{"id":7291,"date":"2022-09-09T10:34:03","date_gmt":"2022-09-09T07:34:03","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7291"},"modified":"2022-09-09T11:52:24","modified_gmt":"2022-09-09T08:52:24","slug":"vulnerability-assessment","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/vulnerability-assessment","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7291\" class=\"elementor elementor-7291 elementor-5352\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa39fbb elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"aa39fbb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-72ae6a9 ot-flex-column-vertical\" data-id=\"72ae6a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7272b55 elementor-widget elementor-widget-iheading\" data-id=\"7272b55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Automatically scan for vulnerabilities and security issues<\/span>\r\n\t        <h2 class=\"main-heading\">Vulnerability assessment<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9adda73 elementor-widget elementor-widget-heading\" data-id=\"9adda73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Vulnerability assessment is the process of identifying vulnerabilities commonly known in information systems only by using automated assessment methods. The term is often associated with penetration tests and the two are widely used interchangeably. However, there are important differences between the two terms, so don't confuse them. Penetration testing focuses on exploiting the discovered vulnerabilities and on the other hand vulnerability assessment only identifies the vulnerabilities in the system without actually testing\/exploiting them.\nThis service includes automatic vulnerability scanning priority based on impact, severity and probability. <b>This is suitable for organizations that are keen to gain an overview and awareness of cyber security.<\/b> The main objective is to identify vulnerabilities that could lead to unauthorized access and exposure of data to unauthorized persons.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c7669d7 ot-flex-column-vertical\" data-id=\"c7669d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c895a51 elementor-widget elementor-widget-image\" data-id=\"c895a51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-1024x1024.png\" class=\"attachment-large size-large wp-image-6464\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate-720x720.png 720w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Site-Stats-cuate.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39cb727 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"39cb727\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f9fa8a1 ot-flex-column-vertical\" data-id=\"f9fa8a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d51aa62 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"d51aa62\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-efbb658 ot-flex-column-vertical\" data-id=\"efbb658\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3384221 elementor-widget elementor-widget-iheading\" data-id=\"3384221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ technology index<\/span>\r\n\t        <h2 class=\"main-heading\">Vulnerability scanning processes<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5806ef0 elementor-widget elementor-widget-itabs\" data-id=\"5806ef0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"itabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"ot-tabs\">\r\n\t\t\t\t\t\t<ul class=\"tabs-heading unstyle\">\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-1660\">1. Identification<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-2660\">2. Analysis<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-3660\">3. Assessment<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-4660\">4. Remediation<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<div id=\"tab-1660\" class=\"tab-content\">\r\n\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">The purpose of this step is to compile a comprehensive list of application or system vulnerabilities.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">Security professionals assess the security of in-scope applications and systems, servers or other systems by scanning them with automated tools.<\/span><\/span><\/p>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-2660\" class=\"tab-content\">\r\n\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"3\"><span class=\"Q4iAWc\">The purpose of this step is to identify the source and root cause of the vulnerabilities identified in step one.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"3\"><span class=\"Q4iAWc\">This includes identifying the system components responsible for each vulnerability and the root cause of the vulnerability.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"2\" data-number-of-phrases=\"3\"><span class=\"Q4iAWc\">For example, the root cause of a vulnerability could be an old version of an open source library.<\/span><\/span><\/p>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-3660\" class=\"tab-content\">\r\n\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">The purpose of this step is to prioritize vulnerabilities.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">This involves security professionals assigning a rank or severity rating to each vulnerability based on many risk factors as well as the environment.<\/span><\/span><\/p>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-4660\" class=\"tab-content\">\r\n\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">The purpose of this step is to reduce the risk of security breaches.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">Specialists issue prescriptions and recommendations for the elimination of vulnerabilities, and it is also possible to provide external references and analyses for easier problem solving.<\/span><\/span><\/p>\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-783aec2 ot-column-items-center ot-flex-column-vertical\" data-id=\"783aec2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8fb76d7 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"8fb76d7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cb33125 ot-flex-column-vertical\" data-id=\"cb33125\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a9765b elementor-widget elementor-widget-iheading\" data-id=\"9a9765b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Different stages of service delivery<\/span>\r\n\t        <h2 class=\"main-heading\">Delivery of the Service<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c34bef2 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c34bef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Scan scope<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4ce79b elementor-widget elementor-widget-text-editor\" data-id=\"a4ce79b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">We can help you determine which part of your IT infrastructure could benefit most from vulnerability scanning.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">It is always a good idea to eliminate IP addresses, domains or system that are inactive or have almost no ports, interfaces or services available.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20c5d9a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"20c5d9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Signing a contract<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-008906d elementor-widget elementor-widget-text-editor\" data-id=\"008906d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"3\"><span class=\"Q4iAWc\">Your company will sign an agreement with us as well as an NDA.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"3\"><span class=\"Q4iAWc\">The scope of the project will be outlined in the contract to ensure that we do not breach the scope of the scan.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"2\" data-number-of-phrases=\"3\"><span class=\"Q4iAWc\">The start and duration of the assignment are also defined and noted in the contract.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd4fa47 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cd4fa47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Perform the scanning<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7d1a5 elementor-widget elementor-widget-text-editor\" data-id=\"0f7d1a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our team will begin the vulnerability scan and notify you if there are any performance or connectivity issues during the scan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73ff8b9 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"73ff8b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Delivery of the final report<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce30417 elementor-widget elementor-widget-text-editor\" data-id=\"ce30417\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"0\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">The final product is an automated scanner report reviewed and approved by our experts.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"bg\" data-phrase-index=\"1\" data-number-of-phrases=\"2\"><span class=\"Q4iAWc\">It includes a summary and classification of vulnerabilities, images, as well as risk mitigation recommendations and references.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a9d1bd4 ot-column-items-center ot-flex-column-vertical\" data-id=\"a9d1bd4\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Automatically scan for vulnerabilities and security issues Vulnerability assessment Vulnerability assessment is the process of identifying vulnerabilities commonly known in information systems only by using automated assessment methods. The term is often associated with penetration tests and the two are widely used interchangeably. However, there are important differences between the two terms, so don&#8217;t [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7291","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7291"}],"version-history":[{"count":9,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7291\/revisions"}],"predecessor-version":[{"id":7314,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7291\/revisions\/7314"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}