{"id":15772,"date":"2025-09-24T07:08:27","date_gmt":"2025-09-24T07:08:27","guid":{"rendered":"https:\/\/www.openedr.com\/blog\/?p=15772"},"modified":"2025-09-24T07:09:55","modified_gmt":"2025-09-24T07:09:55","slug":"what-is-osint","status":"publish","type":"post","link":"https:\/\/www.openedr.com\/blog\/what-is-osint\/","title":{"rendered":"What Is OSINT? A Complete Guide to Open-Source Intelligence"},"content":{"rendered":"<p data-start=\"423\" data-end=\"615\">With cyber threats, misinformation, and digital risks on the rise, many IT leaders and security professionals are asking: <em data-start=\"545\" data-end=\"613\">what is OSINT and why is it so important for modern cybersecurity?<\/em><\/p>\n<p data-start=\"617\" data-end=\"895\"><strong data-start=\"617\" data-end=\"653\">OSINT (Open-Source Intelligence)<\/strong> refers to the practice of collecting and analyzing publicly available information from the internet and other sources. Security teams, businesses, and governments use OSINT to detect threats, track adversaries, and make informed decisions.<\/p>\n<p data-start=\"897\" data-end=\"1118\">In fact, experts estimate that <strong data-start=\"928\" data-end=\"1022\">over 80% of intelligence data used in cybersecurity investigations comes from open sources<\/strong>. This makes OSINT a critical tool for IT managers, CEOs, and organizations across industries.<\/p>\n<h2 data-start=\"1125\" data-end=\"1144\"><strong>What Is OSINT?<\/strong><\/h2>\n<p data-start=\"1146\" data-end=\"1302\">At its core, <strong data-start=\"1159\" data-end=\"1263\">OSINT is the process of gathering, analyzing, and using information from publicly accessible sources<\/strong> to generate actionable intelligence.<\/p>\n<p data-start=\"1304\" data-end=\"1328\"><strong>These sources include:<\/strong><\/p>\n<ul data-start=\"1329\" data-end=\"1531\">\n<li data-start=\"1329\" data-end=\"1367\">\n<p data-start=\"1331\" data-end=\"1367\">Websites, blogs, and news articles<\/p>\n<\/li>\n<li data-start=\"1368\" data-end=\"1394\">\n<p data-start=\"1370\" data-end=\"1394\">Social media platforms<\/p>\n<\/li>\n<li data-start=\"1395\" data-end=\"1424\">\n<p data-start=\"1397\" data-end=\"1424\">Public government records<\/p>\n<\/li>\n<li data-start=\"1425\" data-end=\"1458\">\n<p data-start=\"1427\" data-end=\"1458\">Online forums and communities<\/p>\n<\/li>\n<li data-start=\"1459\" data-end=\"1486\">\n<p data-start=\"1461\" data-end=\"1486\">WHOIS and DNS databases<\/p>\n<\/li>\n<li data-start=\"1487\" data-end=\"1531\">\n<p data-start=\"1489\" data-end=\"1531\">Multimedia (images, videos, audio files)<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1533\" data-end=\"1699\">\ud83d\udc49 <strong data-start=\"1536\" data-end=\"1556\">In simple terms:<\/strong> OSINT is about using what\u2019s already public to uncover insights that can strengthen security, protect businesses, and support investigations.<\/p>\n<h3 data-start=\"1706\" data-end=\"1731\"><strong>How Does OSINT Work?<\/strong><\/h3>\n<p data-start=\"1733\" data-end=\"1811\">To fully understand <em data-start=\"1753\" data-end=\"1768\">what is OSINT<\/em>, let\u2019s look at the process step by step:<\/p>\n<ol data-start=\"1813\" data-end=\"2240\">\n<li data-start=\"1813\" data-end=\"1906\">\n<p data-start=\"1816\" data-end=\"1906\"><strong data-start=\"1816\" data-end=\"1830\">Collection<\/strong> \u2013 Gather data from open sources (social media, websites, public records).