{"id":3480,"date":"2025-09-23T09:20:43","date_gmt":"2025-09-23T09:20:43","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=3480"},"modified":"2025-09-23T09:21:51","modified_gmt":"2025-09-23T09:21:51","slug":"lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/","title":{"rendered":"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks"},"content":{"rendered":"<p data-start=\"358\" data-end=\"717\">From car manufacturers halting production lines to IT suppliers disrupting hundreds of municipalities, the past few weeks have made one thing clear: <strong data-start=\"507\" data-end=\"577\">cyberattacks are no longer isolated events &#8211; they are systemic risks<\/strong>. For medium and enterprise organizations, every breach in the headlines is an opportunity to stress-test resilience and rethink strategy.<\/p>\n<p data-start=\"719\" data-end=\"794\">Here are five lessons businesses can take away from the latest incidents.<\/p>\n<hr data-start=\"796\" data-end=\"799\" \/>\n<h2 data-start=\"801\" data-end=\"872\">1. <strong data-start=\"807\" data-end=\"870\">Operational Continuity Is Just as Critical as Data Security<\/strong><\/h2>\n<p data-start=\"873\" data-end=\"1088\">Jaguar Land Rover, the UK\u2019s largest carmaker, recently had to shut down systems globally after a cyberattack. While customer data was not compromised, <strong data-start=\"1024\" data-end=\"1085\">production and dealer registrations were halted worldwide<\/strong>.<\/p>\n<p data-start=\"1090\" data-end=\"1384\"><strong data-start=\"1093\" data-end=\"1104\">Lesson:<\/strong> Protecting data is not enough. Organizations must also prepare for the possibility that critical systems &#8211; ERP, MES, or dealer portals &#8211; could be disrupted. <strong data-start=\"1258\" data-end=\"1306\">Business continuity and network segmentation<\/strong> are essential to keeping operations running, even in the face of an attack.<\/p>\n<hr data-start=\"1386\" data-end=\"1389\" \/>\n<h2 data-start=\"1391\" data-end=\"1444\">2. <strong data-start=\"1397\" data-end=\"1442\">Your Supply Chain May Be the Weakest Link<\/strong><\/h2>\n<p data-start=\"1445\" data-end=\"1659\">In Sweden, a ransomware attack on IT supplier Milj\u00f6data knocked out HR and admin systems for more than 200 municipalities. The breach disrupted services as vital as sick leave reporting and medical record access.<\/p>\n<p data-start=\"1661\" data-end=\"1909\"><strong data-start=\"1664\" data-end=\"1675\">Lesson:<\/strong> Every SaaS provider, IT partner, or cloud service is part of your attack surface. Businesses should <strong data-start=\"1776\" data-end=\"1872\">map vendor dependencies, require cyber resilience in contracts, and test fallback procedures<\/strong> for critical third-party services.<\/p>\n<hr data-start=\"1911\" data-end=\"1914\" \/>\n<h2 data-start=\"1916\" data-end=\"1976\">3. <strong data-start=\"1922\" data-end=\"1974\">Nation-State Campaigns Are Expanding Their Reach<\/strong><\/h2>\n<p data-start=\"1977\" data-end=\"2179\">The FBI and allied agencies recently warned about \u201cSalt Typhoon,\u201d a Chinese-backed cyber campaign that has already infiltrated networks in over 80 countries, targeting telecoms and government systems.<\/p>\n<p data-start=\"2181\" data-end=\"2464\"><strong data-start=\"2184\" data-end=\"2195\">Lesson:<\/strong> Advanced persistent threats (APTs) are no longer limited to critical infrastructure. Commercial enterprises, especially those in manufacturing, energy, and technology, must assume they are on the radar and <strong data-start=\"2402\" data-end=\"2461\">invest in threat intelligence and continuous monitoring<\/strong>.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3486 alignright\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-200x200.png 200w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-28.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<hr data-start=\"2466\" data-end=\"2469\" \/>\n<h2 data-start=\"2471\" data-end=\"2526\">4. <strong data-start=\"2477\" data-end=\"2524\">AI Is Now Being Used to Supercharge Attacks<\/strong><\/h2>\n<p data-start=\"2527\" data-end=\"2803\">Hackers have begun using AI coding assistants to <strong data-start=\"2576\" data-end=\"2613\">automate every stage of an attack<\/strong>, from scanning for vulnerabilities to writing phishing emails and generating ransomware code. In one case, more than 17 organizations were hit by a campaign built almost entirely with AI.<\/p>\n<p data-start=\"2805\" data-end=\"3058\"><strong data-start=\"2808\" data-end=\"2819\">Lesson:<\/strong> If attackers are using AI, defenders must too. Businesses should explore <strong data-start=\"2893\" data-end=\"2975\">AI-powered anomaly detection, behavior analytics, and automated response tools<\/strong> to keep pace. Human oversight remains vital, but speed is now a deciding factor.<\/p>\n<hr data-start=\"3060\" data-end=\"3063\" \/>\n<h2 data-start=\"3065\" data-end=\"3123\">5. <strong data-start=\"3071\" data-end=\"3121\">The Human Factor Remains the Biggest Liability<\/strong><\/h2>\n<p data-start=\"3124\" data-end=\"3317\">In a recent breach at Qantas, attackers used AI-generated voice cloning (\u201cvishing\u201d) to trick a help desk into resetting MFA for corporate accounts &#8211; compromising data for millions of customers.