{"id":507,"date":"2025-03-22T12:47:37","date_gmt":"2025-03-22T12:47:37","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4299190"},"modified":"2025-03-22T12:47:37","modified_gmt":"2025-03-22T12:47:37","slug":"rising-api-vulnerabilities-demand-a-multi-layered-defense","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/","title":{"rendered":"Rising API Vulnerabilities Demand a Multi-Layered Defense"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/ai-employee-runs-code-in-data-center-2025-02-20-00-31-38-utc.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<h2><span class=\"ez-toc-section\" id=\"APIs_as_a_Critical_Asset_Under_Threat\"><\/span>APIs as a Critical Asset Under Threat<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>An application programming interface (API) is the foundation of modern digital ecosystems, enabling seamless communication and interoperability between various applications, services, and platforms. It facilitates data exchange and accelerates the deployment of advanced technologies across industries, from finance and healthcare to e-commerce and cloud computing.<\/p>\n<p>However, as APIs become more integral to business operations, they become a prime target for cyber threats.<\/p>\n<p>According to <a href=\"https:\/\/www.traceable.ai\/2025-state-of-api-security\" target=\"_blank\" rel=\"noopener nofollow sponsored\">Traceable\u2019s 2025 State of API Security Report<\/a>, 57 percent of organizations encountered an API-related data breach within the past two years. Even more concerning, 73 percent of those affected suffered at least three breaches.<\/p>\n<p>A single breach can expose sensitive customer and business information, causing financial losses, regulatory penalties, and legal liabilities. Compromised APIs also cause operational instability, customer distrust, and reputational damage.<\/p>\n<p>As cyber threats escalate, organizations must adopt a proactive, multi-layered approach to API security.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Growing_Complexity_of_API_Security_Challenges\"><\/span>The Growing Complexity of API Security Challenges<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Securing APIs is increasingly challenging as businesses rely more on them. Attackers have learned to exploit vulnerabilities,&nbsp; while monitoring APIs in various environments makes it harder to maintain robust security.<\/p>\n<p>\u201cThe most obvious reason that a paradigm shift needs to take place is that attacks continue to be successful,\u201d explained Adam Arellano, Traceable\u2019s Field Chief Technology Officer.<\/p>\n<p>Traditional protections, such as web application firewalls and content delivery networks, have forced attackers to evolve, leading to new API exploitation methods.<\/p>\n<h3>Rising Volume and Complexity of API Vulnerabilities<\/h3>\n<p>API vulnerabilities have become more frequent and diverse, with several core issues standing out as major threats. These provide attackers opportunities to exploit weaknesses in the API ecosystem.<\/p>\n<p>Key threats include injection attacks like SQL injection and XSS, where malicious code in API requests enables unauthorized access, data theft, or system compromise. Broken object level authorization (BOLA) attacks let users access restricted objects.<\/p>\n<p>Arellano explained, \u201cBroken object level authentication attacks take advantage of the way that an API is configured without the right granularity of protections, allowing an attacker to get more permissions or more information from that API than they were actually intended to get.\u201d He also added that OWASP has consistently ranked <a href=\"https:\/\/owasp.org\/API-Security\/editions\/2023\/en\/0xa1-broken-object-level-authorization\/\" target=\"_blank\" rel=\"noopener nofollow sponsored\">BOLA as the top API vulnerability<\/a> for years.<\/p>\n<p>Another major risk, broken authentication, occurs when flaws let attackers bypass security and impersonate users. Shadow APIs, undocumented and unmanaged, operate outside security oversight, lacking proper monitoring and elevating the risk of data breaches and compliance violations.<\/p>\n<h3>Evolving Attack Vectors Amplifying Security Risks<\/h3>\n<p>As APIs grow, cybercriminals adapt and create new attack vectors. API Abuse exploits weak rate limits and access controls to scrape data or exhaust system resources. Business Logic Attacks manipulate&nbsp; API design flaws to commit fraud.<\/p>\n<p>Cybercriminals also use bots and AI to launch large-scale API attacks, exploiting weaknesses at scale. API security defenses remain inadequate, leaving organizations vulnerable.<\/p>\n<h3>Lack of Visibility in Multi-Cloud and Hybrid API Environments<\/h3>\n<p>API security is challenging in multi-cloud and hybrid environments, where APIs span platforms.<\/p>\n<p>Organizations struggle with unmanaged API growth and security blind spots due to rapid deployments without centralized monitoring. Differing security protocols among cloud providers further complicate uniform protection.<\/p>\n<p>Without centralized monitoring, security teams failed to detect threats in real time, leaving the expanding API ecosystem vulnerable.<\/p>\n<h3>The Business Impacts of API Security Failures<\/h3>\n<p>API security failures extend beyond immediate financial losses. Organizations face substantial regulatory penalties under GDPR and CCPA for exposing customer data. This erodes trust, leading to customer churn and revenue loss.<\/p>\n<p>Operational disruptions occur as API vulnerabilities trigger outages, impacting business continuity. Reputational damage persists long after technical fixes, making attracting and retaining customers harder. Investigation costs, legal fees, and recovery efforts further strain financial health.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Essentials_of_Comprehensive_API_Security\"><\/span>The Essentials of Comprehensive API Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Effective API security requires a layered approach:<\/p>\n<ul>\n<li aria-level=\"1\">Pre-deployment testing detects vulnerabilities early.<\/li>\n<li aria-level=\"1\">Real-time monitoring blocks threats like data scraping and credential stuffing.<\/li>\n<li aria-level=\"1\">Complete visibility of all APIs, including shadow APIs, prevents security blind spots.<\/li>\n<li aria-level=\"1\">AI-driven threat detection identifies emerging risks and accelerates responses.<\/li>\n<li aria-level=\"1\">Simplified deployment ensures seamless integration across multi-cloud and hybrid environments without disrupting existing operations.<\/li>\n<\/ul>\n<p>This strategy protects APIs throughout their lifecycle while maintaining operational efficiency.