<\/p>\n<\/li>\n<li data-start=\"1907\" data-end=\"1966\">\n<p data-start=\"1910\" data-end=\"1966\"><strong data-start=\"1910\" data-end=\"1924\">Processing<\/strong> \u2013 Organize and clean data for analysis.<\/p>\n<\/li>\n<li data-start=\"1967\" data-end=\"2051\">\n<p data-start=\"1970\" data-end=\"2051\"><strong data-start=\"1970\" data-end=\"1982\">Analysis<\/strong> \u2013 Apply investigative techniques to identify patterns and threats.<\/p>\n<\/li>\n<li data-start=\"2052\" data-end=\"2144\">\n<p data-start=\"2055\" data-end=\"2144\"><strong data-start=\"2055\" data-end=\"2072\">Dissemination<\/strong> \u2013 Share findings with decision-makers, security teams, or executives.<\/p>\n<\/li>\n<li data-start=\"2145\" data-end=\"2240\">\n<p data-start=\"2148\" data-end=\"2240\"><strong data-start=\"2148\" data-end=\"2158\">Action<\/strong> \u2013 Use intelligence to respond to risks, strengthen defenses, or guide strategy.<\/p>\n<\/li>\n<\/ol>\n<p data-start=\"2242\" data-end=\"2395\"><strong>Example:<\/strong> A cybersecurity team might use OSINT to identify phishing websites impersonating their brand and take them down before customers are targeted.<\/p>\n<h3 data-start=\"2402\" data-end=\"2429\"><strong>OSINT in Cybersecurity<\/strong><\/h3>\n<p data-start=\"2431\" data-end=\"2576\">For IT managers and executives, <em data-start=\"2463\" data-end=\"2478\">what is OSINT<\/em> often connects directly to <strong data-start=\"2506\" data-end=\"2529\">threat intelligence<\/strong>. Here\u2019s how OSINT strengthens cybersecurity:<\/p>\n<ul data-start=\"2578\" data-end=\"2985\">\n<li data-start=\"2578\" data-end=\"2675\">\n<p data-start=\"2580\" data-end=\"2675\"><strong data-start=\"2580\" data-end=\"2600\">Threat Detection<\/strong>: Identifies phishing domains, malware campaigns, and leaked credentials.<\/p>\n<\/li>\n<li data-start=\"2676\" data-end=\"2762\">\n<p data-start=\"2678\" data-end=\"2762\"><strong data-start=\"2678\" data-end=\"2698\">Brand Protection<\/strong>: Monitors social media and forums for impersonation attempts.<\/p>\n<\/li>\n<li data-start=\"2763\" data-end=\"2832\">\n<p data-start=\"2765\" data-end=\"2832\"><strong data-start=\"2765\" data-end=\"2786\">Incident Response<\/strong>: Provides context during security breaches.<\/p>\n<\/li>\n<li data-start=\"2833\" data-end=\"2910\">\n<p data-start=\"2835\" data-end=\"2910\"><strong data-start=\"2835\" data-end=\"2863\">Vulnerability Management<\/strong>: Tracks exploits discussed in hacker forums.<\/p>\n<\/li>\n<li data-start=\"2911\" data-end=\"2985\">\n<p data-start=\"2913\" data-end=\"2985\"><strong data-start=\"2913\" data-end=\"2933\">Fraud Prevention<\/strong>: Detects fraudulent activity before it escalates.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2987\" data-end=\"3090\">\ud83d\udc49 Research shows that <strong data-start=\"3010\" data-end=\"3087\">60% of businesses use OSINT as part of their threat intelligence strategy<\/strong>.<\/p>\n<h3 data-start=\"3097\" data-end=\"3124\"><strong>Types of OSINT Sources<\/strong><\/h3>\n<p data-start=\"3126\" data-end=\"3188\">Not all open data is the same. Here are the main categories:<\/p>\n<p data-start=\"3190\" data-end=\"3238\">1. <strong data-start=\"3197\" data-end=\"3236\">Social Media Intelligence (SOCMINT)<\/strong><\/p>\n<p data-start=\"3239\" data-end=\"3348\">Collects data from platforms like LinkedIn, Twitter (X), and Facebook to monitor activity and detect risks.