{"id":24492,"date":"2023-04-27T09:25:17","date_gmt":"2023-04-27T07:25:17","guid":{"rendered":"https:\/\/www.advens.com\/?p=24492"},"modified":"2025-06-12T17:22:49","modified_gmt":"2025-06-12T15:22:49","slug":"chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.advens.com\/en\/media\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/","title":{"rendered":"ChatGPT, the best ally of hackers? Tips to protect yourself"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><strong>How Can a Cybercriminal Exploit ChatGPT?<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Use Case #1 \u2013 Easily and Quickly Creating Malware<\/strong><\/h2>\n\n\n\n<p>Writing the source code for undetectable malware used to be a significant undertaking. It later became easier thanks to the abundance of online tutorials, for example on YouTube. But today, it can be done in seconds using ChatGPT!<\/p>\n\n\n\n<p>Hackers save time while gaining access to nearly all publicly available knowledge on hacking, including methods for bypassing EDRs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Use Case #2 \u2013 Enhancing Social Engineering<\/strong><\/h2>\n\n\n\n<p>ChatGPT can also be used by attackers to develop their strategies, tools, and attack or compromise vectors.<\/p>\n\n\n\n<p>For example, one can ask ChatGPT to write spam or phishing emails that include malicious code and an infection chain. The result is high quality and generated in under a minute!<\/p>\n\n\n\n<p>This technique offers two key advantages for cybercriminals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Improved authenticity, personalization, and quality of messages, which are often lacking and can serve as red flags for identifying malicious content.<\/li>\n\n\n\n<li>Significant time savings, allowing cybercriminals to focus on the technical aspects of the attack.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Use Case #3 \u2013 Exploiting New Vulnerabilities<\/strong><\/h2>\n\n\n\n<p>ChatGPT could also greatly assist cybercriminals by making it easier to discover new vulnerabilities. That said, the tool would need to stay up to date and continuously index more cyber threat content. As a result, any exposed or poorly protected component is more than ever a real threat, serving as a potential entry point for attackers.<\/p>\n\n\n\n<p>Example: In response to the query \u201cCompany X\u2019s website is hosted by Y, tell me the latest security flaw I can exploit to launch an attack,\u201d a hacker could obtain a wealth of helpful information.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Using ChatGPT in the Workplace: The Risks<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Risk #1 \u2013 Using Data Without Owning the Intellectual Property<\/strong><\/h2>\n\n\n\n<p>For example, simply copying and pasting content generated by ChatGPT (without verifying the information) increases the risk of plagiarism.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Risk #2 \u2013 Hard-to-Verify Sources<\/strong><\/h2>\n\n\n\n<p>Another issue: ChatGPT does not allow users to control the sources of the generated information. As a result, the answers are harder to verify\u2014and since they often appear polished, users may be tempted to accept them as absolute truth.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Risk #3 \u2013 Increased Risk of Information Leaks<\/strong><\/h2>\n\n\n\n<p>Finally, ChatGPT may lead to the (intentional or unintentional) sharing of sensitive information with the tool, without knowing if or how it will be used later. Imagine your financial data or customer personal data becoming accessible through the tool!<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>How to Protect Against Malicious Uses of ChatGPT<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Tip #1 \u2013 Strengthen Your Cybersecurity Best Practices<\/strong><\/h2>\n\n\n\n<p>With ChatGPT, hackers\u2019 work becomes much easier: the time saved on creating malware and phishing emails (for example) allows them to design more complex and harder-to-detect attacks. Therefore, cybersecurity best practices must become a top priority to minimize the attack surface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Tip #2 \u2013 Continuously Monitor Attackers\u2019 New Tactics<\/strong><\/h2>\n\n\n\n<p>To strengthen cybersecurity, monitoring is essential: it helps assess the sophistication of attacks and avoid being caught off guard as they become more mature and harmful.<\/p>\n\n\n\n<p>This means implementing:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vulnerability monitoring to anticipate new flaws in components;<\/li>\n\n\n\n<li>Operational and strategic monitoring to closely follow attackers\u2019 evolving methods (see the MITRE framework for more);<\/li>\n\n\n\n<li>Legal monitoring to stay informed about laws related to AI-driven attacks (e.g., sensitive data leaks).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Cybersecurity Professionals: Is ChatGPT a Tool to Leverage?<\/strong><\/h1>\n\n\n\n<p>ChatGPT gives cybersecurity professionals reason to hesitate. This revolutionary virtual assistant can raise legitimate concerns\u2014but it can also be extremely useful in their daily work.<\/p>\n\n\n\n<p>It\u2019s a critical topic, which is why <strong>Advens<\/strong> will soon be exploring it further to evolve its security practices. Want to be part of this new journey?<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.advens.com\/en\/careers\/\">Join the Advens team!