{"id":987497215,"date":"2025-01-08T13:50:44","date_gmt":"2025-01-08T12:50:44","guid":{"rendered":"https:\/\/tyrex-cyber.com\/malware-ia-comprendre-et-prevenir-ces-nouvelles-menaces\/"},"modified":"2025-05-11T18:14:46","modified_gmt":"2025-05-11T16:14:46","slug":"ai-malware-understanding-and-preventing","status":"publish","type":"post","link":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/","title":{"rendered":"AI malware: understanding and preventing these new threats"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Artificial intelligence (AI) continues to revolutionise our daily lives, whether in healthcare, industry or leisure. However, like any powerful technology, it is not immune to being misused for malicious purposes. Among these pernicious uses, the creation of malware by AI is a growing threat to businesses. Software such as WormGPT or FraudGPT can be used to generate malicious code. Tyrex tells you more.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How can artificial intelligence generate malware?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">AI is often associated with tools that facilitate complex tasks or automate processes. For example, generative models such as ChatGPT are designed to write texts, answer questions or even produce computer code. However, this capability can be exploited by cybercriminals to create malicious software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The principle is simple: by entering precise instructions into an AI model, a hacker can generate malicious scripts or code without any in-depth programming skills. For example, he can ask the AI to design a programme capable of infecting systems, stealing data or bypassing security measures. AI can also help to analyse a system&#8217;s vulnerabilities, making it easier to design tailor-made attacks. This is the case, for example, with FraudGPT, a subscription-based application that can be used to create malicious code.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">AI-generated malware: rapidly evolving threats\u00a0<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The rapid development of AI is leading to more sophisticated cyber threats. AI-generated <\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/what-are-the-main-categories-of-malware\/\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\"> can improve and adapt in real time. They can learn to bypass firewalls, avoid detection by antivirus software or even modify themselves to appear harmless until an attack is carried out.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another worrying aspect is the ability of AI to automate large-scale attacks. Cybercriminals can use these tools to launch hyper-targeted phishing campaigns, create <\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/ransomware-workplace-what-to-do\/\"><span style=\"font-weight: 400;\">ransomware<\/span><\/a><span style=\"font-weight: 400;\"> that encrypts data in complex ways or even deploy malicious bots capable of infecting thousands of computers in record time.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How can we protect ourselves against emerging malware?\u00a0<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Whether or not malware is generated by AI, preventive measures are still essential to limit the risks. Here are a few solutions to strengthen your IT security:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Install white stations\u00a0<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">White stations or <\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/purpose-of-a-usb-decontamination-station\/\"><span style=\"font-weight: 400;\">USB decontamination stations<\/span><\/a><span style=\"font-weight: 400;\">, like those offered by TYREX, are tools specifically designed to analyse and neutralise threats present on USB keys and other removable media. These stations enable files to be copied from an infected device to a healthy one, while removing the malicious code.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a context where malware can be sophisticated and hidden in seemingly innocuous files, white stations offer an effective first line of defence, particularly for businesses and organisations handling sensitive data.<\/span><\/p>\n<p><a href=\"https:\/\/tyrex-cyber.com\/en\/la-solution\/\"><span style=\"font-weight: 400;\">Discover the TYREX solution<\/span><\/a><\/p>\n<h3><span style=\"font-weight: 400;\">Install a good antivirus and keep it up to date<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">A high-performance antivirus is essential for detecting and blocking known threats. Antivirus software uses databases to identify malware signatures. They also incorporate behavioural detection technologies, capable of spotting suspicious activity even when the malware is not yet listed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And don&#8217;t forget updates. These correct vulnerabilities in operating systems and software that are often exploited by cybercriminals. Ignoring these updates opens the door to malware.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Educate employees about cyber security\u00a0<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Human error is often the most exploited by hackers. For example, an employee with inadequate cyber security awareness could click on a malicious link or insert an infected USB stick into a company computer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To limit these risks, it is essential to train your employees in <\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"><span style=\"font-weight: 400;\">good cyber security practices<\/span><\/a><span style=\"font-weight: 400;\">. This includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Recognising phishing attempts.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Avoiding using USB media that has not been decontaminated.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Creating strong passwords and renewing them regularly.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Regular awareness can make a significant difference!