{"id":2378,"date":"2026-03-31T05:56:08","date_gmt":"2026-03-31T12:56:08","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2378"},"modified":"2026-04-05T06:54:43","modified_gmt":"2026-04-05T13:54:43","slug":"emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/","title":{"rendered":"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT)"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"675\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1280x675.png\" alt=\"\" class=\"wp-image-2382\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1280x675.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-512x270.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-768x405.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1536x810.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png 1790w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">Sample of assets impacted by Axios npm supply chain vulnerability, identified by the CyCognito Platform<br><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is the Axios npm supply chain attack?<\/h2>\n\n\n\n<p>On March 31, 2026, two malicious versions of Axios were published to npm, <code>axios@1.14.1<\/code> and <code>axios@0.30.4<\/code>, using credentials stolen from a lead Axios maintainer. The attacker injected a hidden dependency into both releases that drops a remote access trojan (RAT) on any machine that ran <code>npm install<\/code> during the exposure window. No CVE identifier has been assigned at the time of writing.<\/p>\n\n\n\n<p>The malicious dependency executes automatically at install time via a <code>postinstall<\/code> hook, without any action by the developer. It deploys platform-specific payloads on macOS, Windows, and Linux, establishes a connection to an attacker-controlled server, and then removes its own traces \u2014 leaving no obvious evidence in the installed package directory.<\/p>\n\n\n\n<p>A successful compromise gives the attacker persistent remote access to the affected machine. On developer workstations, this means direct exposure of source code, cloud credentials, SSH keys, API tokens, and any secrets stored in environment files or accessible through the developer&#8217;s configured tools.<\/p>\n\n\n\n<p>In CI\/CD environments, the same access extends to pipeline secrets, deployment credentials, and production infrastructure. Because the RAT executes at install time rather than at application runtime, even a machine that never deploys the built code is fully exposed the moment <code>npm install<\/code> completes.<\/p>\n\n\n\n<p>Both versions were live for approximately two to three hours before npm removed them and placed the malicious dependency under a security hold.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by the Axios npm supply chain attack?<\/h2>\n\n\n\n<p>Any environment that installed <code>axios@1.14.1<\/code> or <code>axios@0.30.4<\/code> is affected. This includes developer workstations, CI\/CD pipelines, containerised build systems, and server-side Node.js applications built during the exposure window on March 31, 2026.<\/p>\n\n\n\n<p>Axios is the most widely used HTTP client in the JavaScript ecosystem, with over 300 million weekly downloads. It is a standard dependency in React and Vue front-end projects, server-side APIs, microservices, and developer tooling across virtually every industry. The attack targeted both the current 1.x and legacy 0.x release branches simultaneously, maximizing the range of affected projects.<\/p>\n\n\n\n<p>Importantly, the RAT executes at install time \u2014 not when the application runs. Systems that built or updated dependencies during the window are at risk regardless of whether they are internet-facing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1184\" height=\"732\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT_exposure_by_industry.png\" alt=\"\" class=\"wp-image-2379\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT_exposure_by_industry.png 1184w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT_exposure_by_industry-512x317.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT_exposure_by_industry-768x475.png 768w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\" \/><\/figure>\n\n\n\n<p>Exposure in this dataset is led by Consumer Discretionary at 22.4% of observed assets, with Industrials contributing 15.6%.<\/p>\n\n\n\n<p>Consumer Discretionary organizations tend to run large, distributed engineering teams building customer-facing web applications \u2014 environments where Axios is almost universally present and where dependency update cycles are frequent. The combination of high update velocity and broad developer base increases the probability that the affected versions were pulled before the compromise was identified.<\/p>\n\n\n\n<p>The 50.5% share across sectors not individually prominent in this dataset reflects the reality that Axios is not sector-specific. Any organization running active Node.js development during the exposure window carries meaningful risk, regardless of where it falls on the industry map.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>The malicious versions have been removed from the npm registry and are no longer installable. A clean <code>npm install axios<\/code> will now resolve to <code>axios@1.14.0<\/code> (for 1.x users) or <code>axios@0.30.3<\/code> (for 0.x users).<\/p>\n\n\n\n<p>Registry removal does not remediate systems that already installed the affected versions. The RAT dropper executed at install time and cleaned up after itself and the package directory will appear clean even on a compromised system. Defenders should audit <code>package-lock.json<\/code> files and CI\/CD run logs directly for references to either affected version, rather than relying on the current state of <code>node_modules<\/code> to determine exposure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Audit all lock files and pipeline logs for <code>axios@1.14.1<\/code>, <code>axios@0.30.4<\/code>, or <code>plain-crypto-js<\/code> in any version. Any system where these were installed should be rebuilt from a known-good state, not cleaned in place, with all credentials accessible at install time rotated immediately, including cloud access keys, CI\/CD secrets, npm tokens, and SSH keys. <\/p>\n\n\n\n<p>As a standing build hygiene measure, run <code>npm ci --ignore-scripts<\/code> in CI\/CD environments to prevent <code>postinstall<\/code> hooks from executing during automated builds.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for the Axios npm supply chain attack in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two malicious axios releases published to npm delivered a RAT dropper that executes silently at install time. Source code, cloud credentials, SSH keys, and pipeline secrets on affected systems should be considered exposed.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2378","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT) | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT) | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Two malicious axios releases published to npm delivered a RAT dropper that executes silently at install time. Source code, cloud credentials, SSH keys, and pipeline secrets on affected systems should be considered exposed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T12:56:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-05T13:54:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1790\" \/>\n\t<meta property=\"og:image:height\" content=\"944\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT)\",\"datePublished\":\"2026-03-31T12:56:08+00:00\",\"dateModified\":\"2026-04-05T13:54:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\"},\"wordCount\":720,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1280x675.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\",\"name\":\"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT) | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1280x675.png\",\"datePublished\":\"2026-03-31T12:56:08+00:00\",\"dateModified\":\"2026-04-05T13:54:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png\",\"width\":1790,\"height\":944},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT) | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT) | CyCognito Blog","og_description":"Two malicious axios releases published to npm delivered a RAT dropper that executes silently at install time. Source code, cloud credentials, SSH keys, and pipeline secrets on affected systems should be considered exposed.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/","og_site_name":"CyCognito Blog","article_published_time":"2026-03-31T12:56:08+00:00","article_modified_time":"2026-04-05T13:54:43+00:00","og_image":[{"width":1790,"height":944,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT)","datePublished":"2026-03-31T12:56:08+00:00","dateModified":"2026-04-05T13:54:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/"},"wordCount":720,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1280x675.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/","name":"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT) | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln-1280x675.png","datePublished":"2026-03-31T12:56:08+00:00","dateModified":"2026-04-05T13:54:43+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Axios-npm-RAT-vuln.png","width":1790,"height":944},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-axios-npm-supply-chain-attack-drops-remote-access-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: Axios npm Supply Chain Attack Drops Remote Access Trojan (RAT)"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2378"}],"version-history":[{"count":8,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2378\/revisions"}],"predecessor-version":[{"id":2390,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2378\/revisions\/2390"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}