{"id":2236,"date":"2026-02-24T08:06:44","date_gmt":"2026-02-24T16:06:44","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2236"},"modified":"2026-02-26T04:04:28","modified_gmt":"2026-02-26T12:04:28","slug":"emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/","title":{"rendered":"Emerging Threat &#8211; Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"610\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1280x610.png\" alt=\"\" class=\"wp-image-2237\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1280x610.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-512x244.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-768x366.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1536x732.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png 1851w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">Sample of assets impacted by CVE-2026-22769, identified by the CyCognito Platform<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-22769?<\/h2>\n\n\n\n<p>CVE-2026-22769 is a hardcoded credential vulnerability affecting Dell RecoverPoint for VMs, a disaster recovery orchestration platform used to manage replication and failover of virtualized workloads. The issue stems from static authentication credentials embedded within a product component. Because these credentials are not uniquely generated per deployment and cannot be changed by administrators, they introduce a structural authentication weakness.<\/p>\n\n\n\n<p>Hardcoded credentials eliminate the expectation that authentication secrets are environment-specific and confidential. If the associated service is reachable over the network, an attacker who is aware of the embedded credential can authenticate without prior compromise of user accounts. This shifts exploitation from credential theft or brute-force activity to simple service discovery combined with known authentication material.<\/p>\n\n\n\n<p>The severity of impact depends on the privilege level assigned to the embedded account and the interfaces it can access. In management and orchestration platforms, service-level credentials frequently operate with elevated privileges to interact with hypervisors, replication engines, and configuration APIs. If exposed, this can grant administrative control over the RecoverPoint for VMs management plane, enabling modification of replication policies, disruption of failover processes, and potential access to metadata about protected virtual machines.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-22769?<\/h2>\n\n\n\n<p>The vulnerability affects deployments of Dell RecoverPoint for VMs that include the component containing the hardcoded credential. Organizations should reference Dell\u2019s official security advisory to confirm the precise affected version range and deployment models.<\/p>\n\n\n\n<p>From an exposure perspective, the highest-risk assets are internet-accessible RecoverPoint for VMs management interfaces, APIs, and supporting services. Although these systems are typically intended for internal management networks, real-world enterprise environments frequently include exceptions. Public IP assignments, misconfigured firewall rules, cloud security group misalignment, third-party access requirements, and inherited network configurations can unintentionally expose orchestration platforms to the internet.<\/p>\n\n\n\n<p>RecoverPoint for VMs is often deployed as a virtual appliance integrated into virtualized data center or hybrid cloud environments. In multi-site or cloud-connected architectures, administrative interfaces may be reachable through NAT configurations, VPN endpoints, or externally accessible management segments. If these services are discoverable through internet scanning and protected only by the embedded static credential, they become viable remote entry points.<\/p>\n\n\n\n<p>Compromise of the disaster recovery management layer carries downstream risk. An attacker with authenticated access may be able to alter protection groups, modify replication settings, initiate or disrupt failover workflows, or enumerate protected workloads. Depending on integration depth and network segmentation, this access could also facilitate lateral movement into hypervisor management networks or other connected infrastructure systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<p>CyCognito\u2019s external exposure telemetry indicates that internet-reachable management services associated with enterprise infrastructure platforms are distributed across multiple industry sectors rather than concentrated in a single vertical. The accompanying graph illustrates the relative distribution of observed exposed assets across Consumer, Financial Services, Education, Transportation, Energy, Manufacturing, and Technology organizations.<\/p>\n\n\n\n<p>This cross-sector distribution reinforces that exposure of high-privilege management interfaces is not limited to traditionally targeted industries. Organizations operating complex hybrid environments, distributed infrastructure, or multi-domain architectures frequently accumulate externally reachable administrative systems over time. In many cases, these exposures originate from legacy deployments, temporary access exceptions that became permanent, or cloud migration artifacts that were never fully decommissioned.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"778\" height=\"476\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-117.png\" alt=\"\" class=\"wp-image-2239\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-117.png 778w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-117-512x313.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-117-768x470.png 768w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/figure>\n\n\n\n<p>From an attacker\u2019s perspective, industry vertical is secondary to reachability and authentication posture. A hardcoded credential vulnerability such as CVE-2026-22769 becomes materially exploitable only when the affected service is externally discoverable. The data underscores that cross-industry exposure of infrastructure management platforms remains a persistent condition, reinforcing the need for continuous external attack surface monitoring rather than reliance on assumed network segmentation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Dell has released security updates addressing CVE-2026-22769. Affected organizations should consult Dell\u2019s advisory to identify impacted versions and apply the recommended patches or upgrades. Remediation is expected to remove or disable the hardcoded credential and enforce secure, administrator-controlled authentication mechanisms.