{"id":47742,"date":"2023-04-07T13:01:58","date_gmt":"2023-04-07T11:01:58","guid":{"rendered":"https:\/\/cyberant.com\/sitemap\/"},"modified":"2023-09-15T14:49:27","modified_gmt":"2023-09-15T12:49:27","slug":"sitemap","status":"publish","type":"page","link":"https:\/\/cyberant.com\/en\/sitemap\/","title":{"rendered":"Sitemap"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1a7v96ic-2b84219539394cce62c5005f05569ac3\">\n.avia-section.av-1a7v96ic-2b84219539394cce62c5005f05569ac3 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/cyberant.com\/wp-content\/uploads\/2023\/02\/cyber-security-testimonials-bg.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-1a7v96ic-2b84219539394cce62c5005f05569ac3 .av-section-color-overlay{\nopacity:0.7;\nbackground-color:#222222;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-1a7v96ic-2b84219539394cce62c5005f05569ac3 main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active av-minimum-height av-minimum-height-25 av-height-25  container_wrap sidebar_right'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='25' data-av_min_height_opt='25'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47742'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-19va45zo-4bbcfb7d7af3ff4af6a696d629576c70 av_one_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div  '     ><\/div><div  class='flex_column av-197bps8k-287705eda198b049cc7277297ca422ae av_three_fifth  avia-builder-el-2  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lepqyrjd-13b06279c364a248c4cbfe3c279fff29\">\n#top .av_textblock_section.av-lepqyrjd-13b06279c364a248c4cbfe3c279fff29 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-lepqyrjd-13b06279c364a248c4cbfe3c279fff29 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h1 style=\"text-align: center;\">Sitemap<\/h1>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-18e9612s-d197515839115bf27679c4ce001b1ad5\">\n#top .hr.av-18e9612s-d197515839115bf27679c4ce001b1ad5{\nmargin-top:0;\nmargin-bottom:0;\n}\n.hr.av-18e9612s-d197515839115bf27679c4ce001b1ad5 .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-18e9612s-d197515839115bf27679c4ce001b1ad5 hr-custom  avia-builder-el-4  el_after_av_textblock  avia-builder-el-last  hr-center hr-icon-no'><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div  class='flex_column av-17sxo55g-ad7489f39340f74e83c1aaea2699bca0 av_one_fifth  avia-builder-el-5  el_after_av_three_fifth  avia-builder-el-last  flex_column_div  '     ><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-av_section-f716ba51e7bf82947c918c6ed882cb73 main_color avia-section-default avia-no-border-styling  avia-builder-el-6  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47742'><div class='entry-content-wrapper clearfix'>\n<div  class='flex_column av-av_one_full-7714eba142aeda1f8b5272a3c372b279 av_one_full  avia-builder-el-7  avia-builder-el-no-sibling  first flex_column_div  '     ><section  class='av_textblock_section av-av_textblock-154edf3b81ea89278a85a087be81f544 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"wsp-container\"><h2 class=\"wsp-pages-title\">Pages<\/h2>\n<ul class=\"wsp-pages-list\">\n<li class=\"page_item page-item-47682\"><a href=\"https:\/\/cyberant.com\/en\/about-us\/\">About us<\/a><\/li>\n<li class=\"page_item page-item-47635\"><a href=\"https:\/\/cyberant.com\/en\/contact\/\">Contact<\/a><\/li>\n<li class=\"page_item page-item-50737\"><a href=\"https:\/\/cyberant.com\/en\/csr\/\">CSR<\/a><\/li>\n<li class=\"page_item page-item-47636\"><a href=\"https:\/\/cyberant.com\/en\/\">Home<\/a><\/li>\n<li class=\"page_item page-item-50658\"><a href=\"https:\/\/cyberant.com\/en\/incident-response\/\">Incident Response<\/a><\/li>\n<li class=\"page_item page-item-47638\"><a href=\"https:\/\/cyberant.com\/en\/knowledge-base\/\">Knowledge base<\/a><\/li>\n<li class=\"page_item page-item-50665\"><a href=\"https:\/\/cyberant.com\/en\/msp\/\">MSP<\/a><\/li>\n<li class=\"page_item page-item-50178\"><a href=\"https:\/\/cyberant.com\/en\/mystery-guest\/\">Mystery Guest<\/a><\/li>\n<li class=\"page_item page-item-49077\"><a href=\"https:\/\/cyberant.com\/en\/vulnerability-management-netcaptain\/\">NetCaptain<\/a><\/li>\n<li class=\"page_item page-item-48401\"><a href=\"https:\/\/cyberant.com\/en\/network-pentest\/\">Network Pentest<\/a><\/li>\n<li class=\"page_item page-item-47603\"><a href=\"https:\/\/cyberant.com\/en\/news\/\">News<\/a><\/li>\n<li class=\"page_item page-item-47670\"><a href=\"https:\/\/cyberant.com\/en\/partners\/\">Partners<\/a><\/li>\n<li class=\"page_item page-item-47664\"><a href=\"https:\/\/cyberant.com\/en\/pen_test\/\">Pentest<\/a><\/li>\n<li class=\"page_item page-item-49768\"><a href=\"https:\/\/cyberant.com\/en\/phishing-campaign\/\">Phishing Campaign<\/a><\/li>\n<li class=\"page_item page-item-47632\"><a href=\"https:\/\/cyberant.com\/en\/privacy-statement\/\">Privacy statement<\/a><\/li>\n<li class=\"page_item page-item-47622\"><a href=\"https:\/\/cyberant.com\/en\/voortgangspagina-quickscan\/\">Progress page Quickscan<\/a><\/li>\n<li class=\"page_item page-item-48475\"><a href=\"https:\/\/cyberant.com\/en\/quick-scan\/\">Quick scan<\/a><\/li>\n<li class=\"page_item page-item-47654\"><a href=\"https:\/\/cyberant.com\/en\/quickscan\/\">Quickscan<\/a><\/li>\n<li