<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a significant undertaking. It later became easier thanks to the abundance of online tutorials, for example on YouTube. But today, it can be done in seconds using ChatGPT! Hackers save [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":24213,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[465],"tags":[],"custom_format":[471],"class_list":["post-24492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-news-en"],"acf":[],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ChatGPT, the best ally of hackers? Tips to protect yourself - Advens<\/title>\n<meta name=\"description\" content=\"How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ChatGPT, the best ally of hackers? Tips to protect yourself - Advens\" \/>\n<meta property=\"og:description\" content=\"How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T07:25:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-12T15:22:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Benjamin Leroux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\"},\"author\":{\"name\":\"Benjamin Leroux\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7\"},\"headline\":\"ChatGPT, the best ally of hackers? Tips to protect yourself\",\"datePublished\":\"2023-04-27T07:25:17+00:00\",\"dateModified\":\"2025-06-12T15:22:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\"},\"wordCount\":593,\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp\",\"articleSection\":[\"Cyber News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\",\"url\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\",\"name\":\"ChatGPT, the best ally of hackers? Tips to protect yourself - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp\",\"datePublished\":\"2023-04-27T07:25:17+00:00\",\"dateModified\":\"2025-06-12T15:22:49+00:00\",\"description\":\"How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp\",\"width\":620,\"height\":620},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber News\",\"item\":\"https:\/\/www.advens.com\/en\/cyber-news-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ChatGPT, the best ally of hackers? Tips to protect yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.com\/#website\",\"url\":\"https:\/\/www.advens.com\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.com\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7\",\"name\":\"Benjamin Leroux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g\",\"caption\":\"Benjamin Leroux\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/benjamin-leroux-1688a4\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ChatGPT, the best ally of hackers? Tips to protect yourself - Advens","description":"How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"ChatGPT, the best ally of hackers? Tips to protect yourself - Advens","og_description":"How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a","og_url":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/","og_site_name":"Advens","article_published_time":"2023-04-27T07:25:17+00:00","article_modified_time":"2025-06-12T15:22:49+00:00","og_image":[{"width":620,"height":620,"url":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp","type":"image\/webp"}],"author":"Benjamin Leroux","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/"},"author":{"name":"Benjamin Leroux","@id":"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7"},"headline":"ChatGPT, the best ally of hackers? Tips to protect yourself","datePublished":"2023-04-27T07:25:17+00:00","dateModified":"2025-06-12T15:22:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/"},"wordCount":593,"publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"image":{"@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp","articleSection":["Cyber News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/","url":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/","name":"ChatGPT, the best ally of hackers? Tips to protect yourself - Advens","isPartOf":{"@id":"https:\/\/www.advens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp","datePublished":"2023-04-27T07:25:17+00:00","dateModified":"2025-06-12T15:22:49+00:00","description":"How Can a Cybercriminal Exploit ChatGPT? Use Case #1 \u2013 Easily and Quickly Creating Malware Writing the source code for undetectable malware used to be a","breadcrumb":{"@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#primaryimage","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp","width":620,"height":620},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.com\/en\/cyber-news-en\/chatgpt-the-best-ally-of-hackers-tips-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber News","item":"https:\/\/www.advens.com\/en\/cyber-news-en\/"},{"@type":"ListItem","position":3,"name":"ChatGPT, the best ally of hackers? Tips to protect yourself"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.com\/#website","url":"https:\/\/www.advens.com\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.com\/#organization","name":"Advens","url":"https:\/\/www.advens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.com\/#\/schema\/person\/0a0cf6bfbcf86fdef2602cefe9b941c7","name":"Benjamin Leroux","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6130a303ba5e9000db1d968b9c41bf9e?s=96&d=mm&r=g","caption":"Benjamin Leroux"},"sameAs":["https:\/\/www.linkedin.com\/in\/benjamin-leroux-1688a4\/"]}]}},"featured_url":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/chatgpt-620x620-1.webp","_links":{"self":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/24492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/comments?post=24492"}],"version-history":[{"count":1,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/24492\/revisions"}],"predecessor-version":[{"id":24493,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/24492\/revisions\/24493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media\/24213"}],"wp:attachment":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media?parent=24492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/categories?post=24492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/tags?post=24492"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/custom_format?post=24492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}