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"A_Unified_Multi-Layered_Defense_with_AWS_and_Traceable\"><\/span>A Unified, Multi-Layered Defense with AWS and Traceable<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Modern API security demands multi-layered defenses. AWS and Traceable deliver that by combining robust infrastructure security with advanced runtime protection.<\/p>\n<p>AWS offers enterprise-grade encryption, access controls, and network monitoring that scale APIs. Traceable adds AI-powered monitoring and runtime protection, creating a complete security architecture that shields APIs against evolving threats.<\/p>\n<p>Traceable focuses on API-specific security gaps. It partnered with AWS to \u201cfill in the cracks\u201d where attack opportunities remain, Arellano explained.<\/p>\n<h3>Benefits of a Multi-Layered Defense<\/h3>\n<p>A multi-layered security strategy intercepts threats at multiple points, reducing exposure and preventing single vulnerabilities from compromising entire systems.<\/p>\n<p>This approach boosts operational resilience in two ways:<\/p>\n<ul>\n<li aria-level=\"1\">Containing and limiting potential attacks to prevent ecosystem-wide damage.<\/li>\n<li aria-level=\"1\">Rapid recovery using security measures that maintain protection even if one layer is compromised.<\/li>\n<\/ul>\n<h3>Simplified Deployment and Proactive Defense<\/h3>\n<p>A multi-layered approach simplifies deployment in hybrid and cloud-native environments, ensuring consistent protection with minimal complexity. Smooth integration with existing infrastructure is necessary to prevent gaps and disruptions.<\/p>\n<p>Proactive threat detection is key. AI-driven monitoring and machine learning identify threats early, allowing security teams to respond before damage occurs.<\/p>\n<p>Organizations can bolster API security with structured deployment and real-time intelligence while maintaining efficiency.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion_Securing_APIs_for_the_Future\"><\/span>Conclusion: Securing APIs for the Future<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>API threats are rapidly adapting, requiring advanced security strategies. Organizations must move beyond siloed security defenses \u2014 the stakes are too high.<\/p>\n<p>By joining forces, AWS and Traceable AI provide a multi-layered, unified defense with real-time discovery, advanced threat protection, and seamless deployment for cloud-native environments.<\/p>\n<p>Traceable\u2019s Arellano noted, \u201cAs long as an organization or company has information or resources that somebody else wants, you\u2019re never going to be able to stop the arms race of security.\u201d<\/p>\n<p>Don\u2019t wait for a breach. Secure your APIs now. Contact Traceable today to stay ahead of emerging threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>APIs as a Critical Asset Under Threat An application programming interface (API) is the foundation of modern digital ecosystems, enabling seamless communication and interoperability between various applications, services, and platforms. It facilitates data exchange and accelerates the deployment of advanced technologies across industries, from finance and healthcare to e-commerce and cloud computing. However, as APIs [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":508,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rising API Vulnerabilities Demand a Multi-Layered Defense - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rising API Vulnerabilities Demand a Multi-Layered Defense - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"APIs as a Critical Asset Under Threat An application programming interface (API) is the foundation of modern digital ecosystems, enabling seamless communication and interoperability between various applications, services, and platforms. It facilitates data exchange and accelerates the deployment of advanced technologies across industries, from finance and healthcare to e-commerce and cloud computing. However, as APIs [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-22T12:47:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/ai-employee-runs-code-in-data-center-2025-02-20-00-31-38-utc.jpg\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/\",\"name\":\"Rising API Vulnerabilities Demand a Multi-Layered Defense - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/rising-api-vulnerabilities-demand-a-multi-layered-defense.jpg\",\"datePublished\":\"2025-03-22T12:47:37+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/rising-api-vulnerabilities-demand-a-multi-layered-defense.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/rising-api-vulnerabilities-demand-a-multi-layered-defense.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rising API Vulnerabilities Demand a Multi-Layered Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rising API Vulnerabilities Demand a Multi-Layered Defense - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/","og_locale":"en_US","og_type":"article","og_title":"Rising API Vulnerabilities Demand a Multi-Layered Defense - TecnoArtesanos Tech Blog","og_description":"APIs as a Critical Asset Under Threat An application programming interface (API) is the foundation of modern digital ecosystems, enabling seamless communication and interoperability between various applications, services, and platforms. It facilitates data exchange and accelerates the deployment of advanced technologies across industries, from finance and healthcare to e-commerce and cloud computing. However, as APIs [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-22T12:47:37+00:00","og_image":[{"url":"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/ai-employee-runs-code-in-data-center-2025-02-20-00-31-38-utc.jpg","type":"","width":"","height":""}],"author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/","name":"Rising API Vulnerabilities Demand a Multi-Layered Defense - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/rising-api-vulnerabilities-demand-a-multi-layered-defense.jpg","datePublished":"2025-03-22T12:47:37+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/rising-api-vulnerabilities-demand-a-multi-layered-defense.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/rising-api-vulnerabilities-demand-a-multi-layered-defense.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/22\/rising-api-vulnerabilities-demand-a-multi-layered-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Rising API Vulnerabilities Demand a Multi-Layered Defense"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=507"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/507\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/508"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}