{"id":7746,"date":"2014-12-20T04:00:13","date_gmt":"2014-12-20T12:00:13","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7746"},"modified":"2015-12-08T16:43:58","modified_gmt":"2015-12-09T00:43:58","slug":"palo-alto-networks-news-week-december-20","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/12\/palo-alto-networks-news-week-december-20\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 December 20"},"content":{"rendered":"<p>Here is all of the top <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\">Palo Alto Networks news<\/a> for this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/1swVNju\" rel=\"nofollow,noopener\"  target=\"_blank\">Unit 42 reveals CoolReaper<\/a>: A backdoor in Coolpad Android devices, potentially affecting over 10 million users. Download the report <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/cool-reaper.html\" target=\"_blank\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/cool-reaper.html\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:51.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7747 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/1418778893522-500x258.jpg\" alt=\"1418778893522\" width=\"500\" height=\"258\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/1418778893522-500x258.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/1418778893522-230x118.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/1418778893522-510x263.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/1418778893522-77x40.jpg 77w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/1418778893522.jpg 600w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>A sample of CoolReaper coverage from around the globe:<!--more--><\/p>\n<ul>\n<li><a href=\"http:\/\/www.wsj.com\/articles\/security-firm-faults-coolpad-software-1418834038\" rel=\"nofollow,noopener\"  target=\"_blank\">Wall Street Journal<\/a><\/li>\n<li><a href=\"http:\/\/www.cbronline.com\/news\/security\/coolreaper-backdoor-uncovered-in-coolpad-android-devices-4471988\" rel=\"nofollow,noopener\"  target=\"_blank\">CBR<\/a><\/li>\n<li><a href=\"http:\/\/www.computerworld.com\/article\/2860742\/chinese-android-phone-maker-hides-secret-backdoor-on-its-devices.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Computerworld<\/a><\/li>\n<li><a href=\"http:\/\/www.csoonline.com\/article\/2861116\/malware-cybercrime\/major-chinese-smartphone-manufacturer-installed-backdoor-on-up-to-10-million-devices.html\" rel=\"nofollow,noopener\"  target=\"_blank\">CSO<\/a><\/li>\n<li><a href=\"http:\/\/www.cso.com.au\/article\/562758\/backdoor-may-10m-coolpad-android-smartphoneshttp:\/www.cso.com.au\/article\/562758\/backdoor-may-10m-coolpad-android-smartphones\" rel=\"nofollow,noopener\"  target=\"_blank\">CSO Australia<\/a><\/li>\n<li><a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/millions-of-android-phones-in-china-have-backdoor\/d\/d-id\/1318245\" rel=\"nofollow,noopener\"  target=\"_blank\">Dark Reading<\/a><\/li>\n<li><a href=\"http:\/\/derstandard.at\/2000009533574\/Coolpad-Millionen-an-Android-Geraeten-mit-Backdoor-ausgeliefert\" rel=\"nofollow,noopener\"  target=\"_blank\">Der Standard<\/a><\/li>\n<li><a href=\"http:\/\/www.digi.no\/932088\/bakdor-i-millioner-av-smartmobiler\" rel=\"nofollow,noopener\"  target=\"_blank\">Digi.no<\/a><\/li>\n<li><a href=\"http:\/\/www.theepochtimes.com\/n3\/1151397-security-company-coolpad-smartphones-have-hidden-backdoor\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Epoch Times<\/a><\/li>\n<li><a href=\"http:\/\/www.eweek.com\/mobile\/chinese-android-smartphones-from-coolpad-get-security-warning.html\" rel=\"nofollow,noopener\"  target=\"_blank\">eWeek<\/a><\/li>\n<li><a href=\"http:\/\/www.globalsecuritymag.fr\/Palo-Alto-Networks-devoile-une,20141217,49546.html\" rel=\"nofollow,noopener\"  target=\"_blank\">GlobalSecurityMag<\/a><\/li>\n<li><a href=\"http:\/\/www.itmedia.co.jp\/enterprise\/articles\/1412\/18\/news045.html\" rel=\"nofollow,noopener\"  target=\"_blank\">ITmedia Enterprise<\/a><\/li>\n<li><a href=\"http:\/\/www.lemagit.fr\/actualites\/2240236886\/Palo-Alto-Networks-alerte-sur-une-porte-derobee-pour-Android\" rel=\"nofollow,noopener\"  target=\"_blank\">LeMag IT<\/a><\/li>\n<li><a href=\"http:\/\/www.nzz.ch\/mehr\/digital\/malware-ab-fabrik-coolpad-coolreaper-1.18447282\" rel=\"nofollow,noopener\"  target=\"_blank\">Neue Z\u00fcrcher Zeitung<\/a><\/li>\n<li><a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2473867,00.asp\" rel=\"nofollow,noopener\"  target=\"_blank\">PC Mag<\/a><\/li>\n<li><a href=\"http:\/\/www.scmagazine.com\/true-backdoor-leaves-coolpad-users-exposed\/article\/389150\/\" rel=\"nofollow,noopener\"  target=\"_blank\">SC Magazine<\/a><\/li>\n<li><a href=\"http:\/\/www.securityweek.com\/backdoor-found-android-phones-manufactured-coolpad-research\" rel=\"nofollow,noopener\"  target=\"_blank\">SecurityWeek<\/a><\/li>\n<li><a