{"id":47113,"date":"2023-07-25T10:55:41","date_gmt":"2023-07-25T09:55:41","guid":{"rendered":"https:\/\/www.n-able.com\/?p=47113"},"modified":"2023-07-27T11:02:37","modified_gmt":"2023-07-27T10:02:37","slug":"top-4-methods-used-to-attack-networks-and-how-to-defend","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend","title":{"rendered":"Top 4 Methods Used to Attack Networks (And How to Defend)"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">Threat actors use a number of different techniques to gain access to company networks so that they can deliver ransomware payloads. In this blog, we look at four of the most common techniques currently being used to attack networks. The intent is to help MSPs and IT admins understand where the threats are coming from, and then where to focus their attention in order to protect their (or their customers\u2019) networks. <\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Where Do Most Network Threats Originate?<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">In a recent <a href=\"https:\/\/www.youtube.com\/playlist?list=PLbQNWS_ICkw2TFgAeLuSnM3QN7O8uGkov\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Cyber Insurance Webinar<\/span><\/a>, cyber security expert Dr Siegfried Rasthofer, set out what he saw as the most common techniques threat actors are using to get into our systems. These included: <\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">1.Social Engineering<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">Even for big ransomware gangs, social engineering attacks like phishing are still one of the most popular\u2014and effective\u2014ways to deliver malware into an organization. Emails containing files, like infected Word, Excel, or PDF documents, can allow the bad guys to open up a back door and get a foothold in company\u2019s network, once those documents are opened by an unsuspecting user.<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">2. Credential Phishing <\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">This is where threat actors create a website that mimics, for example, an official Microsoft site, and encourages the user to enter their Windows account details. As an offshoot of this we\u2019re also seeing a rise in Call Back Phishing, where a user will get an email or SMS saying that they have a serious security issue with their device and that someone would like to give them a call back to resolve the problem. During that call the bad guys will attempt to get the victim to install remote access software and the malware will be installed through this. While this is a little more effort for the bad guys it can be very effective for them. <\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">3. Vulnerability Exploits<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">Any system that is public facing can be easily scanned for known vulnerabilities that haven\u2019t been patched, and then targeted for exploitation. While we necessarily make a big thing about Zero Day vulnerabilities, Dr Rasthofer pointed to a more concerning fact is that the majority of exploits he is seeing are actually to systems with N-Day vulnerabilities, where the vulnerabilities are already well known and have a patch available. Threat actors often use these well-known vulnerabilities to gain access and download their payload. There is also a version of this that uses brute force attacks to target external remote services like RDP. If your RDP is publicly exposed you need to think hard about whether this is actually necessary.<\/span><\/p>\n<h3 class=\"p2\"><span class=\"s1\">4. Initial Access Brokerage<\/span><\/h3>\n<p class=\"p2\"><span class=\"s1\">Here, threat actors (either groups or individuals) harvest company log-in credentials to gain access to systems. Once they have access, they don\u2019t try to make any movement within the network, instead they sell that access to other threat actors and ransomware gangs, who will then continue to go and do an attack. These credentials are normally readily available on different markets on the Dark Web and cost on average around $4600 for big organizations. <\/span><span class=\"s3\">Compromised RDP credentials can be purchased for much less, as low as a few dollars in bulk.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Security Procedures and Solutions to Help Defend Against Network Compromises<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">This is far from an exhaustive list of techniques being used but they do <\/span><span class=\"s3\">represent the more common vectors used by threat actors. A more comprehensive list of the tactics, techniques and procedures used by threat actors can be found in the <a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">Mitre ATT&amp;CK framework<\/span><\/a><\/span><span class=\"s1\">. However, knowing the above can help guide you to some of the most effective methods to protect your network, including (but not limited to):<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p3\"><span class=\"s6\"><a href=\"https:\/\/www.n-able.com\/products\/mail-assure\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Email protection<\/span><\/a><\/span><span class=\"s1\"> to stop phishing email from getting through.<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Security awareness training so people can spot a phishing attack and know what to do.<\/span><\/li>\n<li class=\"p3\"><span class=\"s1\">Dark Web monitoring to know if your credentials have been compromised and are up for sale.<\/span><\/li>\n<li class=\"p3\"><span class=\"s6\"><a href=\"https:\/\/www.n-able.com\/products\/dns-filtering\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">DNS filtering<\/span><\/a><\/span><span class=\"s1\"> and web protection to block spoof or malicious sites<\/span><span class=\"s3\"> and prevent communication with C2 servers.<\/span><span class=\"s1\"> <\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Documented and auditable vulnerability management processes that include timely application of OS and application patches and updates. This can be achieved using patch management in both <a href=\"https:\/\/www.n-able.com\/products\/n-sight-rmm\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">N&#8209;sight<\/span><\/a> and N&#8209;central. <\/span><\/li>\n<li class=\"p4\"><span class=\"s1\">Monitoring for failed local login attempts on workstations and servers or remote login attempts. Again, this can be achieved using both N&#8209;sight and <a href=\"https:\/\/www.n-able.com\/products\/n-central-rmm\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">N&#8209;central<\/span><\/a>.<\/span><span class=\"s1\">\u00a0<\/span><\/li>\n<\/ul>\n<p class=\"p2\"><span class=\"s1\">Critically, you also need to have a solid <a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection\/backup\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">backup and recovery solution<\/span><\/a> in place so that when an incident occurs, you can get your systems back up online as quickly as possible, and with as little interruption and impact to your business as possible.