<\/p>\n<p data-start=\"3350\" data-end=\"3395\">2. <strong data-start=\"3357\" data-end=\"3393\">Technical Intelligence (TECHINT)<\/strong><\/p>\n<p data-start=\"3396\" data-end=\"3479\">Focuses on IP addresses, DNS records, and metadata to detect suspicious activity.<\/p>\n<p data-start=\"3481\" data-end=\"3521\">3. <strong data-start=\"3488\" data-end=\"3519\">Human Intelligence (HUMINT)<\/strong><\/p>\n<p data-start=\"3522\" data-end=\"3591\">Involves analyzing human behavior in online communities and forums.<\/p>\n<p data-start=\"3593\" data-end=\"3638\">4. <strong data-start=\"3600\" data-end=\"3636\">Geospatial Intelligence (GEOINT)<\/strong><\/p>\n<p data-start=\"3639\" data-end=\"3705\">Uses maps, satellite images, and location data to track threats.<\/p>\n<h3 data-start=\"3712\" data-end=\"3736\"><strong>Popular OSINT Tools<\/strong><\/h3>\n<p data-start=\"3738\" data-end=\"3815\">To implement OSINT effectively, businesses often rely on specialized tools.<\/p>\n<ul data-start=\"3817\" data-end=\"4163\">\n<li data-start=\"3817\" data-end=\"3882\">\n<p data-start=\"3819\" data-end=\"3882\"><strong data-start=\"3819\" data-end=\"3830\">Maltego<\/strong> \u2013 Visual link analysis for online investigations.<\/p>\n<\/li>\n<li data-start=\"3883\" data-end=\"3945\">\n<p data-start=\"3885\" data-end=\"3945\"><strong data-start=\"3885\" data-end=\"3895\">Shodan<\/strong> \u2013 Search engine for internet-connected devices.<\/p>\n<\/li>\n<li data-start=\"3946\" data-end=\"4007\">\n<p data-start=\"3948\" data-end=\"4007\"><strong data-start=\"3948\" data-end=\"3964\">theHarvester<\/strong> \u2013 Gathers emails, names, and subdomains.<\/p>\n<\/li>\n<li data-start=\"4008\" data-end=\"4085\">\n<p data-start=\"4010\" data-end=\"4085\"><strong data-start=\"4010\" data-end=\"4024\">SpiderFoot<\/strong> \u2013 Automates OSINT collection across multiple data sources.<\/p>\n<\/li>\n<li data-start=\"4086\" data-end=\"4163\">\n<p data-start=\"4088\" data-end=\"4163\"><strong data-start=\"4088\" data-end=\"4104\">Google Dorks<\/strong> \u2013 Advanced search queries to uncover hidden information.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4165\" data-end=\"4266\">\ud83d\udc49 These tools help cybersecurity teams collect actionable intelligence faster and more accurately.<\/p>\n<h3 data-start=\"4273\" data-end=\"4310\"><strong>Benefits of OSINT for Businesses<\/strong><\/h3>\n<p data-start=\"4312\" data-end=\"4378\">For executives and IT managers, OSINT offers several advantages:<\/p>\n<ul data-start=\"4380\" data-end=\"4821\">\n<li data-start=\"4380\" data-end=\"4475\">\n<p data-start=\"4382\" data-end=\"4475\"><strong data-start=\"4382\" data-end=\"4400\">Cost-Effective<\/strong> \u2013 Relies on public data, reducing reliance on expensive private sources.<\/p>\n<\/li>\n<li data-start=\"4476\" data-end=\"4545\">\n<p data-start=\"4478\" data-end=\"4545\"><strong data-start=\"4478\" data-end=\"4500\">Proactive Security<\/strong> \u2013 Identifies threats before they escalate.<\/p>\n<\/li>\n<li data-start=\"4546\" data-end=\"4642\">\n<p data-start=\"4548\" data-end=\"4642\"><strong data-start=\"4548\" data-end=\"4576\">Competitive Intelligence<\/strong> \u2013 Provides insights into market trends and competitor activity.<\/p>\n<\/li>\n<li data-start=\"4643\" data-end=\"4735\">\n<p data-start=\"4645\" data-end=\"4735\"><strong data-start=\"4645\" data-end=\"4670\">Regulatory Compliance<\/strong> \u2013 Supports risk assessments for standards like GDPR and HIPAA.