{"id":21765,"date":"2024-04-03T16:31:53","date_gmt":"2024-04-03T14:31:53","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=21765"},"modified":"2024-04-12T16:33:22","modified_gmt":"2024-04-12T14:33:22","slug":"microsoft-exchange-vulnerability-crisis","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/","title":{"rendered":"Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.24.2&#8243; background_enable_image=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.24.2&#8243; background_enable_image=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;]The <a href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html\">German Federal Office for Information Security (BSI)<\/a> has issued a warning that underscores a critical cybersecurity threat: over 17,000 Microsoft Exchange servers in Germany are exposed online, vulnerable to critical security vulnerabilities. This situation presents a significant risk to the IT infrastructure of affected organizations and their operational security. IT management and decision-makers must urgently adopt measures to protect their networks from potential cyberattacks. [\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>The German BSI Alert: A Critical Warning<\/h2>\n<p style=\"font-weight: 400;\">The <a href=\"https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Presse\/Pressemitteilungen\/Presse2024\/240326_Tausende_Exchange-Server_verwundbar.html\">BSI\u2019s alert<\/a> brings to light the precarious state of Microsoft Exchange servers across Germany, with around 37% of systems found to be critically vulnerable. This includes outdated versions such as Exchange 2010 and 2013, which make up 12% of the installations and have not been updated since October 2020 and April 2023, respectively. Additionally, nearly 28% of the servers running newer versions like Exchange 2016 and 2019 are missing essential patches for critical security flaws that could be exploited in remote code execution attacks.<\/p>\n<p style=\"font-weight: 400;\">The BSI&#8217;s warning about the vulnerabilities in Microsoft Exchange servers in Germany highlights a crucial aspect of cybersecurity: the inadequacy of relying solely on patching, especially for systems that have been exposed online. The alert reveals that a significant percentage of these systems remain critically vulnerable due to outdated versions or missing patches for known security flaws. This situation indicates that, while patching is a necessary step in cybersecurity maintenance, it is not sufficient on its own. For systems that have been exposed to the internet and potentially compromised before the application of patches, conducting a thorough compromise assessment is an essential next step. This assessment determines the extent of any breach and the presence of attackers within the network, guiding the necessary response to secure the compromised systems.<\/p>\n<p>\u00a0 [\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div>\n<h2>Patching and the Critical Need for Compromise Assessment<\/h2>\n<p style=\"font-weight: 400;\">Patching plays a crucial role in protecting Microsoft Exchange servers from cyber attackers by addressing known vulnerabilities. However, vulnerabilities can be exploited before patches are applied, leaving organizations unknowingly at risk. This underscores the need for compromise assessments, especially after applying patches to previously vulnerable systems.<\/p>\n<p style=\"font-weight: 400;\">Compromise assessments are vital for determining if a system was compromised before the patch was implemented. These assessments help identify whether attackers have remained dormant within the network, potentially engaging in malicious activities such as credential dumping and lateral movement. Identifying signs of a successful attack early can prevent a minor breach from escalating into a more severe and extensive compromise. Given the complexity and expertise required for thorough assessments, automated solutions like <a href=\"https:\/\/www.nextron-systems.com\/thor-lite\/\">THOR Cloud Lite<\/a> offer a practical and efficient alternative to manual investigations.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div>\n<h2>Automated Compromise Assessments with THOR Cloud Lit<\/h2>\n<p style=\"font-weight: 400;\">For those seeking an automated approach to compromise assessments, our <a href=\"https:\/\/www.nextron-systems.com\/thor-lite\/\">THOR Cloud Lite<\/a> offers a practical solution. While the full THOR Cloud service is slated for release in Q2\/2024, THOR Cloud Lite is currently available and provides a robust set of features tailored for efficient and automatic compromise assessments.<\/p>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/www.nextron-systems.com\/thor-lite\/\">THOR Cloud Lite<\/a> utilizes a comprehensive, though reduced, open-source rule set and a selection of THOR&#8217;s advanced modules to effectively uncover evidence of the exploitation of vulnerabilities. This focus on post-exploitation activities allows organizations to swiftly identify signs of compromise, such as lateral movements, credential dumping, and other indicators of malicious activity within their network.