<\/p>\n\n\n\n<p>Because hardcoded credentials represent a design-level weakness, patching is the primary remediation strategy. Network-layer controls such as IP restrictions or VPN gating may reduce exposure but do not eliminate the underlying authentication flaw. Organizations should prioritize upgrading all affected instances and validating that no legacy or unmanaged appliances remain in operation.<\/p>\n\n\n\n<p>After applying updates, security teams should verify that authentication mechanisms require unique credentials and confirm that no externally accessible services remain unnecessarily exposed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Organizations should immediately inventory all RecoverPoint for VMs deployments, identify any externally reachable management interfaces, restrict access to trusted administrative networks, rotate all related service and administrative credentials, and review authentication logs for anomalous access patterns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an <a href=\"https:\/\/www.cycognito.com\/emerging-threats\/\">Emerging Threat <\/a>Advisory for CVE-2026-24858 inside the CyCognito platform on February 2, 2026, and is actively researching enhanced detection capabilities for this vulnerability.<br>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us<\/a> to request a demo.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2026-22769 is a hardcoded credential vulnerability in Dell RecoverPoint for VMs that can expose disaster recovery management interfaces to unauthorized access. Organizations with internet-reachable instances face elevated risk of administrative compromise and downstream infrastructure impact.<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2236","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769) | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769) | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"CVE-2026-22769 is a hardcoded credential vulnerability in Dell RecoverPoint for VMs that can expose disaster recovery management interfaces to unauthorized access. Organizations with internet-reachable instances face elevated risk of administrative compromise and downstream infrastructure impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-24T16:06:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T12:04:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1851\" \/>\n\t<meta property=\"og:image:height\" content=\"882\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amit Sheps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amit Sheps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\"},\"author\":{\"name\":\"Amit Sheps\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984\"},\"headline\":\"Emerging Threat &#8211; Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)\",\"datePublished\":\"2026-02-24T16:06:44+00:00\",\"dateModified\":\"2026-02-26T12:04:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\"},\"wordCount\":831,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1280x610.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\",\"name\":\"Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769) | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1280x610.png\",\"datePublished\":\"2026-02-24T16:06:44+00:00\",\"dateModified\":\"2026-02-26T12:04:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png\",\"width\":1851,\"height\":882},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat &#8211; Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984\",\"name\":\"Amit Sheps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g\",\"caption\":\"Amit Sheps\"},\"description\":\"Head of Product Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/amit-sheps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769) | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769) | CyCognito Blog","og_description":"CVE-2026-22769 is a hardcoded credential vulnerability in Dell RecoverPoint for VMs that can expose disaster recovery management interfaces to unauthorized access. Organizations with internet-reachable instances face elevated risk of administrative compromise and downstream infrastructure impact.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/","og_site_name":"CyCognito Blog","article_published_time":"2026-02-24T16:06:44+00:00","article_modified_time":"2026-02-26T12:04:28+00:00","og_image":[{"width":1851,"height":882,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png","type":"image\/png"}],"author":"Amit Sheps","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amit Sheps","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/"},"author":{"name":"Amit Sheps","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984"},"headline":"Emerging Threat &#8211; Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)","datePublished":"2026-02-24T16:06:44+00:00","dateModified":"2026-02-26T12:04:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/"},"wordCount":831,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1280x610.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/","name":"Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769) | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14-1280x610.png","datePublished":"2026-02-24T16:06:44+00:00","dateModified":"2026-02-26T12:04:28+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Group-14.png","width":1851,"height":882},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-dell-recoverpoint-for-vms-hardcoded-credential-cve-2026-22769\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat &#8211; Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/dd23ed2aeda18e58b50fa60aaa236984","name":"Amit Sheps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5530b7f4998b0869e4e0a62197ceb50f?s=96&d=mm&r=g","caption":"Amit Sheps"},"description":"Head of Product Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/amit-sheps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2236"}],"version-history":[{"count":2,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2236\/revisions"}],"predecessor-version":[{"id":2241,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2236\/revisions\/2241"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}