{"id":705,"date":"2025-11-16T09:46:00","date_gmt":"2025-11-16T09:46:00","guid":{"rendered":"https:\/\/vv918.thegioicongnghe.org\/?p=705"},"modified":"2025-11-16T09:46:00","modified_gmt":"2025-11-16T09:46:00","slug":"top-cybersecurity-threats-facing-small-businesses-in-2025-and-how-to-defend-against-them","status":"publish","type":"post","link":"https:\/\/vv918.thegioicongnghe.org\/?p=705","title":{"rendered":"Top Cybersecurity Threats Facing Small Businesses in 2025 \u2014 And How to Defend Against Them"},"content":{"rendered":"<p data-start=\"206\" data-end=\"548\">Cybersecurity threats in 2025 have evolved dramatically. What used to be simple viruses or basic phishing attempts has transformed into highly coordinated ransomware operations, automated AI-driven attacks, and credential theft targeting businesses of all sizes. Unfortunately, small businesses remain the easiest and most profitable targets.<\/p>\n<p data-start=\"550\" data-end=\"710\">Below is a comprehensive breakdown of the most dangerous cyber threats small businesses face in 2025 \u2014 and practical steps you can take to protect your company.<\/p>\n<hr data-start=\"712\" data-end=\"715\" \/>\n<h1 data-start=\"717\" data-end=\"753\"><strong data-start=\"719\" data-end=\"753\">1. AI-Powered Phishing Attacks<\/strong><\/h1>\n<p data-start=\"755\" data-end=\"847\">Phishing has become significantly more advanced with the help of AI. Attackers now generate:<\/p>\n<ul data-start=\"849\" data-end=\"1031\">\n<li data-start=\"849\" data-end=\"877\">\n<p data-start=\"851\" data-end=\"877\">Perfectly written emails<\/p>\n<\/li>\n<li data-start=\"878\" data-end=\"927\">\n<p data-start=\"880\" data-end=\"927\">Personalized messages mimicking real contacts<\/p>\n<\/li>\n<li data-start=\"928\" data-end=\"971\">\n<p data-start=\"930\" data-end=\"971\">Real-time responses powered by chatbots<\/p>\n<\/li>\n<li data-start=\"972\" data-end=\"1031\">\n<p data-start=\"974\" data-end=\"1031\">Deepfake voice calls pretending to be CEOs or suppliers<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1033\" data-end=\"1078\">These attacks are harder than ever to detect.<\/p>\n<h3 data-start=\"1080\" data-end=\"1112\"><strong data-start=\"1084\" data-end=\"1112\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"1113\" data-end=\"1365\">\n<li data-start=\"1113\" data-end=\"1190\">\n<p data-start=\"1115\" data-end=\"1190\">Implement advanced email filtering (Microsoft Defender, Proofpoint, etc.)<\/p>\n<\/li>\n<li data-start=\"1191\" data-end=\"1256\">\n<p data-start=\"1193\" data-end=\"1256\">Train employees to verify identity through secondary channels<\/p>\n<\/li>\n<li data-start=\"1257\" data-end=\"1313\">\n<p data-start=\"1259\" data-end=\"1313\">Enforce multi-factor authentication (MFA) everywhere<\/p>\n<\/li>\n<li data-start=\"1314\" data-end=\"1365\">\n<p data-start=\"1316\" data-end=\"1365\">Disable direct password resets from email links<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1367\" data-end=\"1370\" \/>\n<h1 data-start=\"1372\" data-end=\"1411\"><strong data-start=\"1374\" data-end=\"1411\">2. Ransomware-as-a-Service (RaaS)<\/strong><\/h1>\n<p data-start=\"1413\" data-end=\"1563\">Ransomware groups now operate like real businesses. They sell their malware to smaller criminals and split the profits. This makes ransomware attacks:<\/p>\n<ul data-start=\"1565\" data-end=\"1619\">\n<li data-start=\"1565\" data-end=\"1582\">\n<p data-start=\"1567\" data-end=\"1582\">More frequent<\/p>\n<\/li>\n<li data-start=\"1583\" data-end=\"1601\">\n<p data-start=\"1585\" data-end=\"1601\">More automated<\/p>\n<\/li>\n<li data-start=\"1602\" data-end=\"1619\">\n<p data-start=\"1604\" data-end=\"1619\">More targeted<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1621\" data-end=\"1712\">Many attackers specifically go after small businesses with weak defenses but valuable data.