<\/p>\n<\/li>\n<li data-start=\"4736\" data-end=\"4821\">\n<p data-start=\"4738\" data-end=\"4821\"><strong data-start=\"4738\" data-end=\"4763\">Reputation Management<\/strong> \u2013 Monitors public perception and brand mentions online.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4828\" data-end=\"4852\"><strong>Challenges of OSINT<\/strong><\/h3>\n<p data-start=\"4854\" data-end=\"4897\"><strong>While powerful, OSINT has its challenges:<\/strong><\/p>\n<ul data-start=\"4899\" data-end=\"5205\">\n<li data-start=\"4899\" data-end=\"4976\">\n<p data-start=\"4901\" data-end=\"4976\"><strong data-start=\"4901\" data-end=\"4925\">Information Overload<\/strong> \u2013 Massive amounts of data can be hard to manage.<\/p>\n<\/li>\n<li data-start=\"4977\" data-end=\"5045\">\n<p data-start=\"4979\" data-end=\"5045\"><strong data-start=\"4979\" data-end=\"4996\">Data Accuracy<\/strong> \u2013 Public information may be outdated or false.<\/p>\n<\/li>\n<li data-start=\"5046\" data-end=\"5133\">\n<p data-start=\"5048\" data-end=\"5133\"><strong data-start=\"5048\" data-end=\"5068\">Privacy Concerns<\/strong> \u2013 Businesses must ensure compliance with data protection laws.<\/p>\n<\/li>\n<li data-start=\"5134\" data-end=\"5205\">\n<p data-start=\"5136\" data-end=\"5205\"><strong data-start=\"5136\" data-end=\"5165\">Skilled Analysts Required<\/strong> \u2013 Proper analysis requires expertise.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5207\" data-end=\"5325\"><strong>\ud83d\udc49 Solution:<\/strong> Pair OSINT with <strong data-start=\"5236\" data-end=\"5259\">AI-driven analytics<\/strong> and <strong data-start=\"5264\" data-end=\"5303\"><a href=\"https:\/\/www.openedr.com\/blog\/what-is-edr\/\">EDR<\/a> (Endpoint Detection &amp; Response)<\/strong> for better results.<\/p>\n<h3 data-start=\"5332\" data-end=\"5370\"><strong>OSINT vs Traditional Intelligence<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<div class=\"_tableContainer_1rjym_1\">\n<div class=\"group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"5372\" data-end=\"5955\">\n<thead data-start=\"5372\" data-end=\"5455\">\n<tr data-start=\"5372\" data-end=\"5455\">\n<th data-start=\"5372\" data-end=\"5393\" data-col-size=\"sm\">Feature<\/th>\n<th data-start=\"5393\" data-end=\"5427\" data-col-size=\"sm\">OSINT<\/th>\n<th data-start=\"5427\" data-end=\"5455\" data-col-size=\"sm\">Traditional Intelligence<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"5539\" data-end=\"5955\">\n<tr data-start=\"5539\" data-end=\"5621\">\n<td data-start=\"5539\" data-end=\"5560\" data-col-size=\"sm\">Source<\/td>\n<td data-start=\"5560\" data-end=\"5593\" data-col-size=\"sm\">Publicly available<\/td>\n<td data-start=\"5593\" data-end=\"5621\" data-col-size=\"sm\">Classified or private<\/td>\n<\/tr>\n<tr data-start=\"5622\" data-end=\"5704\">\n<td data-start=\"5622\" data-end=\"5643\" data-col-size=\"sm\">Cost<\/td>\n<td data-start=\"5643\" data-end=\"5676\" data-col-size=\"sm\">Low<\/td>\n<td data-start=\"5676\" data-end=\"5704\" data-col-size=\"sm\">High<\/td>\n<\/tr>\n<tr data-start=\"5705\" data-end=\"5787\">\n<td data-start=\"5705\" data-end=\"5726\" data-col-size=\"sm\">Accessibility<\/td>\n<td data-start=\"5726\" data-end=\"5759\" data-col-size=\"sm\">Open to anyone<\/td>\n<td data-start=\"5759\" data-end=\"5787\" data-col-size=\"sm\">Restricted<\/td>\n<\/tr>\n<tr data-start=\"5788\" data-end=\"5870\">\n<td