{"id":2520,"date":"2026-05-04T06:44:20","date_gmt":"2026-05-04T13:44:20","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2520"},"modified":"2026-05-04T12:03:14","modified_gmt":"2026-05-04T19:03:14","slug":"the-force-awakens-your-attack-surface","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/","title":{"rendered":"The Force Awakens Your Attack Surface"},"content":{"rendered":"\n<p>May the 4th be with you.<\/p>\n\n\n\n<p>In celebration of Star Wars Day, here&#8217;s what a galaxy far, far away can teach us about security. The films work surprisingly well as a case study, and not in the obvious way. It&#8217;s not the lasers, androids or the lightsabers. It&#8217;s that the Empire and the First Order both fall into the same trap most security programs walk into every day.&nbsp;<\/p>\n\n\n\n<p>In this post, we&#8217;ll walk through what the films get right about modern security challenges, how AI is making them worse, and what to do about it.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>How a Two-Meter Port Took Down a Moon&nbsp;<\/strong><\/h1>\n\n\n\n<p>In Star Wars: A New Hope, the Rebel Alliance obtains the Death Star blueprints and finds something the Empire never considered a threat: a two-meter thermal exhaust port that, if hit precisely, would destroy the entire station.&nbsp;<\/p>\n\n\n\n<p>It was a design feature, not a vulnerability. Nobody flagged it. Nobody investigated it. Besides, the station had shields, turbolasers, and thousands of troops. What could one small opening possibly do?<\/p>\n\n\n\n<p>Here&#8217;s the platform architect explaining it himself in this classic hot take:<\/p>\n\n\n\n<iframe style=\"aspect-ratio: 16 \/ 9; width: 100% !important;\" src=\"https:\/\/www.youtube.com\/embed\/agcRwGDKulw?si=SYkfiVPFLdgveqG7\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n\n\n\n<p> <\/p>\n\n\n\n<p>Sound logic, but we all know how that turned out&#8230; And the First Order didn&#8217;t learn from it either. They built Starkiller Base, a bigger and more powerful version, with the same fatal flaw. They didn&#8217;t fix the underlying problem. They just scaled it up, and got the <a href=\"https:\/\/www.youtube.com\/watch?v=yYeb6hJM6NI\">same result<\/a>.<\/p>\n\n\n\n<p>That pattern should resonate with anyone working in security today.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>The Death Star Problem Is Still a Problem<\/strong><\/h1>\n\n\n\n<p>The original Death Star analogy maps cleanly to how organizations have historically managed security. They build and maintain a list of known assets, protect those assets, and assume anything not on the list isn\u2019t worth worrying about.<\/p>\n\n\n\n<p>And that&#8217;s the job now, to look at your own surface from the outside in, the way an attacker would.&nbsp;<\/p>\n\n\n\n<p>The problem is the view is never complete. Over time, organizations accumulate forgotten subdomains, old APIs that never got decommissioned, cloud instances that someone spun up and lost track of, and infrastructure inherited from acquisitions that nobody fully audited.<\/p>\n\n\n\n<p>What this goes back to is the<a href=\"https:\/\/www.rand.org\/pubs\/research_reports\/RR1024.html\"> defender&#8217;s dilemma<\/a>, a structural asymmetry RAND researchers formalized all the way back in 2015.&nbsp;<\/p>\n\n\n\n<p>It outlines a simple truth. The game is not balanced. Defenders have to be right every time, but attackers only have to get it right once.&nbsp;<\/p>\n\n\n\n<p>The Rebels didn&#8217;t need to out-engineer the Empire. They needed just one flaw the Empire hadn&#8217;t catalogued. A single exposure they missed, to take the whole enterprise down.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>AI Is Building New Exhaust Ports<\/strong><\/h1>\n\n\n\n<p>If the original Death Star showcases the offender-defender asymmetry, Starkiller Base shows what it looks like in the age of AI.&nbsp;<\/p>\n\n\n\n<p>Same underlying issue, but on a completely new scale.&nbsp;<\/p>\n\n\n\n<p>Developers are shipping code with AI coding assistants. Employees are connecting third-party AI tools to company data without going through IT. Teams are spinning up AI-powered chatbots, automation workflows, and data pipelines that quietly touch sensitive systems in the process.<\/p>\n\n\n\n<p>Each one creates potential exposure. Most of them aren&#8217;t on your asset list.<\/p>\n\n\n\n<p>The new &#8220;exhaust ports&#8221; this creates:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AI coding assistants with weak auth<\/li>\n\n\n\n<li>Shadow AI connected to core systems without security guardrails<\/li>\n\n\n\n<li>Over-permissioned API keys for LLMs<\/li>\n\n\n\n<li>AI automation with execution paths nobody fully understands<\/li>\n\n\n\n<li>Third-party AI vendors with access to your data<\/li>\n<\/ul>\n\n\n\n<p>And so on, and so forth.<\/p>\n\n\n\n<p>What makes this worse is that threat actors are using AI too. They&#8217;re using it to speed up reconnaissance and to identify zero-day issues at scale.&nbsp;<\/p>\n\n\n\n<p>Anthropic&#8217;s <a href=\"https:\/\/www.cycognito.com\/blog\/mythos-moak-ctem-and-the-end-of-cve-chasing\/\">Mythos<\/a> preview found thousands of unknown zero-days across every major operating system and web browser in a matter of weeks. Recon that used to take seasoned experts days now takes hours, performed at the skill level of the best attackers in the world.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Knowing About the Flaw Isn&#8217;t Enough&nbsp;<\/strong><\/h1>\n\n\n\n<p>Someone adds an AI tool on a Tuesday, by Thursday it&#8217;s touching production data through an integration nobody reviewed. It may never make it into the official asset inventory at all. Firewalls, endpoint protection, vulnerability scanners, and laser turrets are no help here. They all need a target, and this one was never on the list.