href=\"http:\/\/www.theregister.co.uk\/2014\/12\/18\/coolreaper_android_backdoor\/\" rel=\"nofollow,noopener\"  target=\"_blank\">The Register<\/a><\/li>\n<li><a href=\"https:\/\/threatpost.com\/ryan-olson-on-the-coolreaper-backdoor\/109953\" rel=\"nofollow,noopener\"  target=\"_blank\">ThreatPost<\/a><\/li>\n<li><a href=\"http:\/\/www.volkskrant.nl\/tech\/stiekeme-ingang-op-chinese-smartphones-van-coolpad~a3813310\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Volkskrant.nl<\/a><\/li>\n<\/ul>\n<p>Alon Livne <a href=\"http:\/\/bit.ly\/1uwU0eP\" rel=\"nofollow,noopener\"  target=\"_blank\">discussed<\/a> techniques used in exploiting a vulnerability in Google Chrome &amp; the difficulties presented by its security mechanisms.<\/p>\n<p>Yiftach Keshet <a href=\"http:\/\/bit.ly\/1r0hpZS\" rel=\"nofollow,noopener\"  target=\"_blank\">explored<\/a> two cyber espionage campaigns, 'Cloud Atlas' and 'Inception,' to highlight the benefits of Advanced Endpoint Protection and help you realize the advantages of proactive prevention.<\/p>\n<p>Want to have all of the latest insights, research and threat intelligence from Unit 42 delivered right to your inbox? <a href=\"http:\/\/bit.ly\/11k5XMP\" rel=\"nofollow,noopener\"  target=\"_blank\">Sign up today<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7442 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg\" alt=\"2015 Predictions Image-01\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-510x300.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>As 2014 comes to a close, Palo Alto Networks subject matter experts weigh in on what they see as major topics and trends for 2015:<\/p>\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1vtWmjQ\" rel=\"nofollow,noopener\"  target=\"_blank\">Kate Taylor on Threat Prevention<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1Av6kmU\" rel=\"nofollow,noopener\"  target=\"_blank\">Brian Tokuyoshi on Mobile Security<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1y5QAUb\" rel=\"nofollow,noopener\"  target=\"_blank\">Del Rodillas on Securing Industrial Control Systems<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/11VyR6a\" rel=\"nofollow,noopener\"  target=\"_blank\">Isabelle Dumont on Security in the Healthcare<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-financial-services-and-payment-processing\/\" target=\"_blank\">Financial Services industries<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-datacenter\/\" target=\"_blank\">Matt Keil on Datacenter Security<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/1CK5xk9\" rel=\"nofollow,noopener\"  target=\"_blank\">Scott Simkin on Tailored Threat Intelligence<\/a><\/li>\n<li><a href=\"http:\/\/bit.ly\/12NYxBV\" rel=\"nofollow,noopener\"  target=\"_blank\">Sebastian Goodwin on Endpoint Security <\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-web-security-cloud-applications\/\" target=\"_blank\">Joerg Sieber on Web Security and Cloud Applications<\/a><\/li>\n<\/ul>\n<p>Have you seen the <a href=\"http:\/\/bit.ly\/ZVnwBR\" rel=\"nofollow,noopener\"  target=\"_blank\">best love story<\/a> of 2014?<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:57.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7521 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN-1.png\" alt=\"PAN 1\" width=\"500\" height=\"287\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN-1.png 449w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN-1-230x132.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN-1-69x40.png 69w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/bit.ly\/14dGir5\" rel=\"nofollow,noopener\"  target=\"_blank\">Register now<\/a> for Ignite 2015 to get your toughest security problems solved!<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7340 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo.jpg\" alt=\"PAN_IC15_web_logo\" width=\"500\" height=\"138\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-230x63.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-145x40.jpg 145w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>The deadline for <a href=\"http:\/\/bit.ly\/1wtzm4b\" rel=\"nofollow,noopener\"  target=\"_blank\">the Call for Papers<\/a> was extended to <strong>January 18<\/strong>, so if you have a good war story about an enterprise security deployment, there\u2019s still a chance to submit for a chance at a speaking slot.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:30.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7424 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-500x151.jpg\" alt=\"ignite cfp\" width=\"500\" height=\"151\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-500x151.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-230x69.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-510x154.