data-start=\"5788\" data-end=\"5809\" data-col-size=\"sm\">Risk Detection<\/td>\n<td data-start=\"5809\" data-end=\"5842\" data-col-size=\"sm\">Early warnings<\/td>\n<td data-start=\"5842\" data-end=\"5870\" data-col-size=\"sm\">In-depth, but slower<\/td>\n<\/tr>\n<tr data-start=\"5871\" data-end=\"5955\">\n<td data-start=\"5871\" data-end=\"5892\" data-col-size=\"sm\">Use Case<\/td>\n<td data-start=\"5892\" data-end=\"5925\" data-col-size=\"sm\">Cybersecurity, business intel<\/td>\n<td data-start=\"5925\" data-end=\"5955\" data-col-size=\"sm\">National security, defense<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<h2 data-start=\"5962\" data-end=\"5997\"><\/h2>\n<h3 data-start=\"5962\" data-end=\"5997\"><strong>Best Practices for Using OSINT<\/strong><\/h3>\n<p data-start=\"5999\" data-end=\"6070\">To maximize its value, businesses should follow these best practices:<\/p>\n<ul data-start=\"6072\" data-end=\"6348\">\n<li data-start=\"6072\" data-end=\"6127\">\n<p data-start=\"6074\" data-end=\"6127\">\u2705 Define clear objectives for OSINT investigations.<\/p>\n<\/li>\n<li data-start=\"6128\" data-end=\"6183\">\n<p data-start=\"6130\" data-end=\"6183\">\u2705 Use a mix of manual research and automated tools.<\/p>\n<\/li>\n<li data-start=\"6184\" data-end=\"6232\">\n<p data-start=\"6186\" data-end=\"6232\">\u2705 Verify information accuracy before acting.<\/p>\n<\/li>\n<li data-start=\"6233\" data-end=\"6288\">\n<p data-start=\"6235\" data-end=\"6288\">\u2705 Train staff in ethical and legal OSINT practices.<\/p>\n<\/li>\n<li data-start=\"6289\" data-end=\"6348\">\n<p data-start=\"6291\" data-end=\"6348\">\u2705 Integrate OSINT into <strong data-start=\"6314\" data-end=\"6345\">incident response workflows<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"6355\" data-end=\"6388\"><\/h3>\n<h3 data-start=\"6355\" data-end=\"6388\"><strong>Why OSINT Alone Isn\u2019t Enough<\/strong><\/h3>\n<p data-start=\"6390\" data-end=\"6574\">While OSINT provides valuable intelligence, it doesn\u2019t cover every security need. Hackers can still exploit vulnerabilities inside networks. That\u2019s why OSINT should be combined with:<\/p>\n<ul data-start=\"6576\" data-end=\"6735\">\n<li data-start=\"6576\" data-end=\"6625\">\n<p data-start=\"6578\" data-end=\"6625\">Firewalls and Intrusion Detection Systems<\/p>\n<\/li>\n<li data-start=\"6626\" data-end=\"6655\">\n<p data-start=\"6628\" data-end=\"6655\">Zero Trust frameworks<\/p>\n<\/li>\n<li data-start=\"6656\" data-end=\"6699\">\n<p data-start=\"6658\" data-end=\"6699\">Endpoint Detection &amp; Response (EDR)<\/p>\n<\/li>\n<li data-start=\"6700\" data-end=\"6735\">\n<p data-start=\"6702\" data-end=\"6735\">Security Awareness Training<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6737\" data-end=\"6835\">\ud83d\udc49 Together, OSINT and EDR provide visibility into both <strong data-start=\"6793\" data-end=\"6832\">external threats and internal risks<\/strong>.<\/p>\n<h3 data-start=\"6842\" data-end=\"6867\"><strong>FAQs: What Is OSINT?<\/strong><\/h3>\n<p data-start=\"6869\" data-end=\"7014\"><strong data-start=\"6869\" data-end=\"6891\">1. Is OSINT legal?<\/strong><br data-start=\"6891\" data-end=\"6894\" \/>Yes, OSINT uses publicly available data. However, businesses must comply with privacy and data protection regulations.<\/p>\n<p data-start=\"7016\" data-end=\"7146\"><strong data-start=\"7016\" data-end=\"7038\">2. Who uses OSINT?