{"id":5897,"date":"2021-09-30T14:33:07","date_gmt":"2021-09-30T12:33:07","guid":{"rendered":"https:\/\/www.esferize.com\/?p=5897"},"modified":"2022-11-16T11:10:28","modified_gmt":"2022-11-16T10:10:28","slug":"how-to-detect-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/","title":{"rendered":"How to detect phishing attacks"},"content":{"rendered":"<div class=\"page\" title=\"Page 21\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>A successful <a href=\"https:\/\/www.esferize.com\/en\/what-is-phishing-how-does-it-work-and-how-to-protect-yourself\/\"><strong>phishing attack on your business<\/strong><\/a> can be a real disaster. On average, a phishing attack is estimated to result in a loss of more than $80,000, according to\u00a0<a href=\"https:\/\/apwg.org\">APWG<\/a>&#8216;s Phishing Activity Trends Report.<\/p>\n<p>To give an idea of the scale of this &#8216;industry&#8217;,<a href=\"https:\/\/www.esferize.com\/en\/cybersecurity-risks-smes-selfemployed\/\"> the number of phishing sites detected in the second quarter of 2020 was 146,994, compared to 165,772 in the first quarter<\/a>. <strong>Cybercriminals are getting better and better<\/strong> at making us believe that the emails we receive are genuine when, in fact, they are <strong>scams<\/strong>. In fact, they even use <strong>SSL security certificates<\/strong> on their websites. To detect even the most realistic messages, good and continuous training of our employees is key to avoid falling victim to these or any other attacks.<\/p>\n<div class=\"page\" title=\"Page 22\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h3>The most commonly used fake senders<\/h3>\n<p>When attackers target your business, <strong>they will impersonate a company we know<\/strong> or trust: banks, telecoms, security, post office, parcels&#8230; or even an online shop. These most commonly used fake senders are:<\/p>\n<ul>\n<li><strong>Banks and savings banks<\/strong>. The aim is to get hold of credit card numbers, coordinate cards, secret PINs, etc.<\/li>\n<li><strong>Official bodies<\/strong>, such as the AEAT, to infect the computer, steal private and banking data and defraud the user financially.<\/li>\n<li><strong>Online payment gateways<\/strong> (such as PayPal, Mastercard, Visa, etc.). Again, the main motivation is to steal bank details.<\/li>\n<li><strong>Social networks<\/strong>, in order to steal users&#8217; accounts, obtain their private data and impersonate them. This can be a major blow to confidence in your business.<\/li>\n<li><strong>Buy\/sell and auction sites<\/strong> (such as Amazon or eBay). They can also scam you or your customers.<\/li>\n<li><strong>Help and technical support<\/strong>. This is where people try to steal accounts, access personal data and files.<\/li>\n<li>Other services, such as<strong> cloud storage or packaging<\/strong>. In both cases it may be to access your data and, with it, get your banking credentials.<\/li>\n<\/ul>\n<div class=\"page\" title=\"Page 23\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h3>Message issues that should make you suspicious<\/h3>\n<p>The email subject that has proven most effective in phishing campaigns is an <strong>urgent text to immediately verify a password<\/strong>. It is estimated that almost 4 out of 10 users (39%) fall for it. But there are other texts that are successful. Social networks are widely used as a lure and are successful, especially if LinkedIn is the subject: 55% of phishing messages with this word achieved their target, while when it is Facebook that appears, the success rate is at 28%.<\/p>\n<h4>Thus, the top 10 phishing topics with the most clicks are:<\/h4>\n<ul>\n<li>Password change required immediately (26%)<\/li>\n<li>Microsoft \/ Office 365: Email deactivation in process (14%)<\/li>\n<li>Password verification required immediately (13%)<\/li>\n<li>HR: Salary increase (8%)<\/li>\n<li>Dropbox: Document shared with you (8%)<\/li>\n<li>IT: Scheduled server maintenance &#8211; No internet access (7%)<\/li>\n<li>Office 365: Change your password immediately (6%)<\/li>\n<li>HR warning on the use of personal items (6%)<\/li>\n<li>Airbnb: New device login (6%)<\/li>\n<li>Slack: Reset password for account (6%)<\/li>\n<\/ul>\n<p><strong>If you were not expecting the message, be suspicious<\/strong>. If you notice text in the message such as that they have noticed <strong>suspicious activity or login attempts<\/strong> or that there is a <strong>problem with your account or payment information<\/strong> or that you need to <strong>confirm certain personal information<\/strong>, unless you have specifically asked them to do so, <strong>they are usually fake<\/strong>. Similarly, if there is a fake invoice, a request to click on a link to make a payment or an offer of a coupon for free stuff, the alarm bells should go off immediately.<\/p>\n<p>Although email filters are getting stronger and stronger, the engineering and skill of criminals is sometimes beyond that of security companies, so it&#8217;s not surprising that a message can sneak into your inbox. That&#8217;s why it never hurts to add extra layers of protection. Examples such as\u00a0<a href=\"https:\/\/sentinelone.esferize.com\"><strong>endpoint\u00a0inmunisation<\/strong><\/a> or\u00a0<a href=\"https:\/\/splunk.esferize.com\"><strong>operational intelligence<\/strong><\/a> can really help your business.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A successful phishing attack on your business can be a  [&#8230;]<\/p>\n","protected":false},"author":8,"featured_media":5944,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[250,225,228],"tags":[312,733,759,586,764,762,760,761,766,765,743],"class_list":["post-5897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","category-cybersecurity","category-security-on-the-internet","tag-cyber-attacks","tag-cyberthreat","tag-detect-phishing-attacks","tag-emails","tag-endpoint-immunisation","tag-fraudulent","tag-how-to-detect-cyberattacks","tag-how-to-detect-phishing","tag-incibe-en","tag-operational-intelligence","tag-phishing-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to detect phishing attacks: Here&#039;s how you can tell them apart - Esferize<\/title>\n<meta name=\"description\" content=\"How to detect phishing attacks: These are the most commonly used fake senders and fraudulent message subjects with the highest success rate.