{"id":24168,"date":"2022-09-26T18:16:54","date_gmt":"2022-09-26T10:16:54","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=24168"},"modified":"2022-09-26T18:27:11","modified_gmt":"2022-09-26T10:27:11","slug":"how-to-protect-against-malware-attack","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/how-to-protect-against-malware-attack\/","title":{"rendered":"How to Protect Against Malware Attacks: Beginner&#8217;s Guide"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24176 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=696%2C364&#038;ssl=1\" alt=\"Against malware attacks for beginners\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n\n<p>Traditional antivirus solutions are ineffective at keeping <a href=\"https:\/\/www.exabytes.sg\/web-security\/sucuri-website-security\" target=\"_blank\" rel=\"noopener\">malware <\/a>at bay. Users may be blind to malware in zip format and may miss advanced threats that use social engineering techniques.<\/p>\n<p>According to Statista, the number of malware attacks worldwide <a href=\"https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/#:~:text=During%20the%20first%20half%20of,attacks%20reported%20across%20the%20globe.\" target=\"_blank\" rel=\"noopener\">reached 2.8 billion in the first half of 2022<\/a>. In 2021, 5.4 billion malware attacks were detected.<\/p>\n<p>In recent years, the most malware attacks were detected in 2018, when 10.5 billion such attacks were reported globally.<\/p>\n<p>Legacy antivirus solutions may also struggle to detect automated <a href=\"https:\/\/www.exabytes.sg\/web-security\/sucuri-website-security\" target=\"_blank\" rel=\"noopener\">malware attacks<\/a> such as phishing, ransomware, spyware, and viruses that are cleverly hidden in email.<\/p>\n<p>Infecting a system with malware to steal data or disrupt business is not a new tactic; a malware attacker may use various techniques to inject malicious code into the website&#8217;s code.<\/p>\n<h2><b>What is Malware?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24177 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks.jpg?resize=696%2C464&#038;ssl=1\" alt=\"malware attacks\" width=\"696\" height=\"464\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=2048%2C1365&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=696%2C464&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=1068%2C712&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=171%2C114&amp;ssl=1 171w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?resize=630%2C420&amp;ssl=1 630w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attacks-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infecting a system with <\/span><b>malware <\/b><span style=\"font-weight: 400;\">to steal data or disrupt corporate operations is not a new approach; it has been around since 1988.<\/span><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\"><b>Malware<\/b><\/a><span style=\"font-weight: 400;\">, short for &#8220;malicious software,&#8221; is a computer program meant to infect a legitimate user&#8217;s computer and cause harm in various ways. <\/span><\/p>\n<p>Malware <span style=\"font-weight: 400;\">may attack computers and devices in a variety of ways and takes many forms, including viruses, worms, <a href=\"https:\/\/www.exabytes.sg\/blog\/how-to-protect-from-ransomware\/\" target=\"_blank\" rel=\"noopener\">Trojans<\/a>, spyware, and others. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is critical that all users understand how to identify and defend themselves from <\/span>malware <span style=\"font-weight: 400;\">in all of its forms.<\/span><\/p>\n<p><b>Malware attacks <\/b><span style=\"font-weight: 400;\">occur in a dizzying array of ways. Computer viruses are arguably the most well-known sort of <\/span>malware<span style=\"font-weight: 400;\">, so named because they propagate by replicating themselves. <\/span><\/p>\n<p>Worms share a similar characteristic. Other varieties of malware, such as spyware, are called by the function they perform: When spyware is used, it transfers personal information such as credit card numbers.<\/p>\n<p><span style=\"font-weight: 400;\">People often ask the question,<\/span><b> &#8220;<\/b><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\"><b>How do I scan my website for malware<\/b><\/a>?<b>&#8220;<\/b><\/p>\n<p>Simply copy\/paste the URL into the search box and press Enter to see if the link is malware attack secure.<\/p>\n<p>The URL checker for Google Safe Browsing will work like a malware scanner on the link and provide a quick evaluation of the validity and reputation of the website.<\/p>\n<p>Using Google&#8217;s URL scanner couldn&#8217;t be simpler.