\\/\\\/www.instagram.com\\\/hansesecure\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/person\\\/6ec6ef4887ff2fc97a14f1a7f390f593\",\"name\":\"HanseSecure\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"caption\":\"HanseSecure\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to look out for in order to identify phishing emails","description":"This short article shows which details should be paid attention to in order to identify malicious emails. Links, attachments or embedded code","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/","og_locale":"en_US","og_type":"article","og_title":"What to look out for in order to identify phishing emails","og_description":"This short article shows which details should be paid attention to in order to identify malicious emails. Links, attachments or embedded code","og_url":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/","og_site_name":"HanseSecure GmbH","article_publisher":"https:\/\/facebook.com\/hansesecure","article_published_time":"2017-07-14T07:00:54+00:00","og_image":[{"url":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png","type":"","width":"","height":""}],"author":"HanseSecure","twitter_card":"summary_large_image","twitter_creator":"@CyberWarship","twitter_site":"@CyberWarship","twitter_misc":{"Written by":"HanseSecure","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#article","isPartOf":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/"},"author":{"name":"HanseSecure","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/person\/6ec6ef4887ff2fc97a14f1a7f390f593"},"headline":"Detect phishing emails","datePublished":"2017-07-14T07:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/hansesecure.de\/en\/#organization"},"image":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png","keywords":["Awareness","IT Security","Migration"],"articleSection":["Practical Advice"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/","url":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/","name":"What to look out for in order to identify phishing emails","isPartOf":{"@id":"https:\/\/hansesecure.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#primaryimage"},"image":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png","datePublished":"2017-07-14T07:00:54+00:00","description":"This short article shows which details should be paid attention to in order to identify malicious emails. Links, attachments or embedded code","breadcrumb":{"@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#primaryimage","url":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png","contentUrl":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2017\/07\/phishing-150x150.png"},{"@type":"BreadcrumbList","@id":"https:\/\/hansesecure.de\/en\/2017\/07\/detect-phishing-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/hansesecure.de\/en\/"},{"@type":"ListItem","position":2,"name":"Detect phishing emails"}]},{"@type":"WebSite","@id":"https:\/\/hansesecure.de\/en\/#website","url":"https:\/\/hansesecure.de\/en\/","name":"HanseSecure GmbH","description":"Choose the Intruder","publisher":{"@id":"https:\/\/hansesecure.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hansesecure.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hansesecure.de\/en\/#organization","name":"HanseSecure GmbH","url":"https:\/\/hansesecure.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hansesecure.de\/wp-content\/uploads\/2023\/05\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png","contentUrl":"https:\/\/hansesecure.de\/wp-content\/uploads\/2023\/05\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png","width":512,"height":512,"caption":"HanseSecure GmbH"},"image":{"@id":"https:\/\/hansesecure.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/hansesecure","https:\/\/x.com\/CyberWarship","https:\/\/www.linkedin.com\/company\/hansesecure","https:\/\/www.youtube.com\/channel\/UCAABbKOA_stDFkEKS3MSF7Q","https:\/\/www.instagram.com\/hansesecure\/"]},{"@type":"Person","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/person\/6ec6ef4887ff2fc97a14f1a7f390f593","name":"HanseSecure","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","caption":"HanseSecure"}}]}},"_links":{"self":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts\/7365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/comments?post=7365"}],"version-history":[{"count":0,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts\/7365\/revisions"}],"wp:attachment":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/media?parent=7365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/categories?post=7365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/tags?post=7365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}