<\/p>\n<h3 data-start=\"1714\" data-end=\"1746\"><strong data-start=\"1718\" data-end=\"1746\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"1747\" data-end=\"1931\">\n<li data-start=\"1747\" data-end=\"1777\">\n<p data-start=\"1749\" data-end=\"1777\">Keep daily offline backups<\/p>\n<\/li>\n<li data-start=\"1778\" data-end=\"1812\">\n<p data-start=\"1780\" data-end=\"1812\">Patch all systems and software<\/p>\n<\/li>\n<li data-start=\"1813\" data-end=\"1842\">\n<p data-start=\"1815\" data-end=\"1842\">Restrict admin privileges<\/p>\n<\/li>\n<li data-start=\"1843\" data-end=\"1898\">\n<p data-start=\"1845\" data-end=\"1898\">Use Endpoint Detection and Response (EDR) solutions<\/p>\n<\/li>\n<li data-start=\"1899\" data-end=\"1931\">\n<p data-start=\"1901\" data-end=\"1931\">Implement network segmentation<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1933\" data-end=\"1936\" \/>\n<h1 data-start=\"1938\" data-end=\"1970\"><strong data-start=\"1940\" data-end=\"1970\">3. Cloud Misconfigurations<\/strong><\/h1>\n<p data-start=\"1972\" data-end=\"2118\">With many small businesses moving to cloud services like AWS, Azure, and Google Cloud, misconfigured security settings have become a massive risk.<\/p>\n<p data-start=\"2120\" data-end=\"2144\">Common mistakes include:<\/p>\n<ul data-start=\"2146\" data-end=\"2262\">\n<li data-start=\"2146\" data-end=\"2176\">\n<p data-start=\"2148\" data-end=\"2176\">Publicly exposed databases<\/p>\n<\/li>\n<li data-start=\"2177\" data-end=\"2196\">\n<p data-start=\"2179\" data-end=\"2196\">Open S3 buckets<\/p>\n<\/li>\n<li data-start=\"2197\" data-end=\"2226\">\n<p data-start=\"2199\" data-end=\"2226\">Incorrect IAM permissions<\/p>\n<\/li>\n<li data-start=\"2227\" data-end=\"2262\">\n<p data-start=\"2229\" data-end=\"2262\">Disabled logging and monitoring<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2264\" data-end=\"2323\">Attackers scan the internet 24\/7 for these vulnerabilities.<\/p>\n<h3 data-start=\"2325\" data-end=\"2357\"><strong data-start=\"2329\" data-end=\"2357\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"2358\" data-end=\"2555\">\n<li data-start=\"2358\" data-end=\"2412\">\n<p data-start=\"2360\" data-end=\"2412\">Use cloud security posture management (CSPM) tools<\/p>\n<\/li>\n<li data-start=\"2413\" data-end=\"2450\">\n<p data-start=\"2415\" data-end=\"2450\">Enable MFA for all cloud accounts<\/p>\n<\/li>\n<li data-start=\"2451\" data-end=\"2511\">\n<p data-start=\"2453\" data-end=\"2511\">Limit permissions using the principle of least privilege<\/p>\n<\/li>\n<li data-start=\"2512\" data-end=\"2555\">\n<p data-start=\"2514\" data-end=\"2555\">Turn on continuous logging and auditing<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2557\" data-end=\"2560\" \/>\n<h1 data-start=\"2562\" data-end=\"2608\"><strong data-start=\"2564\" data-end=\"2608\">4. Credential Theft and Password Attacks<\/strong><\/h1>\n<p data-start=\"2610\" data-end=\"2775\">Attackers now use enormous databases of stolen passwords and automated bots to break into business accounts. Once inside, they deploy malware or steal customer data.<\/p>\n<h3 data-start=\"2777\" data-end=\"2809\"><strong data-start=\"2781\" data-end=\"2809\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"2810\" data-end=\"2955\">\n<li data-start=\"2810\" data-end=\"2839\">\n<p data-start=\"2812\" data-end=\"2839\">Enforce MFA for all users<\/p>\n<\/li>\n<li data-start=\"2840\" data-end=\"2866\">\n<p data-start=\"2842\" data-end=\"2866\">Use a password manager<\/p>\n<\/li>\n<li data-start=\"2867\" data-end=\"2894\">\n<p data-start=\"2869\" data-end=\"2894\">Prohibit password reuse<\/p>\n<\/li>\n<li data-start=\"2895\" data-end=\"2955\">\n<p data-start=\"2897\" data-end=\"2955\">Set automatic alerts for login attempts from new locations<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2957\" data-end=\"2960\" \/>\n<h1 data-start=\"2962\" data-end=\"2991\"><strong data-start=\"2964\" data-end=\"2991\">5. Supply Chain Attacks<\/strong><\/h1>\n<p data-start=\"2993\" data-end=\"3183\">Small businesses often rely on third-party vendors, software providers, and managed service providers (MSPs). When these partners are breached, attackers gain access to your systems as well.