class=\"page_item page-item-49743\"><a href=\"https:\/\/cyberant.com\/en\/refund-and-return-policy\/\">Refund and return policy<\/a><\/li>\n<li class=\"page_item page-item-47621\"><a href=\"https:\/\/cyberant.com\/en\/resultaatpagina-quickscan\/\">Results page Quickscan<\/a><\/li>\n<li class=\"page_item page-item-48165\"><a href=\"https:\/\/cyberant.com\/en\/diensten-van-cyberant\/\">Services<\/a><\/li>\n<li class=\"page_item page-item-47742\"><a href=\"https:\/\/cyberant.com\/en\/sitemap\/\">Sitemap<\/a><\/li>\n<li class=\"page_item page-item-47634\"><a href=\"https:\/\/cyberant.com\/en\/terms-and-conditions\/\">Terms and conditions<\/a><\/li>\n<li class=\"page_item page-item-49484\"><a href=\"https:\/\/cyberant.com\/en\/thanks\/\">Thanks<\/a><\/li>\n<li class=\"page_item page-item-49711\"><a href=\"https:\/\/cyberant.com\/en\/thanks-pentest\/\">Thanks Pentest<\/a><\/li>\n<li class=\"page_item page-item-48658\"><a href=\"https:\/\/cyberant.com\/en\/vacancies\/\">Vacancies<\/a><\/li>\n<li class=\"page_item page-item-47604 page_item_has_children\"><a href=\"https:\/\/cyberant.com\/en\/vulnerability-management\/\">Vulnerability Management<\/a>\n<ul class='children'>\n\t<li class=\"page_item page-item-48674\"><a href=\"https:\/\/cyberant.com\/en\/vulnerability-management\/book-a-free-consultation\/\">Book a free consultation<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-48581 page_item_has_children\"><a href=\"https:\/\/cyberant.com\/en\/website-security-check\/\">Website Security Check<\/a>\n<ul class='children'>\n\t<li class=\"page_item page-item-47628\"><a href=\"https:\/\/cyberant.com\/en\/website-security-check\/website-security-check-request\/\">Requesting Website Security Check<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-47631\"><a href=\"https:\/\/cyberant.com\/en\/why-cyberant\/\">Why CyberAnt<\/a><\/li>\n<li class=\"page_item page-item-47630\"><a href=\"https:\/\/cyberant.com\/en\/result\/\">Your Quickscan<\/a><\/li>\n<\/ul>\n<h2 class=\"wsp-posts-title\">Posts by category<\/h2>\n<ul class=\"wsp-posts-list\">\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/knowledge-base\/\">Knowledge base<\/a><\/strong>\n<ul class=\"wsp-posts-list\">\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/nis2-guidelines-what-companies-need-to-know-and-how-to-comply\/\">NIS2 Guidelines: What companies need to know and how to comply<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/user-settings-for-aws-security-audits\/\">User settings for AWS security audits<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/user-settings-for-gcp-security-audits\/\">User settings for GCP security audits<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-web-application-scanning\/\">What is web application scanning?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/how-does-the-cyberrisk-work\/\">How does the CyberRisk work?<\/a><\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/knowledge-base\/cyber-security\/\">Cyber Security<\/a><\/strong>\n<ul class=\"wsp-posts-list\">\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/help-i-have-been-hacked\/\">Help! I have been hacked<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/tens-of-thousands-of-computer-systems-vulnerable-to-break-in\/\">Tens of thousands of computer systems vulnerable to break-in<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/social-engineering\/\">Social Engineering<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/preventing-phishing-attacks\/\">Preventing phishing attacks<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/network-security-check\/\">The Network Security Check<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/wannacry-anti-virus-is-not-enough\/\">WannaCry: Anti-virus is not enough<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/ransomware-anti-virus-alone-is-not-enough\/\">Ransomware: Anti-virus alone is not enough<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/pentest-vs-vulnerability-management\/\">Pentest vs Vulnerability Management<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/owasp-top-10\/\">The Owasp Top 10<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/de-vattenfall-case-responsible-disclosure\/\">De Vattenfall case \u2013 Responsible Disclosure<\/a><\/li>\n<\/ul><\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/knowledge-base\/hacken\/\">Hacken<\/a><\/strong>\n<ul class=\"wsp-posts-list\">\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-cross-site-scripting-xxs\/\">What is cross-site scripting (XXS)?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-cross-site-request-forgery-csrf\/\">What is cross-site request forgery (CSRF)?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/the-risk-of-ds_store\/\">The risk of .DS_Store<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/upgrade-netcat-shell\/\">NetCat shell upgrade<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-clickjacking\/\">What is clickjacking?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/entity-injection\/\">Entity injection<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/cve-2016-7941-xss-in-netgear-prosafe-switches\/\">CVE-2016-7941 &#8211; XSS in Netgear ProSAFE switches<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-server-side-request-forgery-ssrf\/\">What is Server-side request forgery (SSRF)?