{"id":1102,"date":"2018-10-03T19:23:39","date_gmt":"2018-10-03T23:23:39","guid":{"rendered":"https:\/\/orendasecurity.com\/?p=1102"},"modified":"2019-11-01T19:34:40","modified_gmt":"2019-11-01T23:34:40","slug":"comment-lexecution-est-devenue-une-menace","status":"publish","type":"post","link":"https:\/\/orendasecurity.com\/fr\/blog\/comment-lexecution-est-devenue-une-menace\/","title":{"rendered":"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE"},"content":{"rendered":"<p>Lorsque nous pensons aux cybermenaces, nous pensons aux virus malveillants, aux logiciels espions et, plus r\u00e9cemment, aux ran\u00e7ongiciels. Nous nous soucions habituellement des attaques potentielles provenant de l\u2019ext\u00e9rieur. Aujourd\u2019hui cependant, une nouvelle menace hante le cyberespace et infecte les entreprises de l\u2019interne, et c\u2019est quelque chose que les entreprises utilisent tous les jours sans y penser: l\u2019ex\u00e9cution.<\/p>\n<p><strong>Comment cela fonctionne<\/strong><\/p>\n<p>Chaque logiciel que nous utilisons a une ex\u00e9cution, que ce soit via le r\u00e9seau de l\u2019entreprise, des\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/cloud-security-solutions\/\">services infonuagiques<\/a>, ou des applications mobiles.<\/p>\n<p>Les auteurs de menaces ont d\u00e9couvert comment utiliser l\u2019ex\u00e9cution contre les entreprises, semant des \u00e9l\u00e9ments de donn\u00e9es apparemment inoffensifs dans les serveurs d\u2019applications. Ils ciblent les courriels, les outils de productivit\u00e9, les applications mobiles, les m\u00e9dias sociaux et l\u2019internet des objets (IoT). Lorsque ces programmes sont activ\u00e9s par un utilisateur, les \u00e9l\u00e9ments de donn\u00e9es se m\u00e9tamorphosent en code malveillant pendant l\u2019ex\u00e9cution. Parce que les applications transmettent des renseignements \u00e0 la m\u00e9moire vive (RAM) et \u00e0 la m\u00e9moire partag\u00e9e du CPU, le code malveillant force les applications \u00e0 transmettre les renseignements au mauvais emplacement dans la m\u00e9moire partag\u00e9e. Cela permet aux auteurs de menaces d\u2019acc\u00e9der \u00e0 tout type de donn\u00e9es et de les voler. Les auteurs de menaces cherchent \u00e0 \u00e9lever des privil\u00e8ges et \u00e0 ins\u00e9rer davantage de code malveillant pour mettre la main sur tout et n\u2019importe quoi. La manipulation de l\u2019ex\u00e9cution est un processus sophistiqu\u00e9 qui permet de croire que les d\u00e9veloppeurs de code \u00e9lites en sont responsables.<\/p>\n<p>https:\/\/orendasecurity.com\/services\/cloud-security<\/p>\n<p><strong>La vue d\u2019ensemble<\/strong><\/p>\n<p>L\u2019ex\u00e9cution est une composante de plus grandes cyberattaques, telles les ran\u00e7ongiciels, et est utilis\u00e9e pour forcer la porte afin d\u2019obtenir un plus grand acc\u00e8s aux donn\u00e9es de l\u2019entreprise. En octobre 2017, le service national de la sant\u00e9 (NHS) d\u2019Angleterre a \u00e9t\u00e9 attaqu\u00e9 par un ran\u00e7ongiciel parce qu\u2019ils n\u2019avaient pas pris les pr\u00e9cautions requises pour se prot\u00e9ger. NHS Digital a r\u00e9alis\u00e9 une \u00e9valuation de s\u00e9curit\u00e9 et d\u00e9couvert que 88 des 236 organismes ne rencontraient pas les standards de cybers\u00e9curit\u00e9 avant l\u2019attaque, et qu\u2019aucune modification n\u2019avait \u00e9t\u00e9 apport\u00e9e.<\/p>\n<p>Dans ce cas, l\u2019attaque par ran\u00e7ongiciel n\u2019a pas seulement impact\u00e9 les patients \u00e0 un niveau technique mais \u00e9galement au niveau de leur sant\u00e9. Par suite de l\u2019attaque par ran\u00e7ongiciel, pr\u00e8s de 7000 rendez-vous ont \u00e9t\u00e9 annul\u00e9s, incluant des op\u00e9rations et des r\u00e9f\u00e9rences urgentes pour environ 140 patients potentiellement atteints d\u2019un cancer.<\/p>\n<p>L\u2019industrie des soins de sant\u00e9 ne peut se permettre de rester vuln\u00e9rable avec tous les renseignements confidentiels contenus dans leurs bases de donn\u00e9es. Les \u00e9tablissements de soins de sant\u00e9 doivent implanter des hauts standards de s\u00e9curit\u00e9 s\u2019ils veulent assurer la confidentialit\u00e9 et des soins complets pour leurs patients.