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to detect phishing attacks: Here&#039;s how you can tell them apart - Esferize\" \/>\n<meta property=\"og:description\" content=\"How to detect phishing attacks: These are the most commonly used fake senders and fraudulent message subjects with the highest success rate.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-30T12:33:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T10:10:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_phishing_card.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Soto del R\u00edo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Soto del R\u00edo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/\"},\"author\":{\"name\":\"Cynthia Soto del R\u00edo\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\"},\"headline\":\"How to detect phishing attacks\",\"datePublished\":\"2021-09-30T12:33:07+00:00\",\"dateModified\":\"2022-11-16T10:10:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/\"},\"wordCount\":606,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_phishing_card.jpg\",\"keywords\":[\"Cyber attacks\",\"cyberthreat\",\"detect phishing attacks\",\"emails\",\"endpoint immunisation\",\"fraudulent\",\"how to detect cyberattacks\",\"how to detect phishing\",\"incibe\",\"operational intelligence\",\"phishing\"],\"articleSection\":[\"Company\",\"Cybersecurity\",\"Security on the Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/\",\"name\":\"How to detect phishing attacks: Here's how you can tell them apart - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_phishing_card.jpg\",\"datePublished\":\"2021-09-30T12:33:07+00:00\",\"dateModified\":\"2022-11-16T10:10:28+00:00\",\"description\":\"How to detect phishing attacks: These are the most commonly used fake senders and fraudulent message subjects with the highest success rate.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_phishing_card.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_phishing_card.jpg\",\"width\":1920,\"height\":1282,\"caption\":\"How to detect phishing attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/how-to-detect-phishing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to detect phishing attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\",\"name\":\"Cynthia Soto del R\u00edo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"caption\":\"Cynthia Soto del R\u00edo\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/csoto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to detect phishing attacks: Here's how you can tell them apart - Esferize","description":"How to detect phishing attacks: These are the most commonly used fake senders and fraudulent message subjects with the highest success rate.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to detect phishing attacks: Here's how you can tell them apart - Esferize","og_description":"How to detect phishing attacks: These are the most commonly used fake senders and fraudulent message subjects with the highest success rate.","og_url":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/","og_site_name":"Esferize","article_published_time":"2021-09-30T12:33:07+00:00","article_modified_time":"2022-11-16T10:10:28+00:00","og_image":[{"width":1920,"height":1282,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_phishing_card.jpg","type":"image\/jpeg"}],"author":"Cynthia Soto del R\u00edo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cynthia Soto del R\u00edo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/"},"author":{"name":"Cynthia Soto del R\u00edo","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b"},"headline":"How to detect phishing attacks","datePublished":"2021-09-30T12:33:07+00:00","dateModified":"2022-11-16T10:10:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/"},"wordCount":606,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_phishing_card.jpg","keywords":["Cyber attacks","cyberthreat","detect phishing attacks","emails","endpoint immunisation","fraudulent","how to detect cyberattacks","how to detect phishing","incibe","operational intelligence","phishing"],"articleSection":["Company","Cybersecurity","Security on the Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/","url":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/","name":"How to detect phishing attacks: Here's how you can tell them apart - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_phishing_card.jpg","datePublished":"2021-09-30T12:33:07+00:00","dateModified":"2022-11-16T10:10:28+00:00","description":"How to detect phishing attacks: These are the most commonly used fake senders and fraudulent message subjects with the highest success rate.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_phishing_card.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_phishing_card.jpg","width":1920,"height":1282,"caption":"How to detect phishing attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/how-to-detect-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to detect phishing attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b","name":"Cynthia Soto del R\u00edo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","caption":"Cynthia Soto del R\u00edo"},"url":"https:\/\/www.esferize.com\/en\/author\/csoto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5897"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/5944"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}