<\/p>\n<p data-start=\"3185\" data-end=\"3260\">Notable examples from recent years have proven how devastating this can be.<\/p>\n<h3 data-start=\"3262\" data-end=\"3294\"><strong data-start=\"3266\" data-end=\"3294\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"3295\" data-end=\"3473\">\n<li data-start=\"3295\" data-end=\"3346\">\n<p data-start=\"3297\" data-end=\"3346\">Vet vendors and require cybersecurity standards<\/p>\n<\/li>\n<li data-start=\"3347\" data-end=\"3381\">\n<p data-start=\"3349\" data-end=\"3381\">Use zero trust access policies<\/p>\n<\/li>\n<li data-start=\"3382\" data-end=\"3436\">\n<p data-start=\"3384\" data-end=\"3436\">Limit integrated systems to only what is necessary<\/p>\n<\/li>\n<li data-start=\"3437\" data-end=\"3473\">\n<p data-start=\"3439\" data-end=\"3473\">Monitor all third-party activity<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3475\" data-end=\"3478\" \/>\n<h1 data-start=\"3480\" data-end=\"3520\"><strong data-start=\"3482\" data-end=\"3520\">6. Business Email Compromise (BEC)<\/strong><\/h1>\n<p data-start=\"3522\" data-end=\"3709\">BEC attacks involve hackers gaining access to email accounts and manipulating financial transactions. These attacks are precise, personalized, and extremely profitable for cybercriminals.<\/p>\n<p data-start=\"3711\" data-end=\"3801\">A single successful BEC attack can cost a small business hundreds of thousands of dollars.<\/p>\n<h3 data-start=\"3803\" data-end=\"3835\"><strong data-start=\"3807\" data-end=\"3835\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"3836\" data-end=\"4008\">\n<li data-start=\"3836\" data-end=\"3869\">\n<p data-start=\"3838\" data-end=\"3869\">Enable MFA for email accounts<\/p>\n<\/li>\n<li data-start=\"3870\" data-end=\"3920\">\n<p data-start=\"3872\" data-end=\"3920\">Require verbal confirmation for large payments<\/p>\n<\/li>\n<li data-start=\"3921\" data-end=\"3952\">\n<p data-start=\"3923\" data-end=\"3952\">Set email forwarding alerts<\/p>\n<\/li>\n<li data-start=\"3953\" data-end=\"4008\">\n<p data-start=\"3955\" data-end=\"4008\">Use email authentication protocols (DMARC, DKIM, SPF)<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4010\" data-end=\"4013\" \/>\n<h1 data-start=\"4015\" data-end=\"4039\"><strong data-start=\"4017\" data-end=\"4039\">7. Insider Threats<\/strong><\/h1>\n<p data-start=\"4041\" data-end=\"4143\">Not all attacks come from outside. Employees \u2014 intentionally or accidentally \u2014 represent a major risk.<\/p>\n<p data-start=\"4145\" data-end=\"4161\">Threats include:<\/p>\n<ul data-start=\"4163\" data-end=\"4281\">\n<li data-start=\"4163\" data-end=\"4189\">\n<p data-start=\"4165\" data-end=\"4189\">Misconfiguring systems<\/p>\n<\/li>\n<li data-start=\"4190\" data-end=\"4213\">\n<p data-start=\"4192\" data-end=\"4213\">Downloading malware<\/p>\n<\/li>\n<li data-start=\"4214\" data-end=\"4248\">\n<p data-start=\"4216\" data-end=\"4248\">Stealing data before resigning<\/p>\n<\/li>\n<li data-start=\"4249\" data-end=\"4281\">\n<p data-start=\"4251\" data-end=\"4281\">Falling for phishing attacks<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4283\" data-end=\"4315\"><strong data-start=\"4287\" data-end=\"4315\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"4316\" data-end=\"4480\">\n<li data-start=\"4316\" data-end=\"4351\">\n<p data-start=\"4318\" data-end=\"4351\">Limit access based on job roles<\/p>\n<\/li>\n<li