{"id":77396,"date":"2023-03-23T07:19:23","date_gmt":"2023-03-23T14:19:23","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/research-labs\/ot-icefall-copy\/"},"modified":"2024-04-11T05:58:55","modified_gmt":"2024-04-11T12:58:55","slug":"2022-threat-roundup","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/","title":{"rendered":"2022 Threat Roundup"},"content":{"rendered":"<h1>2022 Threat Roundup<\/h1>\n<p><a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\" class=\"u-display-inline-block u-line-height-0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png\" class=\"u-size-full\" alt=\"Threat Roundup\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">2022 Threat Roundup \u2013 The Emergence of Mixed IT\/IoT Threats <\/h2>\n<p>In 2022, cyberattacks grew in intensity, sophistication and frequency. The adoption of new connected devices by organizations in 2023 is likely to pose even greater challenges. To help organizations of all sizes prepare, Forescout\u2019s Vedere Labs has analyzed data gathered in 2022 about cyberattacks, exploits and malware and shared insights via our 2022 Threat Roundup.  <\/p>\n<p><a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Report\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Round-Up-100m-Attacks-2.png\" class=\"c-stats__img\" alt=\"Threat Round Up 100m Attacks\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n100 Million<\/h3>\n<p class=\"c-stats__text\">Attacks Jul. \u2013 Dec. 2022<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Round-Up-10-Attacks-2.png\" class=\"c-stats__img\" alt=\"Threat Round Up 10 Attacks\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n10 Attacks<\/h3>\n<p class=\"c-stats__text\">Per Second<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Round-Up-7K-Exploits-2.png\" class=\"c-stats__img\" alt=\"2022 Threat Round Up 7K Exploits\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n7000<\/h3>\n<p class=\"c-stats__text\">Exploits<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Round-Up-1K-Malware-2.png\" class=\"c-stats__img\" alt=\"Threat Round Up 1K Malware\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n1000<\/h3>\n<p class=\"c-stats__text\">Unique Malware Samples <\/p>\n<p><a href=\"\/webinars\/?webinar=575851\" class=\"u-display-inline-block u-line-height-0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v1b-Blade-536x280-1.png\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Webinar: Trending IT\/IoT Threats <\/h2>\n<p>Join Elisa Costante, VP of Research at Vedere Labs, as she takes a deep dive into the state, evolution and future of malware attacks from the 2022 Threat Roundup. <\/p>\n<p><a href=\"\/webinars\/?webinar=575851\" title=\"Watch Now\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Watch Now<\/a><\/p>\n<h2 class=\"c-title\">What We Found<\/h2>\n<p style=\"text-align: center\">For a deep dive into the statistics and analysis of the threats observed, read the full technical report<\/p>\n<p><a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Report\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/distribution-of-attacks-per-country.png\" class=\"u-size-full\" alt=\"Distribution Of Attacks Per Country\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Attacks come from everywhere\u2026  <\/h2>\n<ul>\n<li>Attacks originated from 191 countries and territories\n<\/li>\n<li>Top 10 countries account for 73% of malicious traffic\n<\/li>\n<li>75% of exploits originated from U.S. and China\n<\/li>\n<li>81% of attacks launched from legitimate hosting\/cloud providers  <\/li>\n<\/ul>\n<h3 style=\"text-align: center\">Autonomous System Types Originating\u00a0Attacks<\/h3>\n<h2 class=\"c-title \">\u2026even from legitimate businesses <\/h2>\n<ul>\n<li>Attacks originated from 160,000+ IP addresses in 500+ autonomous systems <\/li>\n<li>81% are from hosting or cloud providers <\/li>\n<li>18% belong to ISPs, largely due to compromised consumer devices <\/li>\n<ul>\n<a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Report\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/ul>\n<\/ul>\n<h3 style=\"text-align: center\">Top Executed Command\u00a0Categories<\/h3>\n<h2 class=\"c-title \">Remote management services are the top target\u2026 <\/h2>\n<ul>\n<li>43% of attacks target remote management protocols (RDP, VNC, SSH, Telnet)<\/li>\n<li>26% target web protocols (HTTP and HTTP\/S) for scanning or vulnerability exploitation attempts<\/li>\n<li>Mainly exploited using brute forcing with well-known or weak credentials<\/li>\n<ul>\n<\/ul>\n<\/ul>\n<h3 style=\"text-align: center\">Top Exploited Software\u00a0Type<\/h3>\n<h2 class=\"c-title \">Exploits are not limited to traditional applications\u2026<\/h2>\n<ul>\n<li>76% of attacks targeted software libraries such as Log4j, TCP\/IP stacks, Open SSH<\/li>\n<li>Preference for supply chain vulnerabilities to achieve foothold on network<\/li>\n<li>14% target exposed vulnerable services (databases, web applications, email servers) <\/li>\n<ul>\n<a href=\"\/blog\/2022-threat-roundup-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary\">Read Blog<\/a><\/ul>\n<\/ul>\n<h3 style=\"text-align: center\">MODBUS Enumeration<\/h3>\n<h2 class=\"c-title \">&#8230;and critical infrastructure is a constant target<\/h2>\n<p>Attackers constantly probe multiple OT devices and protocols for malicious reconnaissance, including scans for:  <\/p>\n<ul>\n<li>OPC-UA, S7, Ethernet\/IP, Modbus \u2013 used in industrial automation to exchange input\/output data or manage devices such as PLCs <\/li>\n<li>Fox \u2013 used in building automation to control devices (lighting, HVAC,  access control) <\/li>\n<li>DNP3, IEC-104, MMS and IEEE-C37.118 Synchrophasor \u2013 used in energy and water sectors <\/li>\n<ul>\n<\/ul>\n<\/ul>\n<h3 style=\"text-align: center\">Distribution of Malware Hashes\u00a0per\u00a0Family<\/h3>\n<h2 class=\"c-title \">After initial access, attackers explore the system&#8230; and drop malware<\/h2>\n<ul>\n<li>Most common tactics are Discovery (95%), Persistence (3%) and Execution (1%) <\/li>\n<li>Endemic malware includes WannaCry (53%) and Mirai variants (8%) <\/li>\n<li>Emerging botnets such as Chaos cross IT\/IoT boundaries <\/li>\n<ul>\n<a href=\"\/blog\/2022-threat-roundup-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Blog\" class=\"c-btn c-btn--primary\">Read Blog<\/a><\/ul>\n<\/ul>\n<h2 class=\"c-title\">Strategic Recommendations: How Forescout Can Help <\/h2>\n<p>To protect your environment from mixed IT\/IoT cyber threats, focus on these three key pillars:<\/p>\n<ul style=\"text-align: left\">\n<li><strong>Risk and exposure management. <\/strong>Identify, quantify and prioritize cybersecurity risk, starting by <a href=\"https:\/\/www.forescout.com\/solutions\/asset-inventory\/\">discovering and assessing every connected asset<\/a> for real-time awareness of your attack surface.<\/li>\n<li><strong>Network security. <\/strong>Continuously monitor all connected assets to <a href=\"\/solutions\/network-access-control\/\">govern network access<\/a>, using real-time traffic visibility to <a href=\"\/products\/eyesegment\/\">manage segmentation<\/a> and dynamic control policies to mitigate and remediate risk.<\/li>\n<li><strong>Threat detection and response. <\/strong><a href=\"\/products\/threat-detection-and-response-xdr\/\">Detect, investigate and respond<\/a> to true threats and incidents using threat detection and response capabilities to collect telemetry and logs, correlate attack signals, generate high-fidelity detections and enable automated responses.<\/li>\n<\/ul>\n<p>For more detailed recommendations, read the report.<\/p>\n<p><a href=\"\/resources\/2022-threat-roundup-report-the-emergence-of-mixed-itiot-threats\/\" title=\"Read Report\" class=\"c-btn c-btn--primary\" target=\"_blank\" rel=\"noopener\">Read Report<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2022 Threat Roundup 2022 Threat Roundup \u2013 The Emergence of Mixed IT\/IoT Threats In 2022, cyberattacks grew in intensity, sophistication and frequency. The adoption of new connected devices by organizations in 2023 is likely to pose even greater challenges. To help organizations of all sizes prepare, Forescout\u2019s Vedere Labs has analyzed data gathered in 2022 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":70336,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[407],"class_list":["post-77396","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2022 Threat Roundup - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2022 Threat Roundup - Forescout\" \/>\n<meta property=\"og:description\" content=\"2022 Threat Roundup 2022 Threat Roundup \u2013 The Emergence of Mixed IT\/IoT Threats In 2022, cyberattacks grew in intensity, sophistication and frequency. The adoption of new connected devices by organizations in 2023 is likely to pose even greater challenges. To help organizations of all sizes prepare, Forescout\u2019s Vedere Labs has analyzed data gathered in 2022 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-11T12:58:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/\",\"name\":\"2022 Threat Roundup - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png\",\"datePublished\":\"2023-03-23T14:19:23+00:00\",\"dateModified\":\"2024-04-11T12:58:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png\",\"width\":536,\"height\":280,\"caption\":\"Threat Roundup\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2022 Threat Roundup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2022 Threat Roundup - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/","og_locale":"en_US","og_type":"article","og_title":"2022 Threat Roundup - Forescout","og_description":"2022 Threat Roundup 2022 Threat Roundup \u2013 The Emergence of Mixed IT\/IoT Threats In 2022, cyberattacks grew in intensity, sophistication and frequency. The adoption of new connected devices by organizations in 2023 is likely to pose even greater challenges. To help organizations of all sizes prepare, Forescout\u2019s Vedere Labs has analyzed data gathered in 2022 [&hellip;]","og_url":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-04-11T12:58:55+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/","url":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/","name":"2022 Threat Roundup - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png","datePublished":"2023-03-23T14:19:23+00:00","dateModified":"2024-04-11T12:58:55+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/03\/FS-2023-Threat-Roundup-v2a-Blade-536x280-1.png","width":536,"height":280,"caption":"Threat Roundup"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/2022-threat-roundup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"2022 Threat Roundup"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/77396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=77396"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/77396\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=77396"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=77396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}