<\/p>\n<p><strong>Se pr\u00e9parer \u00e0 une attaque<\/strong><\/p>\n<p>Les attaques par ex\u00e9cution en sont \u00e0 leurs d\u00e9buts, mais la technologie \u00e9volue rapidement, ce qui veut dire que votre entreprise pourrait \u00eatre la prochaine cible d\u2019une version plus virulente de menace par ex\u00e9cution. La plupart du temps, les entreprises sont victimes de cyberattaques parce qu\u2019elles n\u2019ont pas fait le strict minimum, comme mettre \u00e0 jour et appliquer les correctifs \u00e0 leurs logiciels. Pourquoi prendre le risque et attendre une attaque? Am\u00e9liorez votre cybers\u00e9curit\u00e9 en utilisant nos services.<\/p>\n<p>Orenda Security est une \u00e9quipe de professionnels qui se sp\u00e9cialisent en <a href=\"https:\/\/orendasecurity.com\/services\/dynamic-application-security-testing\/\">DAST<\/a>\u00a0et en\u00a0<a href=\"https:\/\/orendasecurity.com\/services\/application-assessments\">\u00e9valuation d\u2019applications<\/a>. Nos professionnels peuvent personnaliser nos tests d\u2019intrusion pour optimiser votre syst\u00e8me. Nous avons les connaissances et l\u2019expertise pour prot\u00e9ger vos donn\u00e9es et celles de vos clients des cybermenaces. Laissez nos services de DAST d\u00e9l\u00e9gu\u00e9s habiliter votre \u00e9quipe de d\u00e9veloppement en nous contactant d\u00e8s aujourd\u2019hui \u00e0 Info@orendasecurity.com ou demandez une soumission!<\/p>\n<p>&nbsp;<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-1102\" data-postid=\"1102\" class=\"themify_builder_content themify_builder_content-1102 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Lorsque nous pensons aux cybermenaces, nous pensons aux virus malveillants, aux logiciels espions et, plus r\u00e9cemment, aux ran\u00e7ongiciels. Nous nous soucions habituellement des attaques potentielles provenant de l\u2019ext\u00e9rieur. Aujourd\u2019hui cependant, une nouvelle menace hante le cyberespace et infecte les entreprises de l\u2019interne, et c\u2019est quelque chose que les entreprises utilisent tous les jours sans y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[42],"tags":[],"class_list":["post-1102","post","type-post","status-publish","format-standard","hentry","category-securite-de-linformation","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE - Orenda Security<\/title>\n<meta name=\"description\" content=\"Une nouvelle menace menace le cyber-monde et infecte les entreprises de l\u2019int\u00e9rieur. C\u2019est quelque chose que les entreprises utilisent tous les jours sans r\u00e9fl\u00e9chir: le temps d\u2019ex\u00e9cution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE - Orenda Security\" \/>\n<meta property=\"og:description\" content=\"Une nouvelle menace menace le cyber-monde et infecte les entreprises de l\u2019int\u00e9rieur. C\u2019est quelque chose que les entreprises utilisent tous les jours sans r\u00e9fl\u00e9chir: le temps d\u2019ex\u00e9cution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Orenda Security\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-03T23:23:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-01T23:34:40+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\"},\"headline\":\"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE\",\"datePublished\":\"2018-10-03T23:23:39+00:00\",\"dateModified\":\"2019-11-01T23:34:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"articleSection\":[\"S\u00e9curit\u00e9 de l'information\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/\",\"name\":\"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE - Orenda Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\"},\"datePublished\":\"2018-10-03T23:23:39+00:00\",\"dateModified\":\"2019-11-01T23:34:40+00:00\",\"description\":\"Une nouvelle menace menace le cyber-monde et infecte les entreprises de l\u2019int\u00e9rieur. C\u2019est quelque chose que les entreprises utilisent tous les jours sans r\u00e9fl\u00e9chir: le temps d\u2019ex\u00e9cution.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/es\\\/blog\\\/how-runtime-has-become-a-threat-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"name\":\"Orenda Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/orendasecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#organization\",\"name\":\"Orenda Security\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"contentUrl\":\"https:\\\/\\\/orendasecurity.