{"id":1957,"date":"2025-12-05T15:55:20","date_gmt":"2025-12-05T18:55:20","guid":{"rendered":"https:\/\/bnftec.com\/?p=1957"},"modified":"2025-12-05T17:01:16","modified_gmt":"2025-12-05T20:01:16","slug":"a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques","status":"publish","type":"post","link":"https:\/\/bnftec.com\/en\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/","title":{"rendered":"Cloud security in 2025: the new target of cyberattacks"},"content":{"rendered":"<p class=\"has-black-color has-text-color has-link-color wp-elements-120a50db51b9466a4fdfd9f632cef087\">What seemed safe has become a target.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png\" alt=\"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques\" class=\"wp-image-1958\" srcset=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png 1024w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23-300x300.png 300w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23-150x150.png 150w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23-768x768.png 768w, https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23-12x12.png 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d280f27da4e2a6eb362c75cf74bbc272\">In recent years, the cloud has become the heart of many companies&#039; operations. It&#039;s practical, accessible, and scalable\u2014but it has also become the preferred environment for cybercriminals.<br>By 2025, attacks based on cloud storage and API integrations have skyrocketed. Platforms like OneDrive, Google Drive, and GitHub are being used to distribute malicious files precisely because they go undetected by traditional filters.<br>What was once considered &quot;safe by default&quot; now requires constant vigilance and specialized strategy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-e50532e5ddacd79ec0834c501ff4b86e\" id=\"h-por-que-os-ataques-a-nuvem-estao-crescendo\">Why are cloud attacks increasing?<\/h4>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a4ead16664e5b93ee950d77781cc395f\">The increase in these incidents is no coincidence. With more companies migrating data and systems to the cloud, the attack surface has expanded \u2014 and criminals have noticed.<br>Today, we see three clear trends:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f76c83fb6b8f3cb8b9226b7067de8f5f\">Exploiting credentials: Misconfigured or shared access points create critical vulnerabilities.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-83abd5d77a9b95b5cd8e171a38d9a177\">Malware in popular services: criminals host malicious files on legitimate platforms, using them as &quot;Trojan horses&quot;.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-beadf2adbe891e0f54b0c4997e5a90d2\">Vulnerable APIs and integrations: connected systems without strong authentication are an open invitation to intrusions.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8ab3262e770628a7ef2222a7fb304067\">These threats affect both small businesses and large corporations. The difference lies in who identifies and reacts first.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-92662402be999b34c449a770613f4c9e\" id=\"h-seguranca-na-nuvem-vai-alem-do-antivirus\">Cloud security goes beyond antivirus.<\/h4>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-efdb9a2c0287cc87799a477ad8556a4f\">One of the most common mistakes is believing that cloud providers guarantee complete protection. In reality, security is shared: the provider takes care of the infrastructure, but the responsibility for data and access lies with the company.<br>This means that identity control, permissions management, and log monitoring need to be prioritized.<br>Without these practices, a simple configuration error can expose sensitive information \u2014 and compromise the entire operation.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-5f840d7cfcc23361519a4996ead303da\" id=\"h-como-a-bnf-ajuda-empresas-a-proteger-o-ambiente-em-nuvem\">How BNF helps companies protect their cloud environment.<\/h4>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-69928ab20a5d24e0a9bd3fe56b819ee7\">At BNF, the cloud is part of our integrated protection strategy.<br>We combine behavioral analysis, artificial intelligence, and 24\/7 monitoring to detect out-of-the-ordinary behavior on platforms such as Microsoft 365, Google Workspace, and AWS.<br>Our SOC team identifies and blocks suspicious activity before it escalates into serious incidents \u2014 such as data exfiltration, lateral movement, or credential abuse.<br>In addition, we guide our clients in the secure configuration of cloud environments, reviewing permissions, backup policies, and multi-factor authentication.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-0c6718ea775f003cc514395782d1db25\" id=\"h-conclusao\">Conclusion<\/h4>\n\n\n\n<p><br>The cloud has brought speed and innovation, but it also demands a new security mindset.<br>Companies that treat data protection as part of their strategy \u2014 and not as an add-on \u2014 are set to excel in 2025.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>What seemed safe has become a target.