<\/p>\n<h2><b>Types of Malware Attack<\/b><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24182 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types.jpg?resize=696%2C464&#038;ssl=1\" alt=\"malware attack types\" width=\"696\" height=\"464\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=2048%2C1365&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=696%2C464&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=1068%2C712&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=171%2C114&amp;ssl=1 171w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?resize=630%2C420&amp;ssl=1 630w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-attack-types-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Malware <span style=\"font-weight: 400;\">behaves in a variety of ways. <\/span>Malware may be disguised in email attachments or may spy on individuals via their device&#8217;s camera.<\/p>\n<h3><b>1# Worm<\/b><\/h3>\n<p>Worms are a sort of malware that spreads from computer to computer without infecting other things on the same machine.<\/p>\n<h3><b>2# Adware<\/b><\/h3>\n<p>Adware is an abbreviation for advertising-supported software. People may unintentionally consent to the download of adware. This form of malware is to blame for unauthorized pop-up advertisements.<\/p>\n<h3><b>3# Spyware<\/b><\/h3>\n<p>Spyware differs from the other categories of malware in that it is not a technical term, but rather a catch-all phrase for programs such as adware, riskware, and Trojans.<\/p>\n<h3><b>4# Virus<\/b><\/h3>\n<p>A virus is a sort of malware that may replicate itself and spread throughout a user&#8217;s device&#8217;s system.<\/p>\n<h3><b>5# Ransomware<\/b><\/h3>\n<p>Ransomware is a type of malware that restricts access to an individual&#8217;s device or holds files on their device hostage for a fee.<\/p>\n<p>Hackers use ransomware to extort money from consumers in exchange for restoring control of their devices.<\/p>\n<h3><b>7# Rootkit<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A rootkit is a <\/span><span style=\"font-weight: 400;\">software program<\/span><span style=\"font-weight: 400;\"> that thieves employ to avoid detection while gaining illegal access to a computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers employ rootkits to remotely access and steal information.<\/span><\/p>\n<h3><b>8# The Trojan horse<\/b><\/h3>\n<p>A Trojan horse, or Trojan for short, is malware that masquerades as a normal file yet performs a malicious function on the computer.<\/p>\n<p>People who download a Trojan may not understand that they are installing malware.<\/p>\n<h2><b>What Exactly is Malware Protection?<\/b><\/h2>\n<p>Malware security protection adds a crucial second layer of defence to a user&#8217;s computer or network.<\/p>\n<p>A strong antimalware software package like <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Security<\/a> is the foundation of any personal or commercial computer system&#8217;s technical defences.<\/p>\n<p>Well-designed <a href=\"https:\/\/www.exabytes.sg\/blog\/acronis-cyber-protect-vs-bitdefender\/\" target=\"_blank\" rel=\"noopener\">antivirus protection<\/a> like Acronis Cyber Security contains various features. It verifies that each freshly downloaded program is malware-free.<\/p>\n<p>It scans the computer on a regular basis to detect and eliminate any malware that may have snuck through. It is continually updated to detect most <a href=\"https:\/\/www.exabytes.sg\/blog\/acronis-cyber-protect-vs-bitdefender\/\" target=\"_blank\" rel=\"noopener\">malware attacks.<\/a><\/p>\n<h2><b>What are the best techniques for malware protection to protect against <\/b><b>malware attacks?<\/b><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24181 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks.jpg?resize=696%2C465&#038;ssl=1\" alt=\"malware protection\" width=\"696\" height=\"465\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=1024%2C684&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=768%2C513&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=1536%2C1025&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=2048%2C1367&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=696%2C465&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=1068%2C713&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=171%2C114&amp;ssl=1 171w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?resize=629%2C420&amp;ssl=1 629w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/malware-protection-against-malware-attacks-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h3><b>1. Refresh the frontline defences.<\/b><\/h3>\n<p>Follow application, system, and appliance security rules and best practices. Use a password manager and create unique passwords of at least 16 characters in length.<\/p>\n<p>Patch systems as soon as possible once security holes are discovered.<\/p>\n<p>Use <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Security<\/a> to prevent malware attacks.