{"id":2332,"date":"2026-03-19T06:21:42","date_gmt":"2026-03-19T13:21:42","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2332"},"modified":"2026-04-05T06:55:03","modified_gmt":"2026-04-05T13:55:03","slug":"emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/","title":{"rendered":"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"738\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1280x738.png\" alt=\"\" class=\"wp-image-2334\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1280x738.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-512x295.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-768x443.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1536x886.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png 1736w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">Sample of assets impacted by CVE-2026-32746, identified by the CyCognito Platform<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-32746?<\/h2>\n\n\n\n<p>CVE-2026-32746 is a critical out-of-bounds write in GNU Inetutils <code>telnetd<\/code> caused by insufficient bounds checking in the LINEMODE SLC (Set Local Characters) suboption handler. Public advisories attribute the issue to the <code>add_slc<\/code> logic not verifying whether the destination buffer is already full before writing additional data. <\/p>\n\n\n\n<p>The published CVSS v3.1 score is 9.8, with network attack vector, no required privileges, and no user interaction. Public reporting describes the vulnerable path as reachable during Telnet option negotiation, before authentication completes, which makes this a pre-authentication remote code execution (RCE) risk for exposed <code>telnetd<\/code> services.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-32746?<\/h2>\n\n\n\n<p>The affected software is GNU Inetutils <code>telnetd<\/code>, with public advisories listing vulnerable versions through 2.7. This does not mean every service speaking Telnet is affected; the exposure is specific to deployments that actually use the GNU Inetutils server implementation. <\/p>\n\n\n\n<p>In practice, the most relevant assets are internet-facing Linux or Unix-like systems where <code>inetutils<\/code> is installed, <code>telnetd<\/code> is enabled, and TCP\/23 is reachable from untrusted networks. That can include legacy administration hosts, lab environments, embedded or industrial systems built on general-purpose Linux distributions, and forgotten transitional infrastructure where Telnet remained enabled long after SSH became standard. <\/p>\n\n\n\n<p>Ubuntu is still evaluating package impact across supported releases, while Debian\u2019s tracker shows vulnerable package branches across multiple releases and a downstream fix in unstable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"723\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-135-1280x723.png\" alt=\"\" class=\"wp-image-2336\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-135-1280x723.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-135-512x289.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-135-768x434.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-135-1536x868.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-135.png 1568w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Exposure is concentrated in a few industries, with Consumer Discretionary accounting for 50.7% of observed assets and Industrials contributing 16.3%.  Smaller portions appear across Information Technology (7.1%), Consumer Staples (6.3%), Energy (3.3%), and a broader long tail of other sectors (16.3%). <\/p>\n\n\n\n<p>The concentration in Consumer Discretionary and Industrials is consistent with environments that operate large, distributed networks with mixed ownership and embedded systems. These conditions increase the likelihood that <code>telnetd<\/code> remains enabled on edge systems, partner-connected assets, or infrastructure that is no longer actively managed.<\/p>\n\n\n\n<p>Across all sectors, the primary risk driver is lack of visibility into internet-facing assets. Exposed <code>telnetd<\/code> services are often unintentional, introduced through misconfigurations or incomplete decommissioning. Uncertainty around whether a service is running GNU Inetutils further complicates prioritization, allowing vulnerable instances to remain externally reachable longer than expected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>A public fix path exists, but patch status is uneven across sources. Debian\u2019s security tracker records the issue as fixed in its unstable <code>inetutils<\/code> source package at version <code>2:2.7-4<\/code> and links to the upstream corrective commit. Ubuntu, by contrast, still lists supported releases as \u201cNeeds evaluation\u201d as of its March 18, 2026 update. <\/p>\n\n\n\n<p>Public advisory databases such as GitHub\u2019s still show patched versions as unknown, and the researcher advisory stated that no released fix was available at the time of publication. Based on the currently available public sources, defenders should not assume that a vendor-packaged fix is broadly available across distributions yet; they should verify package status directly with their platform vendor or distribution tracker before treating systems as remediated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Disable <code>telnetd<\/code> wherever possible, block external access to TCP\/23 immediately, validate which exposed Telnet services actually run GNU Inetutils, and prioritize containment for any internet-reachable or weakly segmented instances until a confirmed fixed package is installed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an <a href=\"https:\/\/www.cycognito.com\/emerging-threats\/\">Emerging Threat Advisory<\/a> for CVE-2026-32746 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2026-32746 is an emerging critical buffer overflow in GNU Inetutils telnetd. It allows pre-authentication remote code execution during Telnet option negotiation.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2332","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746) | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746) | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"CVE-2026-32746 is an emerging critical buffer overflow in GNU Inetutils telnetd. It allows pre-authentication remote code execution during Telnet option negotiation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-19T13:21:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-05T13:55:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1736\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)\",\"datePublished\":\"2026-03-19T13:21:42+00:00\",\"dateModified\":\"2026-04-05T13:55:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\"},\"wordCount\":590,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1280x738.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\",\"name\":\"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746) | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1280x738.png\",\"datePublished\":\"2026-03-19T13:21:42+00:00\",\"dateModified\":\"2026-04-05T13:55:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png\",\"width\":1736,\"height\":1001},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746) | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746) | CyCognito Blog","og_description":"CVE-2026-32746 is an emerging critical buffer overflow in GNU Inetutils telnetd. It allows pre-authentication remote code execution during Telnet option negotiation.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/","og_site_name":"CyCognito Blog","article_published_time":"2026-03-19T13:21:42+00:00","article_modified_time":"2026-04-05T13:55:03+00:00","og_image":[{"width":1736,"height":1001,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)","datePublished":"2026-03-19T13:21:42+00:00","dateModified":"2026-04-05T13:55:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/"},"wordCount":590,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1280x738.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/","name":"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746) | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746-1280x738.png","datePublished":"2026-03-19T13:21:42+00:00","dateModified":"2026-04-05T13:55:03+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-32746.png","width":1736,"height":1001},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-gnu-inetutils-telnetd-linemode-slc-buffer-overflow-cve-2026-32746\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: GNU Inetutils telnetd LINEMODE SLC Buffer Overflow (CVE-2026-32746)"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2332"}],"version-history":[{"count":7,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2332\/revisions"}],"predecessor-version":[{"id":2343,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2332\/revisions\/2343"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}