{"id":2506,"date":"2026-04-29T08:26:03","date_gmt":"2026-04-29T15:26:03","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2506"},"modified":"2026-04-29T08:26:05","modified_gmt":"2026-04-29T15:26:05","slug":"emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/","title":{"rendered":"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"699\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1280x699.png\" alt=\"\" class=\"wp-image-2509\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1280x699.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-512x280.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-768x419.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1536x839.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-2048x1118.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em>Sample of assets impacted by GitHub Enterprise Server RCE vulnerability, identified by the CyCognito Platform<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-3854?<\/h2>\n\n\n\n<p>CVE-2026-3854 is a command injection vulnerability in GitHub Enterprise Server. It lives in the git push pipeline.<\/p>\n\n\n\n<p>User-supplied push option values were not properly sanitized before being embedded in an internal service header. The header format used a delimiter that could also appear in user input. A crafted push option containing that delimiter let an attacker inject additional metadata fields. Downstream services treated those fields as trusted internal values.<\/p>\n\n\n\n<p>The vulnerability carries a CVSS v3.1 base score of 8.7 (High). Exploitation requires authentication and push access to any repository on the instance. That repository can be one the attacker creates themselves. No user interaction beyond a single <code>git push<\/code> is required. The result is arbitrary command execution on the GHES instance handling the push.<\/p>\n\n\n\n<p>The same flaw affected GitHub.com and GitHub&#8217;s hosted enterprise products. GitHub mitigated those within hours and reported no evidence of exploitation prior to disclosure. Self-hosted GHES is different. Defenders are responsible for applying the patch themselves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-3854?<\/h2>\n\n\n\n<p>All supported GHES release lines prior to the patched versions are affected. That includes GHES 3.14, 3.15, 3.16, 3.17, 3.18, and 3.19. The hosted variants of GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, and GitHub Enterprise Cloud with Enterprise Managed Users were also affected. Those have already been remediated by GitHub.<\/p>\n\n\n\n<p>In practice, an affected asset is a self-hosted GHES appliance reachable on the network. These instances tend to be the central source code platform for an organization. They typically host CI\/CD integrations, deploy keys, internal repositories, and the credentials that power downstream build pipelines.<\/p>\n\n\n\n<p>Many GHES deployments are exposed beyond the corporate perimeter. Reasons include partner access, contractor onboarding, and remote developer access. Others sit behind a VPN. Even then, they are reachable from a large authenticated user population. Any of those users could trigger the issue.<\/p>\n\n\n\n<p>The asset is also a high-trust system. Code execution on a GHES instance opens a path to source code, build artifacts, signing keys, deployment tokens, and the secrets stored across the platform. The blast radius extends well beyond the appliance itself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"759\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-168-1280x759.png\" alt=\"\" class=\"wp-image-2507\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-168-1280x759.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-168-512x304.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-168-768x456.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-168.png 1485w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Exposure in this set is led by Industrials at 29.8% of observed assets. Health Care follows at 19.1%. Together they account for nearly half of the affected GHES surface in the sample.<\/p>\n\n\n\n<p>Industrials concentrating at the top is consistent with how this sector deploys developer infrastructure. Industrial conglomerates run distributed engineering teams across plants, regional offices, and acquired business units. Self-hosted source control is often the lowest-friction option when IP concerns rule out cloud-hosted alternatives. The result is a long tail of GHES instances managed by separate teams, on different upgrade cadences, with limited central visibility. A vendor patch does not propagate evenly across that footprint.<\/p>\n\n\n\n<p>Health Care follows a related pattern. Hospital systems, payers, and life sciences organizations often run GHES to keep regulated code and PHI away from shared cloud environments. Those instances tend to be long-lived and conservatively maintained. They are also tied to validated systems that resist rapid upgrades.<\/p>\n\n\n\n<p>The cross-sector pattern tells a familiar story. Self-hosted developer infrastructure gets deployed. It accumulates trust. Then it ages quietly outside the central asset inventory until something like CVE-2026-3854 forces it back into view.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Yes. GitHub has published patched releases across all supported GHES branches. The fixed versions are 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6, and 3.19.3. Subsequent point releases (3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.8, 3.19.4) and the new 3.20.0 line also contain the fix. Customers should upgrade to the latest available release on their branch.<\/p>\n\n\n\n<p>GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, and GitHub Enterprise Cloud with Enterprise Managed Users were patched directly by GitHub. No customer action is required for those products. GitHub.com was mitigated within roughly two hours of the original report.<\/p>\n\n\n\n<p>For self-hosted GHES, defenders should treat the upgrade as time-sensitive. The exploit only needs push access to a repository, including one the attacker creates. The entry barrier is low for any authenticated user on the instance. Verify the running version directly on the appliance, apply the patch, and confirm the upgrade completed. Inventory snapshots may be out of date.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Audit which user accounts have push access to GHES instances. Remove unused or unnecessary collaborator and contractor accounts. Review recent push activity and any unusual hook behavior during the exposure window. The exploit path forces a server code path that is not used during normal operations.<\/p>\n\n\n\n<p>Restrict network reachability to GHES where possible, particularly for instances that do not need to be exposed to partners or the public internet. After patching, rotate any credentials, deploy keys, or tokens that could have been exposed if the instance was reachable from an untrusted user population.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-3854 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A command injection vulnerability in GitHub Enterprise Server&#8217;s git push pipeline allows any authenticated user with repository push access to execute arbitrary commands on the underlying instance using a single crafted git push.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2506","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"A command injection vulnerability in GitHub Enterprise Server&#039;s git push pipeline allows any authenticated user with repository push access to execute arbitrary commands on the underlying instance using a single crafted git push.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-29T15:26:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T15:26:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2524\" \/>\n\t<meta property=\"og:image:height\" content=\"1378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection\",\"datePublished\":\"2026-04-29T15:26:03+00:00\",\"dateModified\":\"2026-04-29T15:26:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\"},\"wordCount\":862,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1280x699.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\",\"name\":\"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1280x699.png\",\"datePublished\":\"2026-04-29T15:26:03+00:00\",\"dateModified\":\"2026-04-29T15:26:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1.png\",\"width\":2524,\"height\":1378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection | CyCognito Blog","og_description":"A command injection vulnerability in GitHub Enterprise Server's git push pipeline allows any authenticated user with repository push access to execute arbitrary commands on the underlying instance using a single crafted git push.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/","og_site_name":"CyCognito Blog","article_published_time":"2026-04-29T15:26:03+00:00","article_modified_time":"2026-04-29T15:26:05+00:00","og_image":[{"width":2524,"height":1378,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection","datePublished":"2026-04-29T15:26:03+00:00","dateModified":"2026-04-29T15:26:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/"},"wordCount":862,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1280x699.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/","name":"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1-1280x699.png","datePublished":"2026-04-29T15:26:03+00:00","dateModified":"2026-04-29T15:26:05+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CVE-2026-3854-1.png","width":2524,"height":1378},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-3854-github-enterprise-server-rce-via-git-push-injection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-3854) GitHub Enterprise Server RCE via Git Push Injection"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2506"}],"version-history":[{"count":1,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2506\/revisions"}],"predecessor-version":[{"id":2510,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2506\/revisions\/2510"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}