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200-132x40.jpg 132w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/email_CFP-banner_PAN_IC15_660x200.jpg 660w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Because the Traps Advanced Endpoint Protection product approach may sound similar to that used by Microsoft\u2019s Enhanced Mitigation Experience Toolkit, many customers ask how we differ. Sebastian Goodwin <a href=\"http:\/\/bit.ly\/1BhCb85\" rel=\"nofollow,noopener\"  target=\"_blank\">discussed<\/a> how exploits that bypass EMET still get blocked by Traps, and how Traps stops malware that does not use an exploit.<\/p>\n<p>The Palo Alto Networks Technical Publications team <a href=\"http:\/\/bit.ly\/1vSkEhG\" rel=\"nofollow,noopener\"  target=\"_blank\">shared 3 use cases for Panorama<\/a>, honing in on configuring firewalls, monitoring applications, and responding to incidents.<\/p>\n<p>Tim Treat <a href=\"http:\/\/bit.ly\/16ovXcY\" rel=\"nofollow,noopener\"  target=\"_blank\">reflected on a rule<\/a> that is essential for operating, maintaining and defending an enterprise: knowing your network.<\/p>\n<p>Palo Alto Networks was named <a href=\"http:\/\/bit.ly\/1IU7drW\" rel=\"nofollow,noopener\"  target=\"_blank\">Best Network Security Vendor by Reseller Middle East<\/a> during the 2014 edition of its Hot 50 awards. Following another great year of growth in this important region, we are honored by this recognition!<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"100\"><span class=\"ar-custom\" style=\"padding-bottom:100%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7693 size-thumbnail lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-100x100.png\" alt=\"HOT50 winner\" width=\"100\" height=\"100\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-100x100.png 100w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-230x231.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-298x300.png 298w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-39x40.png 39w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-32x32.png 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-64x64.png 64w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-96x96.png 96w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1-128x128.png 128w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/12\/HOT50-winner1.png 352w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Here are <a href=\"http:\/\/events.paloaltonetworks.com\/\" target=\"_blank\">upcoming events<\/a> around the world that you should know about:<\/p>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc2Mg==\" target=\"_blank\">12\u670824\u65e5(\u6c34)\u88fd\u54c1\u5c0e\u5165\u30fb\u904b\u7528\u652f\u63f4\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: December 24, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU1OA==\" target=\"_blank\">12\u670826\u65e5(\u91d1)\u88fd\u54c1\u5b9f\u611f\uff84\uff9a\uff70\uff86\uff9d\uff78\uff9e<\/a>[Japanese]<\/p>\n<ul>\n<li>When: December 26, 2014 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc2NQ==\" target=\"_blank\">End of Year Texans Event<\/a><\/p>\n<ul>\n<li>When: December 28, 2014 10:00 AM - 5:00 PM CST<\/li>\n<li>Where: Houston, TX<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc1Mg==\" target=\"_blank\">Palo Alto Networks: Live Demo<\/a><\/p>\n<ul>\n<li>When: January 7, 2015 9:00 AM - 10:00 AM PST<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjU3MA==\" target=\"_blank\">1\u67089\u65e5(\u91d1)\u88fd\u54c1\u4f53\u611f\uff7e\uff90\uff85\uff70<\/a>\u00a0[Japanese]<\/p>\n<ul>\n<li>When: January 9, 2015 1:30 PM - 5:00 PM GMT+9:00<\/li>\n<li>Where: \u5343\u4ee3\u7530\u533a<\/li>\n<\/ul>\n<p><a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMjc1Mw==\" target=\"_blank\">Die Zwei um Zw\u00f6lf: Zentrales Management (Panorama)<\/a>\u00a0[German]<\/p>\n<ul>\n<li>When: January 9, 2015 12:00 PM - 1:00 PM CET<\/li>\n<li>Where: Online<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here is all of the top Palo Alto Networks news for this past week. &nbsp; &nbsp; Unit 42 reveals CoolReaper: A backdoor in Coolpad Android devices, potentially affecting over 10 million users. &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,203],"tags":[603,918,978,613,976,990,778],"coauthors":[709],"class_list":["post-7746","post","type-post","status-publish","format-standard","hentry","category-events","category-news-of-the-week","tag-advanced-endpoint-protection","tag-call-for-papers","tag-coolreaper","tag-panorama","tag-reseller-middle-east","tag-technical-publications","tag-traps"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7746"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7746\/revisions"}],"predecessor-version":[{"id":11300,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7746\/revisions\/11300"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7746"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}