{"id":5957,"date":"2021-11-11T16:58:31","date_gmt":"2021-11-11T14:58:31","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog\/?p=5957"},"modified":"2021-11-12T06:48:24","modified_gmt":"2021-11-12T04:48:24","slug":"hashicorp-vault-protect-databases","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/","title":{"rendered":"How to Prevent Data Leaks if Hackers Get Access to your Database?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Every week we hear about the latest website to get hacked, and hackers getting access to another database with consumers\u2019 personal data inside.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just in the last week there have been numerous reports of hacking, including stealing the medical records of 290,000 patients of the \u201cMor Medical Institute,\u201d and releasing data of 1 million subscribers of a popular dating app.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of this information was taken from databases containing private and sensitive information, which were stored in the website in an insecure manner.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5959\" src=\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg\" alt=\"security\" width=\"640\" height=\"405\" srcset=\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/2021\/11\/security.jpg 640w, https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/2021\/11\/security-300x190.jpg 300w, https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/2021\/11\/security-150x95.jpg 150w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The hackers allegedly gained access to the IIS server (Microsoft\u2019s <\/span><span style=\"font-weight: 400;\">Internet Information Services<\/span><span style=\"font-weight: 400;\">) by hacking the hosting company, so they got access to all hosted websites. Then they reached out to the code as well as the databases, got all the passwords &#8211; which were exposed without hashing (e.g. as a clear text), so they could gain access to all information in the databases.<\/span><\/p>\n<h3>There is a simple solution that could have prevented this<\/h3>\n<p><span style=\"font-weight: 400;\">One way to solve this, a solution that has already become a de-facto standard in recent years, is to use the <\/span><i><span style=\"font-weight: 400;\">HashiCorp Vault<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a popular open source product, and there is even a free edition that is often sufficient, while building the solution does not take too long.<\/span><\/p>\n<h3>Using HashiCorp Vault allows you to:<\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prevent entering the database\u2019s username and password to your code &#8211; which prevents access to the database even if someone gets access to the code.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encryption mechanism without knowing the key &#8211; i.e . When you want to encrypt information before it goes into the database, you can use <\/span><i><span style=\"font-weight: 400;\">Vault<\/span><\/i><span style=\"font-weight: 400;\"> in a manner so that the application isn\u2019t familiar with the encryption key &#8211; then the information inside the database is useless for hackers, and even if they get access to the code &#8211; they do not know the encryption key!<\/span><\/li>\n<\/ol>\n<p>This would prevent access to the data itself even if hackers could reach the database, which in fact prevents the hackers from accessing the important and sensitive information they were trying to obtain.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"alm-box\">\n<p><em>We (ALM-Toolbox) are the official representative of HashiCorp Vault in many countries including France and Israel, and we offer end-to-end solutions for Vault.<\/em><br \/>\n<em>We can inspect your current system, plan a solution that fits your needs and quickly implement it.<\/em><br \/>\n<em>We also provide ongoing support including managed service, SLA, Enterprise capabilities and Enterprise subscription licenses.<\/em><br \/>\n<em>We also provide HashiCorp Vault training and secure development training.For more details contact us: <a href=\"mailto:hashicorp@almtoolbox.com\">hashicorp@almtoolbox.com<\/a> or +31 85 064 4633<\/em><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p><b>Related links<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/www.ynetnews.com\/article\/rye2poyvt\"><span style=\"font-weight: 400;\">https:\/\/www.ynetnews.com\/article\/rye2poyvt<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.haaretz.com\/israel-news\/tech-news\/.premium-iranian-linked-hackers-release-data-from-israeli-lgbtq-dating-app-1.10348331\"><span style=\"font-weight: 400;\">Hackers Release Data of 1 million subscribers of a dating app<\/span><\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Every week we hear about the latest website to get hacked, and hackers getting access to another database with consumers\u2019 personal data inside. Just in the last week there have been numerous reports of hacking, including stealing the medical records of 290,000 patients of the \u201cMor Medical Institute,\u201d and releasing data of 1 million subscribers [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5959,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[212],"tags":[],"class_list":["post-5957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vault"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Prevent Data Leaks if Hackers Get Access to your Database? - ALMtoolbox News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Data Leaks if Hackers Get Access to your Database? - ALMtoolbox News\" \/>\n<meta property=\"og:description\" content=\"Every week we hear about the latest website to get hacked, and hackers getting access to another database with consumers\u2019 personal data inside. Just in the last week there have been numerous reports of hacking, including stealing the medical records of 290,000 patients of the \u201cMor Medical Institute,\u201d and releasing data of 1 million subscribers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"ALMtoolbox News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/almtoolbox.israel\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-11T14:58:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-12T04:48:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tamir Gefen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Dikla\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tamir Gefen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\"},\"author\":{\"name\":\"Tamir Gefen\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/409e35aa3486f92208065230bb6ebb63\"},\"headline\":\"How to Prevent Data Leaks if Hackers Get Access to your Database?