{"id":11155,"date":"2020-03-10T14:47:26","date_gmt":"2020-03-10T13:47:26","guid":{"rendered":"https:\/\/www.itaf.eu\/?p=11155"},"modified":"2023-10-05T14:55:10","modified_gmt":"2023-10-05T12:55:10","slug":"sixth-generation-gen-6-of-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/","title":{"rendered":"Generation 6 of Cyber attacks"},"content":{"rendered":"<p>As we move into an era of far more connectivity \u2013 autonomous cars, millions of connected IoT (Internet of things) devices on all fronts (medical, smart cities and homes, etc.), we will need to provide security mechanisms based on AI.\u00a0 As the cyber attack vectors are ever-evolving, it is becoming increasingly challenging for companies and individuals to protect themselves from the dangers lurking in the digital landscape. Recent research shows that most companies operating these days are lacking basic cyber defenses. Those who have are only capable of combating with 3rd generation of cyber-attacks, and lacking knowledge and resources to defend against generation 6 of cyber attacks.<\/p>\n<p>Now to those who are unaware of the<strong> \u201cGeneration\u201d difference of cyber-attacks,<\/strong> here\u2019s the <strong>timeline.<\/strong><\/p>\n<h2>Generation 1<\/h2>\n<p>Started in the 1980s. The Generation 1 Cyber Attacks primarily distributed viruses to PCs and workstations using<strong> floppy disks.<\/strong><br \/>\nThis led to the invention of <strong>signature-based anti-virus solutions<\/strong>&#8211; with Norton likely being one of the first to introduce such technology.<\/p>\n<h2>Generation 2<\/h2>\n<p>In the Mid 90s, cyberattacks on <strong>networks<\/strong> paved the way to the next generation of attack evolution.<br \/>\nIn response, companies began implementing <strong>firewalls<\/strong> to secure the perimeters of IT infrastructures from cyber crooks.<\/p>\n<h2>Generation 3<\/h2>\n<p>This generation of cyber attacks was witnessed at the start of the 21st century where attackers started to focus their exploitation on <strong>industrial applications<\/strong>. Botnets were being used to send out spam paving the way for companies to introduce <strong>Intrusion Prevention Systems (IPS).<\/strong><\/p>\n<h2>Generation 4<\/h2>\n<p>Generation 4 of cyberattacks emerged around 2010, marked by governments worldwide using <strong>cyber tools as weapons for mass destruction<\/strong>. These attacks can be carried out by various entities, including nation-states, organized cybercriminal groups, and even advanced individual hackers, and are designed for specific objectives, such as espionage, disruption, or economic gain.<br \/>\nIn response to this escalating threat,<strong> Behavioral Analysis solutions<\/strong> were introduced to better detect and counter these targeted attacks.<\/p>\n<h2>Generation 5<\/h2>\n<p>The year 2016 witnessed the emergence of <strong>multi-vector attacks<\/strong> which were mostly<strong> state-sponsored<\/strong> and thus had the potential to destruct at a greater note.<br \/>\nTo prevent Generation 5 cyberattacks, organizations and governments have focused on implementing advanced threat hunting and response capabilities, enhancing cyber resilience, and fostering <strong>international cybersecurity cooperation.<\/strong><\/p>\n<h2>Generation 6<\/h2>\n<p>The attack may<strong> start with your smartphone<\/strong> and end up shutting down your data center after going through your <strong>cloud.<\/strong> As we move into an era of far more connectivity, <strong>security mechanisms must be based on AI.<\/strong><\/p>\n<h2>How can ITAF help you regarding generation 6 cyber-attacks?<\/h2>\n<p>If you need help with protecting your business and your brand, <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/contact-us\/#contactform\" target=\"_blank\" rel=\"noopener\">Contact ITAF<\/a>. Our experienced security experts can help you with installing and maintaining some of the most effective protection against any security risks, <a class=\"jshlink\" href=\"\/en\/security-awareness-training\/\" target=\"_blank\" rel=\"noopener\">training your employees<\/a>, and helping to defend your business from the lasting effects of hacking attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we move into an era of far more connectivity \u2013 autonomous cars, millions of connected IoT (Internet of things) devices on all fronts (medical, smart cities and homes, etc.), we will need to provide security mechanisms based on AI.\u00a0 As the cyber attack vectors are ever-evolving, it is becoming increasingly challenging for companies and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":45814,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[96],"tags":[],"class_list":["post-11155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Generation 6 of Cyber attacks - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Find out generation difference of cyber-attacks, their timeline and especially last generation - generation 6 cyber attacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generation 6 of Cyber attacks - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Find out generation difference of cyber-attacks, their timeline and especially last generation - generation 6 cyber attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-10T13:47:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-05T12:55:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/03\/Generation-6-of-Cyber-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dejan Janosevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dejan Janosevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/\"},\"author\":{\"name\":\"Dejan Janosevic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\"},\"headline\":\"Generation 6 of Cyber attacks\",\"datePublished\":\"2020-03-10T13:47:26+00:00\",\"dateModified\":\"2023-10-05T12:55:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/\"},\"wordCount\":457,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Generation-6-of-Cyber-attacks.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/\",\"name\":\"Generation 6 of Cyber attacks - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Generation-6-of-Cyber-attacks.jpg\",\"datePublished\":\"2020-03-10T13:47:26+00:00\",\"dateModified\":\"2023-10-05T12:55:10+00:00\",\"description\":\"Find out generation difference of cyber-attacks, their timeline and especially last generation - generation 6 cyber attacks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Generation-6-of-Cyber-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Generation-6-of-Cyber-attacks.jpg\",\"width\":1080,\"height\":600,\"caption\":\"Generation 6 of Cyber attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/sixth-generation-gen-6-of-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Generation 6 of Cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\",\"name\":\"Dejan Janosevic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/dejan-janosevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Generation 6 of Cyber attacks - ITAF IT Partner","description":"Find out generation difference of cyber-attacks, their timeline and especially last generation - generation 6 cyber attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Generation 6 of Cyber attacks - ITAF IT Partner","og_description":"Find out generation difference of cyber-attacks, their timeline and especially last generation - generation 6 cyber attacks","og_url":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2020-03-10T13:47:26+00:00","article_modified_time":"2023-10-05T12:55:10+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/03\/Generation-6-of-Cyber-attacks.jpg","type":"image\/jpeg"}],"author":"Dejan Janosevic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Dejan Janosevic","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/"},"author":{"name":"Dejan Janosevic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2"},"headline":"Generation 6 of Cyber attacks","datePublished":"2020-03-10T13:47:26+00:00","dateModified":"2023-10-05T12:55:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/"},"wordCount":457,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/03\/Generation-6-of-Cyber-attacks.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/","url":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/","name":"Generation 6 of Cyber attacks - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/03\/Generation-6-of-Cyber-attacks.jpg","datePublished":"2020-03-10T13:47:26+00:00","dateModified":"2023-10-05T12:55:10+00:00","description":"Find out generation difference of cyber-attacks, their timeline and especially last generation - generation 6 cyber attacks","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/03\/Generation-6-of-Cyber-attacks.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2020\/03\/Generation-6-of-Cyber-attacks.jpg","width":1080,"height":600,"caption":"Generation 6 of Cyber attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/sixth-generation-gen-6-of-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Generation 6 of Cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2","name":"Dejan Janosevic","url":"https:\/\/www.itaf.eu\/en\/author\/dejan-janosevic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/11155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=11155"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/11155\/revisions"}],"predecessor-version":[{"id":45742,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/11155\/revisions\/45742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/45814"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=11155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=11155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=11155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}