{"id":5058,"date":"2026-03-10T13:36:46","date_gmt":"2026-03-10T12:36:46","guid":{"rendered":"https:\/\/enthec.com\/?p=5058"},"modified":"2026-03-10T13:36:46","modified_gmt":"2026-03-10T12:36:46","slug":"ransomware-3-0-how-malware-evolves-and-what-measures-to-take","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/","title":{"rendered":"Ransomware 3.0: How malware evolves and what measures to take"},"content":{"rendered":"

Just a decade ago, the term “data breach” sounded like something out of a science fiction movie. Today, it’s the biggest nightmare for any IT director and, increasingly, for any citizen who stores their life on a hard drive. But the danger has evolved. <\/span><\/p>\n

We are no longer dealing with a simple virus that locks your screen; we have fully entered the era of ransomware 3.0.<\/span><\/p>\n

In this article, we’ll break down what this evolutionary leap means, why traditional defenses are becoming inadequate, and how, in<\/span> Enthec,<\/b> we can change this to help mitigate these risks before the damage becomes irreversible.<\/span><\/p>\n

 <\/p>\n

The evolutionary leap: from file blocking to total extortion<\/b><\/h2>\n

To understand where we are, we must first look back. The <\/span>ransomware<\/span><\/a> 1.0 was opportunistic: a mass email would go out, someone would click a link, and their files would be encrypted. Version 2.0 introduced “double extortion,” in which attackers, in addition to encrypting data, stole it and threatened to publish it. <\/span><\/p>\n

Ransomware 3.0 goes one step further<\/b>.<\/span>. It’s no longer just malicious software; it’s a highly professionalized and customized business model.<\/span><\/p>\n

What characterizes this third generation?<\/b><\/h3>\n

This new phase focuses on triple extortion.<\/b>. Cybercriminals not only target the main organization but also contact its customers, suppliers, and employees directly. If the company doesn’t pay, they pressure its business partners by informing them that their private data is at risk. <\/span><\/p>\n

Furthermore, ransomware 3.0 relies on the<\/span> Ransomware-as-a-Service<\/span><\/i> (RaaS) model. Malware developers rent their code to “affiliates” in exchange for a commission. In this way, even criminals with limited technical skills can launch devastating attacks using highly sophisticated infrastructure. <\/span><\/p>\n

 <\/p>\n

\"Ransomware<\/p>\n

Why businesses remain vulnerable<\/b><\/h2>\n

Despite investment in antivirus and firewalls, security vulnerabilities continue to grow. Why is this happening? <\/span><\/p>\n

The answer lies in the<\/span> exposure.<\/b>. Today’s businesses operate in hybrid environments, with remote employees, cloud services, and a vast amount of digital assets they often don’t even know they have. Attackers don’t usually “break down” the door; they simply find a key someone left in the lock. <\/span><\/p>\n

The importance of looking beyond the perimeter<\/b><\/h3>\n

The traditional approach to cybersecurity focused on protecting resources within the corporate network. But in the era of ransomware 3.0, the threat often originates from outside: in online dark web forums where stolen credentials are sold, or on misconfigured servers exposed to the internet without anyone noticing. <\/span><\/p>\n

Aqu\u00ed es donde aparece la<\/span> Gesti\u00f3n Continua de la Exposici\u00f3n a Amenazas. <\/span><\/a>. It’s not enough to conduct an audit once a year; <\/span>you have to monitor your exposure surface every minute of every day.<\/b><\/p>\n

 <\/p>\n

The human factor: why are you also in the spotlight?<\/b><\/h2>\n

We often think that these attacks only affect large multinational corporations. However, ransomware 3.0 has democratized the risk. Attackers have discovered that <\/span>individuals are much easier to exploit and, when combined, offer enormous profitability.<\/b><\/p>\n

Think about it for a moment: How many times have you used the same password for your personal email and for a shopping app? How much personal information is scattered across the internet due to security breaches in services you used years ago? <\/span><\/p>\n

Most successful attacks do not begin with a complex hack, but with a human oversight or a prior information leak.<\/span><\/p>\n

 <\/p>\n

Qondar: protecting your digital identity<\/b><\/h2>\n

This is where prevention becomes personal.<\/span> Qondar is the ally for the individual<\/b>, the independent professional, or the manager who wants to protect their private sphere.<\/span><\/p>\n

Qondar applies military-grade cyber surveillance capabilities tailored to individual needs. It alerts you if your email address appears in a leaked database, if your passwords are exposed, or if someone is using your identity for illicit purposes. <\/span><\/p>\n

At this stage of the user journey, when you’re already aware that the danger is real, having a tool that continuously monitors your exposure is essential digital hygiene. By protecting yourself with Qondar, you not only protect your files but also cut off the supply chain that feeds ransomware 3.0 cybercriminals. <\/span><\/p>\n

 <\/p>\n

Practical measures to mitigate the risk of ransomware 3.0<\/b><\/h2>\n

Beyond having monitoring tools, there are habits and strategies that should be part of the DNA of any conscientious organization or user.<\/span><\/p>\n