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/OrendaSecurity__Logo.png\",\"width\":432,\"height\":173,\"caption\":\"Orenda Security\"},\"image\":{\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/orendasecurity.com\\\/#\\\/schema\\\/person\\\/71e78bbd148633574ef05cbd43aa3789\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/orendasecurity.com\\\/fr\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE - Orenda Security","description":"Une nouvelle menace menace le cyber-monde et infecte les entreprises de l\u2019int\u00e9rieur. C\u2019est quelque chose que les entreprises utilisent tous les jours sans r\u00e9fl\u00e9chir: le temps d\u2019ex\u00e9cution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/","og_locale":"fr_FR","og_type":"article","og_title":"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE - Orenda Security","og_description":"Une nouvelle menace menace le cyber-monde et infecte les entreprises de l\u2019int\u00e9rieur. C\u2019est quelque chose que les entreprises utilisent tous les jours sans r\u00e9fl\u00e9chir: le temps d\u2019ex\u00e9cution.","og_url":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/","og_site_name":"Orenda Security","article_published_time":"2018-10-03T23:23:39+00:00","article_modified_time":"2019-11-01T23:34:40+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/#article","isPartOf":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/"},"author":{"name":"admin","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789"},"headline":"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE","datePublished":"2018-10-03T23:23:39+00:00","dateModified":"2019-11-01T23:34:40+00:00","mainEntityOfPage":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/"},"wordCount":679,"publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"articleSection":["S\u00e9curit\u00e9 de l'information"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/","url":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/","name":"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE - Orenda Security","isPartOf":{"@id":"https:\/\/orendasecurity.com\/#website"},"datePublished":"2018-10-03T23:23:39+00:00","dateModified":"2019-11-01T23:34:40+00:00","description":"Une nouvelle menace menace le cyber-monde et infecte les entreprises de l\u2019int\u00e9rieur. C\u2019est quelque chose que les entreprises utilisent tous les jours sans r\u00e9fl\u00e9chir: le temps d\u2019ex\u00e9cution.","breadcrumb":{"@id":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/orendasecurity.com\/es\/blog\/how-runtime-has-become-a-threat-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orendasecurity.com\/fr\/"},{"@type":"ListItem","position":2,"name":"COMMENT L\u2019EX\u00c9CUTION EST DEVENUE UNE MENACE"}]},{"@type":"WebSite","@id":"https:\/\/orendasecurity.com\/#website","url":"https:\/\/orendasecurity.com\/","name":"Orenda Security","description":"","publisher":{"@id":"https:\/\/orendasecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orendasecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/orendasecurity.com\/#organization","name":"Orenda Security","url":"https:\/\/orendasecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","contentUrl":"https:\/\/orendasecurity.com\/wp-content\/uploads\/2019\/08\/OrendaSecurity__Logo.png","width":432,"height":173,"caption":"Orenda Security"},"image":{"@id":"https:\/\/orendasecurity.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/orendasecurity.com\/#\/schema\/person\/71e78bbd148633574ef05cbd43aa3789","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0bd3dc4178cf2a15d73d4bebfcdb5d4d02946737d7635bc4749f7b0d68d1bc58?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/orendasecurity.com\/fr\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/comments?post=1102"}],"version-history":[{"count":0,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/posts\/1102\/revisions"}],"wp:attachment":[{"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/media?parent=1102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/categories?post=1102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orendasecurity.com\/fr\/wp-json\/wp\/v2\/tags?post=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}