&nbsp;<\/p>\n\n\n\n<p>This is where continuous threat exposure management (<a href=\"https:\/\/www.cycognito.com\/learn\/exposure-management\/ctem\/\">CTEM<\/a>) comes in. The premise is simple: your attack surface never stops changing, so your visibility into it shouldn&#8217;t either. Discovery, prioritization, validation, and mobilization, on repeat, not on a quarterly schedule.<\/p>\n\n\n\n<p>And as important as discovery is, validation is where most organizations have the biggest gap. The Empire knew the exhaust port existed. They just assumed nothing could exploit it. That assumption is what made Death Start go BOOOM.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"670\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png\" alt=\"\" class=\"wp-image-2521\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170-768x402.png 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>That&#8217;s the story. The Empire built infrastructure with a flaw they didn&#8217;t test. The First Order built bigger infrastructure with the same untested flaw.&nbsp;<\/p>\n\n\n\n<p>Most attack surfaces have a few of those. AI is adding more of them every week, and giving attackers the speed to find them faster than ever. The question you should ask yourself is: when was the last time anyone actually tested yours?&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Star Wars as a security case study: the Empire&#8217;s real failure wasn&#8217;t missing the exhaust port, it was never testing whether it mattered. <\/p>\n","protected":false},"author":44,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2520","post","type-post","status-publish","format-standard","hentry","category-perspectives"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Force Awakens Your Attack Surface | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Force Awakens Your Attack Surface | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Star Wars as a security case study: the Empire&#039;s real failure wasn&#039;t missing the exhaust port, it was never testing whether it mattered.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T13:44:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T19:03:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Larry Ho\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Larry Ho\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\"},\"author\":{\"name\":\"Larry Ho\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/03f4c73915a5a7ccd4d4050cf65df13a\"},\"headline\":\"The Force Awakens Your Attack Surface\",\"datePublished\":\"2026-05-04T13:44:20+00:00\",\"dateModified\":\"2026-05-04T19:03:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\"},\"wordCount\":874,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png\",\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\",\"name\":\"The Force Awakens Your Attack Surface | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png\",\"datePublished\":\"2026-05-04T13:44:20+00:00\",\"dateModified\":\"2026-05-04T19:03:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png\",\"width\":1280,\"height\":670},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Force Awakens Your Attack Surface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/03f4c73915a5a7ccd4d4050cf65df13a\",\"name\":\"Larry Ho\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b4446ebfc7a2cf6902f54acbd922b36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b4446ebfc7a2cf6902f54acbd922b36?s=96&d=mm&r=g\",\"caption\":\"Larry Ho\"},\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/larry-ho\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Force Awakens Your Attack Surface | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/","og_locale":"en_US","og_type":"article","og_title":"The Force Awakens Your Attack Surface | CyCognito Blog","og_description":"Star Wars as a security case study: the Empire's real failure wasn't missing the exhaust port, it was never testing whether it mattered.","og_url":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/","og_site_name":"CyCognito Blog","article_published_time":"2026-05-04T13:44:20+00:00","article_modified_time":"2026-05-04T19:03:14+00:00","og_image":[{"width":1280,"height":670,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png","type":"image\/png"}],"author":"Larry Ho","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Larry Ho","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/"},"author":{"name":"Larry Ho","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/03f4c73915a5a7ccd4d4050cf65df13a"},"headline":"The Force Awakens Your Attack Surface","datePublished":"2026-05-04T13:44:20+00:00","dateModified":"2026-05-04T19:03:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/"},"wordCount":874,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png","articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/","url":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/","name":"The Force Awakens Your Attack Surface | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png","datePublished":"2026-05-04T13:44:20+00:00","dateModified":"2026-05-04T19:03:14+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-170.png","width":1280,"height":670},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/the-force-awakens-your-attack-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Force Awakens Your Attack Surface"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/03f4c73915a5a7ccd4d4050cf65df13a","name":"Larry Ho","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b4446ebfc7a2cf6902f54acbd922b36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b4446ebfc7a2cf6902f54acbd922b36?s=96&d=mm&r=g","caption":"Larry Ho"},"url":"https:\/\/www.cycognito.com\/blog\/author\/larry-ho\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2520"}],"version-history":[{"count":6,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2520\/revisions"}],"predecessor-version":[{"id":2528,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2520\/revisions\/2528"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}