data-start=\"4352\" data-end=\"4392\">\n<p data-start=\"4354\" data-end=\"4392\">Monitor file transfers and downloads<\/p>\n<\/li>\n<li data-start=\"4393\" data-end=\"4446\">\n<p data-start=\"4395\" data-end=\"4446\">Disable accounts immediately when employees leave<\/p>\n<\/li>\n<li data-start=\"4447\" data-end=\"4480\">\n<p data-start=\"4449\" data-end=\"4480\">Offer regular security training<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4482\" data-end=\"4485\" \/>\n<h1 data-start=\"4487\" data-end=\"4532\"><strong data-start=\"4489\" data-end=\"4532\">8. IoT and Smart Device Vulnerabilities<\/strong><\/h1>\n<p data-start=\"4534\" data-end=\"4560\">Many small businesses use:<\/p>\n<ul data-start=\"4562\" data-end=\"4623\">\n<li data-start=\"4562\" data-end=\"4579\">\n<p data-start=\"4564\" data-end=\"4579\">Smart cameras<\/p>\n<\/li>\n<li data-start=\"4580\" data-end=\"4591\">\n<p data-start=\"4582\" data-end=\"4591\">Routers<\/p>\n<\/li>\n<li data-start=\"4592\" data-end=\"4607\">\n<p data-start=\"4594\" data-end=\"4607\">POS systems<\/p>\n<\/li>\n<li data-start=\"4608\" data-end=\"4623\">\n<p data-start=\"4610\" data-end=\"4623\">IoT sensors<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4625\" data-end=\"4693\">These devices often lack proper security and rarely receive updates.<\/p>\n<h3 data-start=\"4695\" data-end=\"4727\"><strong data-start=\"4699\" data-end=\"4727\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"4728\" data-end=\"4871\">\n<li data-start=\"4728\" data-end=\"4756\">\n<p data-start=\"4730\" data-end=\"4756\">Change default passwords<\/p>\n<\/li>\n<li data-start=\"4757\" data-end=\"4786\">\n<p data-start=\"4759\" data-end=\"4786\">Update firmware regularly<\/p>\n<\/li>\n<li data-start=\"4787\" data-end=\"4830\">\n<p data-start=\"4789\" data-end=\"4830\">Place IoT devices on a separate network<\/p>\n<\/li>\n<li data-start=\"4831\" data-end=\"4871\">\n<p data-start=\"4833\" data-end=\"4871\">Disable unnecessary features and ports<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4873\" data-end=\"4876\" \/>\n<h1 data-start=\"4878\" data-end=\"4924\"><strong data-start=\"4880\" data-end=\"4924\">9. Data Exfiltration and Silent Breaches<\/strong><\/h1>\n<p data-start=\"4926\" data-end=\"5034\">Modern attackers often infiltrate quietly and remain undetected for weeks or months. During this time, they:<\/p>\n<ul data-start=\"5036\" data-end=\"5144\">\n<li data-start=\"5036\" data-end=\"5059\">\n<p data-start=\"5038\" data-end=\"5059\">Steal customer data<\/p>\n<\/li>\n<li data-start=\"5060\" data-end=\"5088\">\n<p data-start=\"5062\" data-end=\"5088\">Copy financial documents<\/p>\n<\/li>\n<li data-start=\"5089\" data-end=\"5115\">\n<p data-start=\"5091\" data-end=\"5115\">Monitor email accounts<\/p>\n<\/li>\n<li data-start=\"5116\" data-end=\"5144\">\n<p data-start=\"5118\" data-end=\"5144\">Gather login credentials<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5146\" data-end=\"5248\">This is one of the most dangerous threats because it leaves no obvious signs until the damage is done.<\/p>\n<h3 data-start=\"5250\" data-end=\"5282\"><strong data-start=\"5254\" data-end=\"5282\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"5283\" data-end=\"5463\">\n<li data-start=\"5283\" data-end=\"5330\">\n<p data-start=\"5285\" data-end=\"5330\">Use MDR or SOC services for 24\/7 monitoring<\/p>\n<\/li>\n<li data-start=\"5331\" data-end=\"5384\">\n<p data-start=\"5333\" data-end=\"5384\">Implement EDR for behavior-based threat detection<\/p>\n<\/li>\n<li data-start=\"5385\" data-end=\"5425\">\n<p data-start=\"5387\" data-end=\"5425\">Track data access logs and anomalies<\/p>\n<\/li>\n<li data-start=\"5426\" data-end=\"5463\">\n<p data-start=\"5428\" data-end=\"5463\">Limit access to sensitive documents<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"5465\" data-end=\"5468\" \/>\n<h1 