<\/p>\n<h3><b>2. Perform data backups and restore tests<\/b><\/h3>\n<p>Backup<span style=\"font-weight: 400;\"> procedures are crucial for preventing data loss.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One must enable a <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">data security solution <\/a><\/span><span style=\"font-weight: 400;\">in a world of fast-moving, network-based ransomware viruses and catastrophic cyber assaults.<\/span><\/p>\n<h3><b>3. Inform users about potential threats.<\/b><\/h3>\n<p>Teach people who and what to trust and how to avoid malware attacks and other frauds. As the first layer of defence, have them implement two-factor authentication.<\/p>\n<h3><b>4. Segment the company&#8217;s network<\/b><\/h3>\n<p>Reduce the risk of malware attacks spreading by separating the network through network segmentation.<\/p>\n<h3><b>5. Make use of email security<\/b><\/h3>\n<p>The majority of ransomware malware attack infestations are distributed via email attachments or rogue downloads.<\/p>\n<p>Use a multi-tiered <a href=\"https:\/\/www.exabytes.sg\/blog\/cyber-security-threats-predictions\/\" target=\"_blank\" rel=\"noopener\">cyber security strategy<\/a> and a company-approved <a href=\"https:\/\/www.exabytes.my\/blog\/proper-data-backup-solution-malaysia\/\" target=\"_blank\" rel=\"noopener\">file-sharing tool<\/a> to diligently prevent fraudulent websites, emails, and attachments.<\/p>\n<h3><b>6. Make use of security analytics<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Monitor the network traffic closely by running deeper and more comprehensive analytics to observe what&#8217;s going on throughout the network. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To better comprehend security information and future<\/span> malware attacks<span style=\"font-weight: 400;\">, use real-time threat intelligence from firms such as Talos.<\/span><\/p>\n<h4><b>Conclusion<\/b><\/h4>\n<p>It is critical to have a malware attack plan in place, whether one manages <a href=\"https:\/\/www.exabytes.sg\/web-security\/sucuri-website-security\" target=\"_blank\" rel=\"noopener\">website security<\/a> for his clients or utilizes a third party.<\/p>\n<p>It may not be wise to put off thinking about website security until you get a call from a panicked client. Businesses can get help from experts and set up <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Security<\/a> to prevent malware attacks.<\/p>\n<p>Get Acronis Cyber Security from Exabytes Singapore and protect your data against any cyber threat with a single solution that includes <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">anti-malware<\/a>, anti-virus, and <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">anti-ransomware protection<\/a>.<\/p>\n<p>Engage with a cyber security specialist from Exabytes for more information and <a href=\"https:\/\/api.whatsapp.com\/send?phone=6567272279\" rel=\"noopener\">instant signup<\/a>.<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\"><span class=\"td_btn td_btn_md td_default_btn\">Contact Us<\/span><\/a><\/p>\n<p>Related articles:<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/acronis-cyber-protect-vs-bitdefender\/\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Protect vs. Bitdefender: Which is the Better?<\/a><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/cyber-security-threats-predictions\/\" target=\"_blank\" rel=\"noopener\">20 Top Cyber Security Threats in 2022\/2023 Prediction<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional antivirus solutions are ineffective at keeping malware at bay. Users may be blind to malware in zip format and may miss advanced threats that use social engineering techniques. According to Statista, the number of malware attacks worldwide reached 2.8 billion in the first half of 2022. In 2021, 5.4 billion malware attacks were detected. [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":24176,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293],"tags":[540,147],"class_list":{"0":"post-24168","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"tag-cybersecurity","9":"tag-malware"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/against-malware-attacks-beginners.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6hO","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=24168"}],"version-history":[{"count":6,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24168\/revisions"}],"predecessor-version":[{"id":24183,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24168\/revisions\/24183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/24176"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=24168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=24168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=24168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}