<\/span><\/p>\n<p class=\"p2\"><span class=\"s4\"><a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection\" target=\"_blank\" rel=\"noopener\">Cove Data Protection<\/a><\/span><span class=\"s1\">, from N&#8209;able, offers frequent direct-to-cloud backups, stores your backup data isolated from your local network, and helps you recover quickly to the environment of your choice, including to a disaster-ready environment in Microsoft Azure. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Because Cove Data Protection isolates backup data from your local network, it can help mitigate against the <a href=\"https:\/\/attack.mitre.org\/techniques\/T1490\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">tactics used by active threat campaigns<\/span><\/a> and threat actors that seek to delete or modify data to prevent the ability to recover from an attack<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Having systems and solutions in place to protect your networks from attack, especially reliable backup and recovery, is becoming critical when it comes to managing and negotiating <a href=\"https:\/\/www.n-able.com\/blog\/cybersecurity-insurance-trends-key-takeaways-msps\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">cyber insurance<\/span><\/a>. You can watch the whole of <a href=\"https:\/\/www.youtube.com\/playlist?list=PLbQNWS_ICkw2TFgAeLuSnM3QN7O8uGkov\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Dr Rasthofer\u2019s Cyber Insurance Webinar<\/span><\/a> here.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><em><span class=\"s7\">Pete Roythorne is Senior Brand Content Editor for N&#8209;able<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors use many techniques to gain access to company networks. Pete Roythorne looks at some options MSPs have to help defend against them.<\/p>\n","protected":false},"author":63,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-47113","post","type-post","status-publish","format-standard","hentry","topic-backup-disaster-recovery","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top 4 Methods Used to Attack Networks (And How to Defend) - N-able<\/title>\n<meta name=\"description\" content=\"Threat actors use many techniques to gain access to company networks. This blog looks at some options MSPs have to help defend against them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 4 Methods Used to Attack Networks (And How to Defend) - N-able\" \/>\n<meta property=\"og:description\" content=\"Threat actors use many techniques to gain access to company networks. This blog looks at some options MSPs have to help defend against them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-25T09:55:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T10:02:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/07\/230717_blogbanner_RansomwareTechniques_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pete Roythorne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Roythorne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\"},\"author\":{\"name\":\"Pete Roythorne\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\"},\"headline\":\"Top 4 Methods Used to Attack Networks (And How to Defend)\",\"datePublished\":\"2023-07-25T10:55:41+01:00\",\"dateModified\":\"2023-07-27T10:02:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\"},\"wordCount\":888,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Backup &amp; Disaster Recovery\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\",\"name\":\"Top 4 Methods Used to Attack Networks (And How to Defend) - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2023-07-25T10:55:41+01:00\",\"dateModified\":\"2023-07-27T10:02:37+00:00\",\"description\":\"Threat actors use many techniques to gain access to company networks. This blog looks at some options MSPs have to help defend against them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Backup &amp; Disaster Recovery\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/backup-disaster-recovery\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 4 Methods Used to Attack Networks (And How to Defend)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\",\"name\":\"Pete Roythorne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"caption\":\"Pete Roythorne\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 4 Methods Used to Attack Networks (And How to Defend) - N-able","description":"Threat actors use many techniques to gain access to company networks. This blog looks at some options MSPs have to help defend against them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend","og_locale":"de_DE","og_type":"article","og_title":"Top 4 Methods Used to Attack Networks (And How to Defend) - N-able","og_description":"Threat actors use many techniques to gain access to company networks. This blog looks at some options MSPs have to help defend against them.","og_url":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-07-25T09:55:41+00:00","article_modified_time":"2023-07-27T10:02:37+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/07\/230717_blogbanner_RansomwareTechniques_ss.jpg","type":"image\/jpeg"}],"author":"Pete Roythorne","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Pete Roythorne","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend"},"author":{"name":"Pete Roythorne","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837"},"headline":"Top 4 Methods Used to Attack Networks (And How to Defend)","datePublished":"2023-07-25T10:55:41+01:00","dateModified":"2023-07-27T10:02:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend"},"wordCount":888,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Backup &amp; Disaster Recovery","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend","url":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend","name":"Top 4 Methods Used to Attack Networks (And How to Defend) - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2023-07-25T10:55:41+01:00","dateModified":"2023-07-27T10:02:37+00:00","description":"Threat actors use many techniques to gain access to company networks. This blog looks at some options MSPs have to help defend against them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/top-4-methods-used-to-attack-networks-and-how-to-defend#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Backup &amp; Disaster Recovery","item":"https:\/\/www.n-able.com\/de\/blog\/category\/backup-disaster-recovery"},{"@type":"ListItem","position":2,"name":"Top 4 Methods Used to Attack Networks (And How to Defend)"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837","name":"Pete Roythorne","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","caption":"Pete Roythorne"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/47113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=47113"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/47113\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=47113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}