\",\"datePublished\":\"2021-11-11T14:58:31+00:00\",\"dateModified\":\"2021-11-12T04:48:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\"},\"wordCount\":446,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg\",\"articleSection\":[\"Vault\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\",\"name\":\"How to Prevent Data Leaks if Hackers Get Access to your Database? - ALMtoolbox News\",\"isPartOf\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg\",\"datePublished\":\"2021-11-11T14:58:31+00:00\",\"dateModified\":\"2021-11-12T04:48:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg\",\"contentUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg\",\"width\":640,\"height\":405,\"caption\":\"security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.almtoolbox.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent Data Leaks if Hackers Get Access to your Database?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#website\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/\",\"name\":\"ALMtoolbox News\",\"description\":\"All the news of ALMtoolbox\",\"publisher\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.almtoolbox.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#organization\",\"name\":\"ALMtoolbox\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png\",\"contentUrl\":\"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png\",\"width\":410,\"height\":190,\"caption\":\"ALMtoolbox\"},\"image\":{\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/almtoolbox.israel\/\",\"https:\/\/www.linkedin.com\/company\/almtoolbox\/\",\"https:\/\/www.youtube.com\/user\/GoMidjets\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/409e35aa3486f92208065230bb6ebb63\",\"name\":\"Tamir Gefen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3d4df00aa386b2805c42441dfebcedd46abf25846febb352f00c11524d994c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3d4df00aa386b2805c42441dfebcedd46abf25846febb352f00c11524d994c4?s=96&d=mm&r=g\",\"caption\":\"Tamir Gefen\"},\"sameAs\":[\"https:\/\/x.com\/Dikla\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent Data Leaks if Hackers Get Access to your Database? - ALMtoolbox News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Data Leaks if Hackers Get Access to your Database? - ALMtoolbox News","og_description":"Every week we hear about the latest website to get hacked, and hackers getting access to another database with consumers\u2019 personal data inside. Just in the last week there have been numerous reports of hacking, including stealing the medical records of 290,000 patients of the \u201cMor Medical Institute,\u201d and releasing data of 1 million subscribers [&hellip;]","og_url":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/","og_site_name":"ALMtoolbox News","article_publisher":"https:\/\/www.facebook.com\/almtoolbox.israel\/","article_published_time":"2021-11-11T14:58:31+00:00","article_modified_time":"2021-11-12T04:48:24+00:00","og_image":[{"width":640,"height":405,"url":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg","type":"image\/jpeg"}],"author":"Tamir Gefen","twitter_card":"summary_large_image","twitter_creator":"@Dikla","twitter_misc":{"Written by":"Tamir Gefen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#article","isPartOf":{"@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/"},"author":{"name":"Tamir Gefen","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/409e35aa3486f92208065230bb6ebb63"},"headline":"How to Prevent Data Leaks if Hackers Get Access to your Database?","datePublished":"2021-11-11T14:58:31+00:00","dateModified":"2021-11-12T04:48:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/"},"wordCount":446,"commentCount":0,"publisher":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg","articleSection":["Vault"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/","url":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/","name":"How to Prevent Data Leaks if Hackers Get Access to your Database? - ALMtoolbox News","isPartOf":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage"},"image":{"@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg","datePublished":"2021-11-11T14:58:31+00:00","dateModified":"2021-11-12T04:48:24+00:00","breadcrumb":{"@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#primaryimage","url":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg","contentUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2021\/11\/security.jpg","width":640,"height":405,"caption":"security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.almtoolbox.com\/blog\/hashicorp-vault-protect-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.almtoolbox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Prevent Data Leaks if Hackers Get Access to your Database?"}]},{"@type":"WebSite","@id":"https:\/\/www.almtoolbox.com\/blog\/#website","url":"https:\/\/www.almtoolbox.com\/blog\/","name":"ALMtoolbox News","description":"All the news of ALMtoolbox","publisher":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.almtoolbox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.almtoolbox.com\/blog\/#organization","name":"ALMtoolbox","url":"https:\/\/www.almtoolbox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png","contentUrl":"https:\/\/www.almtoolbox.com\/blog\/wp-content\/uploads\/\/2015\/10\/logo.png","width":410,"height":190,"caption":"ALMtoolbox"},"image":{"@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/almtoolbox.israel\/","https:\/\/www.linkedin.com\/company\/almtoolbox\/","https:\/\/www.youtube.com\/user\/GoMidjets"]},{"@type":"Person","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/409e35aa3486f92208065230bb6ebb63","name":"Tamir Gefen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.almtoolbox.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3d4df00aa386b2805c42441dfebcedd46abf25846febb352f00c11524d994c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3d4df00aa386b2805c42441dfebcedd46abf25846febb352f00c11524d994c4?s=96&d=mm&r=g","caption":"Tamir Gefen"},"sameAs":["https:\/\/x.com\/Dikla"]}]}},"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts\/5957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/comments?post=5957"}],"version-history":[{"count":14,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts\/5957\/revisions"}],"predecessor-version":[{"id":5974,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/posts\/5957\/revisions\/5974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/media\/5959"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/media?parent=5957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/categories?post=5957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog\/wp-json\/wp\/v2\/tags?post=5957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}