data-start=\"5470\" data-end=\"5500\"><strong data-start=\"5472\" data-end=\"5500\">10. AI-Generated Malware<\/strong><\/h1>\n<p data-start=\"5502\" data-end=\"5561\">In 2025, cybercriminals are using AI to build malware that:<\/p>\n<ul data-start=\"5563\" data-end=\"5705\">\n<li data-start=\"5563\" data-end=\"5588\">\n<p data-start=\"5565\" data-end=\"5588\">Mutates automatically<\/p>\n<\/li>\n<li data-start=\"5589\" data-end=\"5619\">\n<p data-start=\"5591\" data-end=\"5619\">Avoids antivirus detection<\/p>\n<\/li>\n<li data-start=\"5620\" data-end=\"5656\">\n<p data-start=\"5622\" data-end=\"5656\">Adapts to different environments<\/p>\n<\/li>\n<li data-start=\"5657\" data-end=\"5705\">\n<p data-start=\"5659\" data-end=\"5705\">Alters its behavior to mimic normal activity<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5707\" data-end=\"5782\">Traditional security tools cannot reliably stop these new forms of attacks.<\/p>\n<h3 data-start=\"5784\" data-end=\"5816\"><strong data-start=\"5788\" data-end=\"5816\">How to Defend Against It<\/strong><\/h3>\n<ul data-start=\"5817\" data-end=\"5975\">\n<li data-start=\"5817\" data-end=\"5854\">\n<p data-start=\"5819\" data-end=\"5854\">Deploy advanced EDR\/XDR solutions<\/p>\n<\/li>\n<li data-start=\"5855\" data-end=\"5889\">\n<p data-start=\"5857\" data-end=\"5889\">Use zero trust security models<\/p>\n<\/li>\n<li data-start=\"5890\" data-end=\"5941\">\n<p data-start=\"5892\" data-end=\"5941\">Set up continuous monitoring and threat hunting<\/p>\n<\/li>\n<li data-start=\"5942\" data-end=\"5975\">\n<p data-start=\"5944\" data-end=\"5975\">Patch vulnerabilities quickly<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"5977\" data-end=\"5980\" \/>\n<h1 data-start=\"5982\" data-end=\"6002\"><strong data-start=\"5984\" data-end=\"6002\">Final Thoughts<\/strong><\/h1>\n<p data-start=\"6004\" data-end=\"6205\">Cybersecurity threats in 2025 are sharper, smarter, and more persistent than ever before. Small businesses can no longer rely on basic antivirus or outdated firewalls. Protecting your company requires:<\/p>\n<ul data-start=\"6207\" data-end=\"6332\">\n<li data-start=\"6207\" data-end=\"6231\">\n<p data-start=\"6209\" data-end=\"6231\">Proactive monitoring<\/p>\n<\/li>\n<li data-start=\"6232\" data-end=\"6257\">\n<p data-start=\"6234\" data-end=\"6257\">Strong authentication<\/p>\n<\/li>\n<li data-start=\"6258\" data-end=\"6278\">\n<p data-start=\"6260\" data-end=\"6278\">Regular training<\/p>\n<\/li>\n<li data-start=\"6279\" data-end=\"6298\">\n<p data-start=\"6281\" data-end=\"6298\">Updated systems<\/p>\n<\/li>\n<li data-start=\"6299\" data-end=\"6332\">\n<p data-start=\"6301\" data-end=\"6332\">Modern threat detection tools<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6334\" data-end=\"6483\">By understanding the threats above and implementing practical defenses, your business can stay secure in an increasingly dangerous digital landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity threats in 2025 have evolved dramatically. What used to be simple viruses or basic phishing attempts has transformed into highly coordinated ransomware operations, automated AI-driven attacks, and credential theft targeting businesses of all sizes. Unfortunately, small businesses remain the&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-705","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts\/705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=705"}],"version-history":[{"count":1,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts\/705\/revisions"}],"predecessor-version":[{"id":706,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=\/wp\/v2\/posts\/705\/revisions\/706"}],"wp:attachment":[{"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vv918.thegioicongnghe.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}