<\/p>","protected":false},"author":22,"featured_media":1958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_joinchat":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sem-categoria"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques - BNF Cyber Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bnftec.com\/en\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques\" \/>\n<meta property=\"og:description\" content=\"O que parecia seguro virou alvo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bnftec.com\/en\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/\" \/>\n<meta property=\"og:site_name\" content=\"BNF Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T18:55:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-05T20:01:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emanuelle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emanuelle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/\"},\"author\":{\"name\":\"Emanuelle\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/4fb7ec6bdbccb8d44e61243032f08f78\"},\"headline\":\"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques\",\"datePublished\":\"2025-12-05T18:55:20+00:00\",\"dateModified\":\"2025-12-05T20:01:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/\"},\"wordCount\":452,\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png\",\"articleSection\":[\"Sem categoria\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/\",\"name\":\"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques - BNF Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png\",\"datePublished\":\"2025-12-05T18:55:20+00:00\",\"dateModified\":\"2025-12-05T20:01:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png\",\"width\":1024,\"height\":1024,\"caption\":\"O que parecia seguro virou alvo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/bnftec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#website\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"name\":\"BNF Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bnftec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#organization\",\"name\":\"BNF Cyber Security\",\"url\":\"https:\\\/\\\/bnftec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"contentUrl\":\"https:\\\/\\\/bnftec.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Modo_de_isolamento-1.png\",\"width\":222,\"height\":89,\"caption\":\"BNF Cyber Security\"},\"image\":{\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bnftec.com\\\/#\\\/schema\\\/person\\\/4fb7ec6bdbccb8d44e61243032f08f78\",\"name\":\"Emanuelle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g\",\"caption\":\"Emanuelle\"},\"url\":\"https:\\\/\\\/bnftec.com\\\/en\\\/author\\\/emanuelle-bnftec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques - BNF Cyber Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bnftec.com\/en\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/","og_locale":"en_US","og_type":"article","og_title":"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques","og_description":"O que parecia seguro virou alvo","og_url":"https:\/\/bnftec.com\/en\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/","og_site_name":"BNF Cyber Security","article_published_time":"2025-12-05T18:55:20+00:00","article_modified_time":"2025-12-05T20:01:16+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png","type":"image\/png"}],"author":"Emanuelle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emanuelle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#article","isPartOf":{"@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/"},"author":{"name":"Emanuelle","@id":"https:\/\/bnftec.com\/#\/schema\/person\/4fb7ec6bdbccb8d44e61243032f08f78"},"headline":"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques","datePublished":"2025-12-05T18:55:20+00:00","dateModified":"2025-12-05T20:01:16+00:00","mainEntityOfPage":{"@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/"},"wordCount":452,"publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"image":{"@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png","articleSection":["Sem categoria"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/","url":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/","name":"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques - BNF Cyber Security","isPartOf":{"@id":"https:\/\/bnftec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#primaryimage"},"image":{"@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png","datePublished":"2025-12-05T18:55:20+00:00","dateModified":"2025-12-05T20:01:16+00:00","breadcrumb":{"@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#primaryimage","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/12\/ChatGPT-Image-5-de-dez.-de-2025-15_29_23.png","width":1024,"height":1024,"caption":"O que parecia seguro virou alvo"},{"@type":"BreadcrumbList","@id":"https:\/\/bnftec.com\/a-seguranca-na-nuvem-em-2025-o-novo-alvo-dos-ciberataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/bnftec.com\/"},{"@type":"ListItem","position":2,"name":"A seguran\u00e7a na nuvem em 2025: o novo alvo dos ciberataques"}]},{"@type":"WebSite","@id":"https:\/\/bnftec.com\/#website","url":"https:\/\/bnftec.com\/","name":"BNF Cyber Security","description":"","publisher":{"@id":"https:\/\/bnftec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bnftec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bnftec.com\/#organization","name":"BNF Cyber Security","url":"https:\/\/bnftec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/","url":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","contentUrl":"https:\/\/bnftec.com\/wp-content\/uploads\/2025\/07\/Modo_de_isolamento-1.png","width":222,"height":89,"caption":"BNF Cyber Security"},"image":{"@id":"https:\/\/bnftec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bnftec.com\/#\/schema\/person\/4fb7ec6bdbccb8d44e61243032f08f78","name":"Emanuelle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/792d5e8b2b9ab7d0521b1cecde23bd1addedf10933d0bce80d24a2492453eeba?s=96&d=mm&r=g","caption":"Emanuelle"},"url":"https:\/\/bnftec.com\/en\/author\/emanuelle-bnftec\/"}]}},"_links":{"self":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/1957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/comments?post=1957"}],"version-history":[{"count":3,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/1957\/revisions"}],"predecessor-version":[{"id":1962,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/posts\/1957\/revisions\/1962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media\/1958"}],"wp:attachment":[{"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/media?parent=1957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/categories?post=1957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bnftec.com\/en\/wp-json\/wp\/v2\/tags?post=1957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}