<\/strong><br data-start=\"7038\" data-end=\"7041\" \/>Cybersecurity teams, law enforcement, governments, financial institutions, and businesses of all sizes.<\/p>\n<p data-start=\"7148\" data-end=\"7299\"><strong data-start=\"7148\" data-end=\"7192\">3. How does OSINT help in cybersecurity?<\/strong><br data-start=\"7192\" data-end=\"7195\" \/>It identifies external threats, leaked data, phishing sites, and other risks before they cause damage.<\/p>\n<p data-start=\"7301\" data-end=\"7413\"><strong data-start=\"7301\" data-end=\"7348\">4. What tools are best for OSINT beginners?<\/strong><br data-start=\"7348\" data-end=\"7351\" \/>Shodan, Google Dorks, and Maltego are great starting points.<\/p>\n<p data-start=\"7415\" data-end=\"7520\"><strong data-start=\"7415\" data-end=\"7440\">5. Is OSINT reliable?<\/strong><br data-start=\"7440\" data-end=\"7443\" \/>Yes, but it depends on source verification. Cross-checking data is crucial.<\/p>\n<h4 data-start=\"7527\" data-end=\"7578\"><strong>Conclusion: OSINT as a Cybersecurity Essential<\/strong><\/h4>\n<p data-start=\"7580\" data-end=\"7857\">So, <em data-start=\"7584\" data-end=\"7599\">what is OSINT<\/em>? It\u2019s the practice of gathering and analyzing publicly available information to create actionable intelligence. For businesses, OSINT provides powerful insights into <strong data-start=\"7766\" data-end=\"7805\">threats, vulnerabilities, and risks<\/strong>\u2014helping protect data, reputation, and operations.<\/p>\n<p data-start=\"7859\" data-end=\"8016\">However, OSINT is most effective when integrated into a <strong data-start=\"7915\" data-end=\"7944\">layered security approach<\/strong>, alongside endpoint protection, firewalls, and Zero Trust principles.<\/p>\n<p data-start=\"8018\" data-end=\"8149\">\ud83d\udc49 Take the next step toward proactive cybersecurity: <a class=\"decorated-link\" href=\"https:\/\/openedr.platform.xcitium.com\/register\/\" target=\"_new\" rel=\"noopener\" data-start=\"8072\" data-end=\"8147\">Register for OpenEDR Free<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cyber threats, misinformation, and digital risks on the rise, many IT leaders and security professionals are asking: what is OSINT and why is it so important for modern cybersecurity? OSINT (Open-Source Intelligence) refers to the practice of collecting and analyzing publicly available information from the internet and other sources. Security teams, businesses, and governments&hellip; <a class=\"more-link\" href=\"https:\/\/www.openedr.com\/blog\/what-is-osint\/\">Continue reading <span class=\"screen-reader-text\">What Is OSINT? A Complete Guide to Open-Source Intelligence<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":15782,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"_links":{"self":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/15772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/comments?post=15772"}],"version-history":[{"count":3,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/15772\/revisions"}],"predecessor-version":[{"id":15812,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/15772\/revisions\/15812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/media\/15782"}],"wp:attachment":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/media?parent=15772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/categories?post=15772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/tags?post=15772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}