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div>\n<h2>Benefits of Using THOR Cloud Lite for Your Security Strateg<\/h2>\n<ul>\n<li><strong>Efficient Detection:<\/strong> Leverage the power of <a href=\"https:\/\/www.nextron-systems.com\/thor-lite\/\">THOR Cloud Lite<\/a> to detect signs of exploitation with significantly less effort and time compared to manual investigations.<\/li>\n<li><strong>Accessibility:<\/strong> With THOR Cloud Lite, organizations can start enhancing their cybersecurity posture immediately, taking advantage of up to 30 scans per month without any cost.<\/li>\n<li><strong>Preparation for THOR Cloud:<\/strong> As we prepare for the launch of <strong>THOR Cloud<\/strong>, users of <strong>THOR Cloud Lite<\/strong> can familiarize themselves with the process of automated compromise assessments, setting the stage for a seamless transition to the more comprehensive features <strong>THOR Cloud<\/strong> will offer upon its release.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>THOR Cloud Lite<\/strong> represents an effective step forward in automating compromise assessments, providing organizations with a valuable tool in their cybersecurity arsenal as they await the full capabilities of <strong>THOR Cloud<\/strong>.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how to safeguard your business from the ongoing Microsoft Exchange vulnerability crisis highlighted by the German Federal Office for Information Security (BSI). Learn about critical warnings, the importance of patching, and how automated compromise assessments with THOR Cloud Lite can fortify your cybersecurity strategy.<\/p>\n","protected":false},"author":1,"featured_media":21806,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[749,46,1,32,556,248],"tags":[747,69,603,82,744,745,636,117,7,78,746,491,748,48],"class_list":["post-21765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-homepage","category-newsletter","category-nextron","category-thor","category-thor-cloud","category-thor-lite","tag-bsi","tag-compromise-assessment","tag-exchange","tag-ioc","tag-microsoft-exchange","tag-on-prem","tag-proxyshell","tag-scan","tag-scanner","tag-scanning","tag-threat-actor","tag-vulnerability","tag-warning","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis - Nextron Systems<\/title>\n<meta name=\"description\" content=\"How to protect your business from Microsoft Exchange vulnerability crisis\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis\",\"datePublished\":\"2024-04-03T14:31:53+00:00\",\"dateModified\":\"2024-04-12T14:33:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/\"},\"wordCount\":864,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg\",\"keywords\":[\"BSI\",\"compromise assessment\",\"Exchange\",\"ioc\",\"Microsoft Exchange\",\"on-prem\",\"proxyshell\",\"scan\",\"scanner\",\"scanning\",\"threat actor\",\"vulnerability\",\"warning\",\"YARA\"],\"articleSection\":[\"Homepage\",\"Newsletter\",\"Nextron\",\"THOR\",\"THOR Cloud\",\"THOR Lite\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/\",\"name\":\"Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg\",\"datePublished\":\"2024-04-03T14:31:53+00:00\",\"dateModified\":\"2024-04-12T14:33:22+00:00\",\"description\":\"How to protect your business from Microsoft Exchange vulnerability crisis\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg\",\"width\":1536,\"height\":768},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis - Nextron Systems","description":"How to protect your business from Microsoft Exchange vulnerability crisis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis","datePublished":"2024-04-03T14:31:53+00:00","dateModified":"2024-04-12T14:33:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/"},"wordCount":864,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg","keywords":["BSI","compromise assessment","Exchange","ioc","Microsoft Exchange","on-prem","proxyshell","scan","scanner","scanning","threat actor","vulnerability","warning","YARA"],"articleSection":["Homepage","Newsletter","Nextron","THOR","THOR Cloud","THOR Lite"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/","url":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/","name":"Protecting Your Business: Addressing the Microsoft Exchange Vulnerability Crisis - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg","datePublished":"2024-04-03T14:31:53+00:00","dateModified":"2024-04-12T14:33:22+00:00","description":"How to protect your business from Microsoft Exchange vulnerability crisis","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2024\/04\/03\/microsoft-exchange-vulnerability-crisis\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/04\/Blog-Microsoft-Exchange-Vulnerability-Crisis.jpeg","width":1536,"height":768},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/21765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=21765"}],"version-history":[{"count":30,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/21765\/revisions"}],"predecessor-version":[{"id":21810,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/21765\/revisions\/21810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/21806"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=21765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=21765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=21765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}