{"id":2399,"date":"2026-04-05T07:46:03","date_gmt":"2026-04-05T14:46:03","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2399"},"modified":"2026-04-05T08:53:35","modified_gmt":"2026-04-05T15:53:35","slug":"emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/","title":{"rendered":"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"653\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1280x653.png\" alt=\"\" class=\"wp-image-2402\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1280x653.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-512x261.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-768x392.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1536x784.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-2048x1045.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em>Sample of assets impacted by Cisco IMC Auth. Bypass vulnerability, identified by the CyCognito Platform<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-20093?<\/h2>\n\n\n\n<p>CVE-2026-20093 is an authentication bypass vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC), caused by improper input validation (CWE-20) in how the <code>IMC<\/code> XML API processes password modification requests. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical).<\/p>\n\n\n\n<p>Exploitation is fully pre-authentication and requires no privileges and no user interaction. An attacker with network access to the <code>IMC<\/code> web interface or XML API port can send a single crafted HTTP POST request targeting the <code>configConfMo<\/code> method on the <code>aaaUser<\/code> object class, bypassing authorization checks before the session context is verified.<\/p>\n\n\n\n<p>A successful exploit allows the attacker to reset the password of any user on the device, including the administrative account, and then authenticate as that user. The practical result is full hardware-level control of the server, operating below the operating system and hypervisor layers where conventional security controls do not reach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-20093?<\/h2>\n\n\n\n<p>The vulnerability affects Cisco IMC firmware across a broad range of hardware regardless of device configuration. Confirmed affected product lines include UCS C-Series M5 and M6 Rack Servers in standalone mode, UCS E-Series M3 and M6 servers, 5000 Series Enterprise Network Compute Systems (ENCS), and Catalyst 8300 Series Edge uCPE platforms. UCS B-Series Blade Servers and UCS C-Series M7 and M8 Rack Servers in standalone mode are not affected.<\/p>\n\n\n\n<p>A wide range of Cisco appliances built on preconfigured UCS C-Series hardware are also exposed when their IMC web interface is reachable, including Application Policy Infrastructure Controller (APIC) Servers, Secure Firewall Management Center appliances, Malware Analytics appliances, and Cyber Vision Center appliances. The breadth of affected appliance types reflects how deeply embedded the IMC component is across Cisco&#8217;s hardware portfolio.<\/p>\n\n\n\n<p>IMC interfaces are designed to remain available even when the host operating system is offline, which is part of their operational value as out-of-band management tools. That same characteristic makes them persistent targets: if the management interface is reachable from an untrusted network segment, exploitation requires only network line-of-sight to the exposed port.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1184\" height=\"734\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-142.png\" alt=\"\" class=\"wp-image-2400\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-142.png 1184w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-142-512x317.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-142-768x476.png 768w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\" \/><\/figure>\n\n\n\n<p>Exposure in this set is led by Financials at 29.4% of observed assets, with Industrials contributing 19.9%.<\/p>\n\n\n\n<p>The concentration in Financials is consistent with the sector&#8217;s reliance on large, densely configured data centers and colocation environments where UCS C-Series hardware is commonly deployed at scale. Financial institutions often operate complex hybrid infrastructure across on-premises data centers, colocation facilities, and distributed branch environments, and management interfaces in these estates may not receive the same decommissioning scrutiny as application-layer services, leaving older IMC-facing endpoints reachable longer than intended.<\/p>\n\n\n\n<p>The cross-sector spread, with representation across Industrials, Health Care, and a substantial Others cohort, reflects how broadly Cisco UCS hardware is embedded across enterprise compute environments. Exposure here is not driven by a single sector&#8217;s architectural choices but by the ubiquity of the platform itself, and any organization that standardized on Cisco UCS infrastructure over the past decade is likely to have IMC interfaces in its estate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Patches are available. Cisco released firmware updates addressing CVE-2026-20093 on April 2, 2026, as part of a broader set of IMC security fixes. Specific fixed releases include 4.3(2.260007), 4.3(6.260017), and 6.0(1.250174) for UCS C-Series M5 and M6 Rack Servers in standalone mode; 4.15.5 for 5000 Series ENCS; 4.18.3 for Catalyst 8300 Series Edge uCPE; and 3.2.17 for UCS E-Series M3 servers.<\/p>\n\n\n\n<p>No configuration workaround exists that mitigates the vulnerability without disabling the management interface entirely. Cisco PSIRT has confirmed that no active exploitation or public proof-of-concept code is known at the time of the advisory.<\/p>\n\n\n\n<p>Defenders should consult the official Cisco Security Advisory (cisco-sa-cimc-auth-bypass-AgG2BxTn) to confirm the fixed release applicable to their specific hardware model, as fixed versions vary across the affected product lines. Appliances built on UCS hardware may require separate firmware guidance and should be verified directly with Cisco.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Network access to all Cisco IMC interfaces should be restricted to a dedicated, isolated management VLAN, with direct routing from untrusted networks blocked at the perimeter. Administrative access should be routed exclusively through hardened jump hosts with multi-factor authentication. Teams should audit IMC user accounts for unauthorized additions and monitor system logs for anomalous password change events outside scheduled maintenance windows.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-20093 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An authentication bypass in the Cisco Integrated Management Controller allows an unauthenticated remote attacker to reset any user&#8217;s password via a single crafted HTTP request, granting full administrative control over the server hardware below the operating system layer.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2399","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"An authentication bypass in the Cisco Integrated Management Controller allows an unauthenticated remote attacker to reset any user&#039;s password via a single crafted HTTP request, granting full administrative control over the server hardware below the operating system layer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-05T14:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-05T15:53:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2128\" \/>\n\t<meta property=\"og:image:height\" content=\"1086\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass\",\"datePublished\":\"2026-04-05T14:46:03+00:00\",\"dateModified\":\"2026-04-05T15:53:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1280x653.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\",\"name\":\"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1280x653.png\",\"datePublished\":\"2026-04-05T14:46:03+00:00\",\"dateModified\":\"2026-04-05T15:53:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1.png\",\"width\":2128,\"height\":1086},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass | CyCognito Blog","og_description":"An authentication bypass in the Cisco Integrated Management Controller allows an unauthenticated remote attacker to reset any user's password via a single crafted HTTP request, granting full administrative control over the server hardware below the operating system layer.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/","og_site_name":"CyCognito Blog","article_published_time":"2026-04-05T14:46:03+00:00","article_modified_time":"2026-04-05T15:53:35+00:00","og_image":[{"width":2128,"height":1086,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass","datePublished":"2026-04-05T14:46:03+00:00","dateModified":"2026-04-05T15:53:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/"},"wordCount":776,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1280x653.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/","name":"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1-1280x653.png","datePublished":"2026-04-05T14:46:03+00:00","dateModified":"2026-04-05T15:53:35+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-20093-1.png","width":2128,"height":1086},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20093-cisco-imc-authentication-bypass\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2399"}],"version-history":[{"count":2,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2399\/revisions"}],"predecessor-version":[{"id":2405,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2399\/revisions\/2405"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}