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.<\/p>\n","protected":false},"author":7,"featured_media":987497298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-987497215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI malware: understanding and preventing these new threats - TYREX - d\u00e9contamination USB<\/title>\n<meta name=\"description\" content=\"AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI malware: understanding and preventing these new threats - TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"og:description\" content=\"AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\" \/>\n<meta property=\"og:site_name\" content=\"TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-08T12:50:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-11T16:14:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre-Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre-Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\"},\"author\":{\"name\":\"Alexandre-Admin\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\"},\"headline\":\"AI malware: understanding and preventing these new threats\",\"datePublished\":\"2025-01-08T12:50:44+00:00\",\"dateModified\":\"2025-05-11T16:14:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\"},\"wordCount\":583,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\",\"name\":\"AI malware: understanding and preventing these new threats - TYREX - d\u00e9contamination USB\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg\",\"datePublished\":\"2025-01-08T12:50:44+00:00\",\"dateModified\":\"2025-05-11T16:14:46+00:00\",\"description\":\"AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg\",\"width\":1620,\"height\":1080,\"caption\":\"PROTECTION-VIRUS-CYBERMENACES\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tyrex-cyber.com\/en\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI malware: understanding and preventing these new threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"name\":\"TYREX - d\u00e9contamination USB\",\"description\":\"TYREX - d\u00e9contamination USB\",\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\",\"name\":\"TYREX - d\u00e9contamination USB\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"width\":4000,\"height\":4118,\"caption\":\"TYREX - d\u00e9contamination USB\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\",\"name\":\"Alexandre-Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"caption\":\"Alexandre-Admin\"},\"url\":\"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI malware: understanding and preventing these new threats - TYREX - d\u00e9contamination USB","description":"AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/","og_locale":"en_US","og_type":"article","og_title":"AI malware: understanding and preventing these new threats - TYREX - d\u00e9contamination USB","og_description":"AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.","og_url":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/","og_site_name":"TYREX - d\u00e9contamination USB","article_published_time":"2025-01-08T12:50:44+00:00","article_modified_time":"2025-05-11T16:14:46+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg","type":"image\/jpeg"}],"author":"Alexandre-Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandre-Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#article","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/"},"author":{"name":"Alexandre-Admin","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b"},"headline":"AI malware: understanding and preventing these new threats","datePublished":"2025-01-08T12:50:44+00:00","dateModified":"2025-05-11T16:14:46+00:00","mainEntityOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/"},"wordCount":583,"commentCount":0,"publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/","url":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/","name":"AI malware: understanding and preventing these new threats - TYREX - d\u00e9contamination USB","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg","datePublished":"2025-01-08T12:50:44+00:00","dateModified":"2025-05-11T16:14:46+00:00","description":"AI can generate sophisticated malware such as FraudGPT. Find out more about the risks, how they are rapidly evolving and how you can protect your systems effectively.","breadcrumb":{"@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#primaryimage","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/04\/pexels-mikhail-nilov-6963098.jpg","width":1620,"height":1080,"caption":"PROTECTION-VIRUS-CYBERMENACES"},{"@type":"BreadcrumbList","@id":"https:\/\/tyrex-cyber.com\/en\/ai-malware-understanding-and-preventing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tyrex-cyber.com\/en\/accueil\/"},{"@type":"ListItem","position":2,"name":"AI malware: understanding and preventing these new threats"}]},{"@type":"WebSite","@id":"https:\/\/tyrex-cyber.com\/en\/#website","url":"https:\/\/tyrex-cyber.com\/en\/","name":"TYREX - d\u00e9contamination USB","description":"TYREX - d\u00e9contamination USB","publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tyrex-cyber.com\/en\/#organization","name":"TYREX - d\u00e9contamination USB","url":"https:\/\/tyrex-cyber.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","width":4000,"height":4118,"caption":"TYREX - d\u00e9contamination USB"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b","name":"Alexandre-Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","caption":"Alexandre-Admin"},"url":"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/"}]}},"_links":{"self":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=987497215"}],"version-history":[{"count":3,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497215\/revisions"}],"predecessor-version":[{"id":987497305,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497215\/revisions\/987497305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media\/987497298"}],"wp:attachment":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=987497215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=987497215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=987497215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}