1. Implement the Zero Trust model<\/b><\/h3>\n

The premise of the model<\/span> Zero Trust<\/span><\/a> is simple: trust nothing and no one, whether inside or outside your network. Every access attempt should be verified. This drastically limits malware’s ability to spread once it manages to infiltrate a device. <\/span><\/p>\n

2. Immutable backups<\/b><\/h3>\n

With traditional ransomware, restoring a backup was sufficient. With ransomware 3.0, attackers attempt to locate and delete your backups before encrypting your data. Immutable backups (those that cannot be modified or deleted for a specified period) are the only real guarantee of recovery. <\/span><\/p>\n

3. Education and awareness<\/b><\/h3>\n

Phishing<\/span><\/a> Phishing remains the number one entry point. Training teams to identify red flags, such as emails with unwarranted urgency or suspicious senders, is just as important as having the best software. <\/span><\/p>\n

4. Constant external monitoring<\/b><\/h3>\n

As we mentioned with the CTEM approach,<\/span> the risk changes every hour.<\/b>. New vulnerabilities appear daily (the famous <\/span>Zero-Days).<\/span><\/i>). Using solutions that constantly scan your display surface, such as those we offer in Enthec, can mean preventing a disaster before it happens.<\/span><\/p>\n

 <\/p>\n

The future of cybersecurity is preventative.<\/b><\/h2>\n

The digital threat landscape is hostile, but not invincible. <\/span>The evolution towards ransomware 3.0 forces us to stop being reactive.<\/b>. We can’t wait for a ransom note to appear on the screen before we start thinking about security.<\/span><\/p>\n

Modern cybersecurity is all about visibility. Knowing what an attacker knows about us gives us a crucial competitive advantage. Whether you’re a business concerned about continuity or an individual who values \u200b\u200bprivacy, the key is proactive monitoring. <\/span><\/p>\n

Continuous Threat Exposure Management tools are not just for experts; they are for anyone who wants to sleep soundly in an interconnected world.<\/span><\/p>\n

Do you want to know what the internet knows about you?<\/b><\/h3>\n

Information is power, but only if you get to it before the criminals do. Don’t wait to become just another statistic in next year’s cybersecurity reports. <\/span><\/p>\n

Would you like to analyze your current level of exposure and know how to protect yourself effectively?<\/b> Contact us<\/span><\/a> and discover how Qondar can protect your digital environment<\/span>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Just a decade ago, the term “data breach” sounded like something out of a science fiction movie. Today, it’s the […]<\/p>\n","protected":false},"author":4,"featured_media":5018,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[33,78],"class_list":["post-5058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-risks","tag-prevention"],"yoast_head":"\n\u25b7 Ransomware 3.0: What it is and how to avoid it |Enthec<\/title>\n<meta name=\"description\" content=\"Discover what Ransomware 3.0 is \u27a1\ufe0f How malware has evolved and what steps to take to protect your information \u261d Here\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Ransomware 3.0: What it is and how to avoid it |Enthec\" \/>\n<meta property=\"og:description\" content=\"Discover what Ransomware 3.0 is \u27a1\ufe0f How malware has evolved and what steps to take to protect your information \u261d Here\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-10T12:36:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Ransomware 3.0: How malware evolves and what measures to take\",\"datePublished\":\"2026-03-10T12:36:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\"},\"wordCount\":1040,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg\",\"keywords\":[\"Risks\",\"Prevention\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\",\"url\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\",\"name\":\"\u25b7 Ransomware 3.0: What it is and how to avoid it |Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg\",\"datePublished\":\"2026-03-10T12:36:46+00:00\",\"description\":\"Discover what Ransomware 3.0 is \u27a1\ufe0f How malware has evolved and what steps to take to protect your information \u261d Here\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"Medidas contra el ransomware 3.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware 3.0: How malware evolves and what measures to take\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Ransomware 3.0: What it is and how to avoid it |Enthec","description":"Discover what Ransomware 3.0 is \u27a1\ufe0f How malware has evolved and what steps to take to protect your information \u261d Here","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Ransomware 3.0: What it is and how to avoid it |Enthec","og_description":"Discover what Ransomware 3.0 is \u27a1\ufe0f How malware has evolved and what steps to take to protect your information \u261d Here","og_url":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2026-03-10T12:36:46+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Ransomware 3.0: How malware evolves and what measures to take","datePublished":"2026-03-10T12:36:46+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/"},"wordCount":1040,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg","keywords":["Risks","Prevention"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/","url":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/","name":"\u25b7 Ransomware 3.0: What it is and how to avoid it |Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg","datePublished":"2026-03-10T12:36:46+00:00","description":"Discover what Ransomware 3.0 is \u27a1\ufe0f How malware has evolved and what steps to take to protect your information \u261d Here","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/medidas-ransomware-3-0-scaled.jpg","width":2560,"height":2560,"caption":"Medidas contra el ransomware 3.0"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/ransomware-3-0-how-malware-evolves-and-what-measures-to-take\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware 3.0: How malware evolves and what measures to take"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/5058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=5058"}],"version-history":[{"count":1,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/5058\/revisions"}],"predecessor-version":[{"id":5061,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/5058\/revisions\/5061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/5018"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=5058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=5058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=5058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}