<\/p>\n<p data-start=\"3319\" data-end=\"3580\"><strong data-start=\"3322\" data-end=\"3333\">Lesson:<\/strong> Social engineering remains a top attack vector. Organizations must move beyond SMS-based MFA to <strong data-start=\"3430\" data-end=\"3465\">stronger authentication methods<\/strong> (biometrics, app-based tokens) and train employees to rigorously verify<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3482 alignleft\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-200x200.png 200w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-26.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/> identity when unusual requests are made.<\/p>\n<hr data-start=\"3582\" data-end=\"3585\" \/>\n<h2 data-start=\"3587\" data-end=\"3641\">Building Cyber Resilience, Not Just Cybersecurity<\/h2>\n<p data-start=\"3643\" data-end=\"3868\">The recent wave of breaches highlights that prevention alone is no longer enough. Organizations need to build <strong data-start=\"3753\" data-end=\"3773\">cyber resilience &#8211; <\/strong>the ability to absorb an attack, recover quickly, and learn from the experience. That means:<\/p>\n<p data-start=\"3872\" data-end=\"3956\"><strong data-start=\"3872\" data-end=\"3894\">Leadership Buy-In:<\/strong> Cyber resilience must be treated as a board-level priority.<\/p>\n<p data-start=\"3959\" data-end=\"4109\"><strong data-start=\"3959\" data-end=\"3984\">Integrated Platforms:<\/strong> Consolidating monitoring, backup, prevention, and recovery into a single ecosystem reduces complexity and speeds response.<\/p>\n<p data-start=\"4112\" data-end=\"4223\"><strong data-start=\"4112\" data-end=\"4134\">Regular Exercises:<\/strong> Tabletop simulations and live-fire drills ensure teams know how to act under pressure.<\/p>\n<p data-start=\"4112\" data-end=\"4223\"><strong data-start=\"4226\" data-end=\"4253\">Ecosystem Preparedness:<\/strong> Supply chains, partners, and even regulators should be part of resilience planning.<\/p>\n<hr data-start=\"4341\" data-end=\"4344\" \/>\n<h2 data-start=\"4346\" data-end=\"4364\">Final Thought<\/h2>\n<p data-start=\"4366\" data-end=\"4669\">Cyberattacks are no longer edge cases; they are <strong data-start=\"4414\" data-end=\"4444\">business continuity events<\/strong>. By learning from the latest incidents &#8211; whether they involve disrupted factories, compromised CRMs, or state-sponsored espionage &#8211; businesses can close gaps, strengthen resilience, and ensure they are not tomorrow\u2019s headline.<\/p>\n<p data-start=\"4671\" data-end=\"4771\">The question is no longer <strong data-start=\"4697\" data-end=\"4703\">if<\/strong> an attack will happen, but <strong data-start=\"4731\" data-end=\"4768\">how prepared you are when it does<\/strong>.<\/p>","protected":false},"excerpt":{"rendered":"<p>From car manufacturers halting production lines to IT suppliers disrupting hundreds of municipalities, the past few weeks have made one&#8230;<\/p>","protected":false},"author":26,"featured_media":3481,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[],"class_list":["post-3480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lessons Businesses Can Learn from the Latest Wave of Cyberattacks - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"From car manufacturers halting production lines to IT suppliers disrupting hundreds of municipalities, the past few weeks have made one...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-23T09:20:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T09:21:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/\",\"name\":\"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png\",\"datePublished\":\"2025-09-23T09:20:43+00:00\",\"dateModified\":\"2025-09-23T09:21:51+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/","og_locale":"de_DE","og_type":"article","og_title":"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks - Techknowledge","og_description":"From car manufacturers halting production lines to IT suppliers disrupting hundreds of municipalities, the past few weeks have made one...","og_url":"https:\/\/b2btechknowledge.net\/de\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/","og_site_name":"Techknowledge","article_published_time":"2025-09-23T09:20:43+00:00","article_modified_time":"2025-09-23T09:21:51+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"John Gallacher","Gesch\u00e4tzte Lesezeit":"4 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/","name":"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png","datePublished":"2025-09-23T09:20:43+00:00","dateModified":"2025-09-23T09:21:51+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-25.png","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/lessons-businesses-can-learn-from-the-latest-wave-of-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"Lessons Businesses Can Learn from the Latest Wave of Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/3480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=3480"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/3480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/3481"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=3480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=3480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=3480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}