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/blind-sql-injection\/\">Blind SQL Injection<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-path-traversal\/\">What is path traversal?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/what-is-a-mass-assignment-attack\/\">What is a mass-assignment attack?<\/a><\/li>\n<\/ul><\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/knowledge-base\/product-information\/\">Product information<\/a><\/strong>\n<\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/knowledge-base\/risk-management\/\">Risk management<\/a><\/strong>\n<\/li>\n<\/ul><\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/news-en\/\">News<\/a><\/strong>\n<ul class=\"wsp-posts-list\">\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/once-again-malware-found-in-us-code-extensions\/\">Once again malware found in US Code Extensions<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/large-scale-attack-on-popular-npm-packages-millions-of-websites-and-apps-potentially-affected\/\">Large-scale attack on popular npm packages: millions of websites and apps potentially affected<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/age-verification-on-the-internet-what-about-privacy\/\">Age verification on the Internet: what about privacy?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/magecart-attack-claims-8-8-million-victims-worldwide\/\">Magecart attack claims 8.8 million victims worldwide<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/49529\/\">CyberAnt moved to Zeewolde<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/cyberant-iso-27001-and-9001-certified\/\">CyberAnt ISO 27001 and 9001 certified<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/subsidy-for-web-shops\/\">Subsidy for web shops<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/how-secure-is-your-network\/\">How secure is your network?<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/vulnerability-management-protect-your-network-from-hackers\/\">Vulnerability Management protect your network from hackers<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/preventing-a-data-breach\/\">Preventing a data breach<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/strengthen-your-business-security-with-a-thorough-network-security-check-and-vulnerability-management\/\">Strengthen your corporate security with a thorough Network Security Check<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/pentest-for-iso-27001-certification\/\">Pentest for ISO 27001 certification<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/the-rise-of-cybercrime\/\">The Rise of Cybercrime<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/why-a-pen-test-is-important-even-for-small-businesses\/\">Why a pen test is important even for small businesses<\/a><\/li>\n\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/cyberant-nominated-best-ict-start-up-of-the-year-2018\/\">CyberAnt nominated: Best ICT Start Up of the Year 2018<\/a><\/li>\n<\/ul><\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/news-en-2\/\">News<\/a><\/strong>\n<\/li>\n\t<li><strong class=\"wsp-category-title\">Category: <a href=\"https:\/\/cyberant.com\/en\/category\/not-part-of-a-category\/\">Not part of a category<\/a><\/strong>\n<ul class=\"wsp-posts-list\">\t\t<li class=\"wsp-post\"><a href=\"https:\/\/cyberant.com\/en\/are-you-already-cyber-safe\/\">Are you already Cyber-Safe?<\/a><\/li>\n<\/ul><\/li>\n<\/ul>\n<h2 class=\"wsp-ttshowcases-title\">Testimonials<\/h2>\n<ul class=\"wsp-ttshowcases-list\">\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/amina-2\/\">Amina<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/stevan\/\">Stefaan<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/judith-2\/\">Judith<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/sanne-2\/\">Sanne<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/thomas-2\/\">Thomas<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/juri-2\/\">Juri<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/judith\/\">Judith<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/sanne\/\">Sanne<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/thomas\/\">Thomas<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/amina\/\">Amina<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/juri\/\">Juri<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/testimonial\/bram-hoving\/\">Bram Hoving<\/a><\/li>\n<\/ul>\n<h2 class=\"wsp-ttshowcase_groupss-title\">Group<\/h2>\n<ul class=\"wsp-ttshowcase_groupss-list\">\n<li><a href=\"https:\/\/cyberant.com\/en\/ttshowcase_groups\/testimonials-eng\/\">Testimonials ENG<\/a><\/li>\n<li><a href=\"https:\/\/cyberant.com\/en\/ttshowcase_groups\/testimonials-ned\/\">Testimonials NED<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/section><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_2'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-47742'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-47742","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47742"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/pages\/47742\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}