{"id":1705,"date":"2018-11-09T17:16:37","date_gmt":"2018-11-09T15:16:37","guid":{"rendered":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/?p=1705"},"modified":"2018-11-09T17:17:33","modified_gmt":"2018-11-09T15:17:33","slug":"microsoft-security-intelligence-report","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/","title":{"rendered":"Microsoft Security Intelligence Report"},"content":{"rendered":"<h1>Ausgabe 23<\/h1>\n<p>Erfahren Sie mehr \u00fcber die aktuellen Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens mit den sich stets weiterentwickelnden Bedrohungen von heute Schritt h\u00e4lt. Der Microsoft Security Intelligence Report, Ausgabe 23 analysiert die wichtigsten Sicherheitstrends des vergangenen Jahres und bietet hilfreiche Empfehlungen dazu, wie Ihre Reaktionen heute aussehen sollten.<\/p>\n<p>Laden Sie den aktuellen Security Intelligence Report herunter, und erfahren Sie mehr \u00fcber die wichtigsten Trends im Bereich Cyberbedrohungen, die in der letzten Zeit die Sicherheitslage dominiert haben:<\/p>\n<ul>\n<li><strong>Botnets.<\/strong><br \/>\nSie infizieren weltweit Millionen von Computern mit alter und neuer Schadsoftware. Erfahren Sie mehr \u00fcber ein bekanntes Botnet, Gamarue, an dessen Bek\u00e4mpfung Microsoft beteiligt war.<\/li>\n<li><strong>Angriffsmethoden.<\/strong><br \/>\nAngreifer haben reibungsarme Methoden eingesetzt, um in Unternehmen einzudringen. Erfahren Sie mehr \u00fcber die Ans\u00e4tze, mit denen Angreifer versuchen, Schwachstellen in Unternehmen auszunutzen.<\/li>\n<li><strong>Ransomware.<\/strong><br \/>\nDrei globale Ausbr\u00fcche haben zu Ausf\u00e4llen wichtiger Dienste in Unternehmensnetzwerken gef\u00fchrt. Diese schnellen, zerst\u00f6rerischen Angriffe im Jahr 2017 hatten beispiellose Auswirkungen.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/info.microsoft.com\/ww-landing-Security-Intelligence-Report-Vol-23-Landing-Page-eBook.html?LCID=de-de\"><strong>Jetzt den Security Intelligence Report herunterladen<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Erfahren Sie mehr \u00fcber die aktuellen Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens mit den sich stets weiterentwickelnden Bedrohungen von heute Schritt h\u00e4lt.<\/p>\n","protected":false},"author":127,"featured_media":1708,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1],"post_tag":[],"content-type":[268],"coauthors":[18],"class_list":["post-1705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","content-type-sicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Security Intelligence Report - Microsoft Branchenblogs<\/title>\n<meta name=\"description\" content=\"Erfahren Sie mehr \u00fcber Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens auf dem neuesten Stand ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security Intelligence Report - Microsoft Branchenblogs\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie mehr \u00fcber Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens auf dem neuesten Stand ist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Branchenblogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MicrosoftinBusinessDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-09T15:16:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-09T15:17:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msenterprisede\" \/>\n<meta name=\"twitter:site\" content=\"@msenterprisede\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/author\/microsoft\/\",\"@type\":\"Person\",\"@name\":\"Microsoft\"}],\"headline\":\"Microsoft Security Intelligence Report\",\"datePublished\":\"2018-11-09T15:16:37+00:00\",\"dateModified\":\"2018-11-09T15:17:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\"},\"wordCount\":167,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg\",\"articleSection\":[\"Branchen\u00fcbergreifend\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\",\"url\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\",\"name\":\"Microsoft Security Intelligence Report - Microsoft Branchenblogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg\",\"datePublished\":\"2018-11-09T15:16:37+00:00\",\"dateModified\":\"2018-11-09T15:17:33+00:00\",\"description\":\"Erfahren Sie mehr \u00fcber Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens auf dem neuesten Stand ist.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg\",\"width\":800,\"height\":400,\"caption\":\"Microsoft Security Report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Security Intelligence Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/\",\"name\":\"Microsoft Branchenblogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#organization\",\"name\":\"Microsoft Branchenblogs\",\"url\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Branchenblogs\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MicrosoftinBusinessDE\/\",\"https:\/\/x.com\/msenterprisede\",\"https:\/\/www.youtube.com\/user\/MicrosoftBusiness\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security Intelligence Report - Microsoft Branchenblogs","description":"Erfahren Sie mehr \u00fcber Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens auf dem neuesten Stand ist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security Intelligence Report - Microsoft Branchenblogs","og_description":"Erfahren Sie mehr \u00fcber Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens auf dem neuesten Stand ist.","og_url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/","og_site_name":"Microsoft Branchenblogs","article_publisher":"https:\/\/www.facebook.com\/MicrosoftinBusinessDE\/","article_published_time":"2018-11-09T15:16:37+00:00","article_modified_time":"2018-11-09T15:17:33+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg","type":"image\/jpeg"}],"author":"Microsoft","twitter_card":"summary_large_image","twitter_creator":"@msenterprisede","twitter_site":"@msenterprisede","twitter_misc":{"Written by":"Microsoft","Est. reading time":"1 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/author\/microsoft\/","@type":"Person","@name":"Microsoft"}],"headline":"Microsoft Security Intelligence Report","datePublished":"2018-11-09T15:16:37+00:00","dateModified":"2018-11-09T15:17:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/"},"wordCount":167,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg","articleSection":["Branchen\u00fcbergreifend"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/","url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/","name":"Microsoft Security Intelligence Report - Microsoft Branchenblogs","isPartOf":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg","datePublished":"2018-11-09T15:16:37+00:00","dateModified":"2018-11-09T15:17:33+00:00","description":"Erfahren Sie mehr \u00fcber Cyberbedrohungen, und stellen Sie sicher, dass die Sicherheit Ihres Unternehmens auf dem neuesten Stand ist.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#primaryimage","url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg","contentUrl":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2018\/11\/Micrososft-Security-Report-800x450.jpg","width":800,"height":400,"caption":"Microsoft Security Report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/uncategorized\/2018\/11\/09\/microsoft-security-intelligence-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Security Intelligence Report"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/","name":"Microsoft Branchenblogs","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#organization","name":"Microsoft Branchenblogs","url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-content\/uploads\/sites\/2\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Branchenblogs"},"image":{"@id":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MicrosoftinBusinessDE\/","https:\/\/x.com\/msenterprisede","https:\/\/www.youtube.com\/user\/MicrosoftBusiness"]}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/posts\/1705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/users\/127"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/comments?post=1705"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/posts\/1705\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/media\/1708"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/media?parent=1705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/categories?post=1705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=1705"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=1705"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/de-de\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=1705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}