{"id":97274,"date":"2019-02-27T00:00:21","date_gmt":"2019-02-27T08:00:21","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=97274"},"modified":"2019-02-24T19:08:03","modified_gmt":"2019-02-25T03:08:03","slug":"preventing-malware-ransomware-cn","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/02\/preventing-malware-ransomware-cn\/?lang=zh-hans","title":{"rendered":"\u5229\u7528 Traps \u9632\u62a4\u6076\u610f\u8f6f\u4ef6\u548c\u52d2\u7d22\u8f6f\u4ef6"},"content":{"rendered":"<p>\u867d\u7136\u52d2\u7d22\u8f6f\u4ef6\u5df2\u4e0d\u518d\u65b0\u5947\uff0c\u4f46\u7531 WannaCry\u3001Petya\/NotPetya \u548c\u6700\u8fd1\u7684 TrickBot \u6240\u53d1\u8d77\u7684\u653b\u51fb\u5df2\u8868\u660e\u73b0\u6709\u7684\u9632\u62a4\u624b\u6bb5\u5df2\u65e0\u529b\u5e94\u5bf9\u9ad8\u7ea7\u7684\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\u3002\u653b\u51fb\u8005\u6539\u5584\u4e86\u653b\u51fb\u7684\u624b\u6bb5\u548c\u6076\u610f\u8f6f\u4ef6\u7684\u7528\u6cd5\uff0c\u4f7f\u653b\u51fb\u66f4\u4e3a\u590d\u6742\u3001\u66f4\u52a0\u81ea\u52a8\u5316\u3001\u66f4\u5177\u6709\u9488\u5bf9\u6027\uff0c\u5e76\u4e14\u66f4\u5bb9\u6613\u89c4\u907f\u3002<\/p>\n<p>\u867d\u7136\u8ddd\u79bb WannaCry \u7684\u9996\u6b21\u653b\u51fb\u5df2\u7ecf\u8fc7\u53bb\u4e24\u5e74\u4e4b\u4e45\uff0c\u4f46\u8fd9\u6b3e\u8f6f\u4ef6\u4ecd\u7136\u5341\u5206\u6d3b\u8dc3\uff0c\u5728\u65b0\u95fb\u4e2d\u8fd8\u80fd\u6301\u7eed\u770b\u5230\u4e0e\u8fd9\u6b3e\u5371\u9669\u7684\u6076\u610f\u8f6f\u4ef6\u76f8\u5173\u7684\u6f0f\u6d1e\u3002<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/05\/unit42-threat-brief-wanacrypt0r-know\/\">WannaCry<\/a> \u6301\u7eed\u6709\u6548\u7684\u539f\u56e0\u662f\u8fd9\u6b3e\u8f6f\u4ef6\u540c\u65f6\u5229\u7528\u6076\u610f\u8f6f\u4ef6\u548c\u6f0f\u6d1e\u5229\u7528\u6765\u5b9e\u73b0\u653b\u51fb\u76ee\u7684\u3002\u9996\u5148\uff0c\u5b83\u5229\u7528 Microsoft SMB \u534f\u8bae\u4e2d\u7684\u6f0f\u6d1e\u6765\u83b7\u53d6\u5185\u6838\u7ea7\u522b\u7684\u6743\u9650\u3002\u7136\u540e\u5229\u7528<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2017\/10\/threat-brief-understanding-kernel-apc-attacks\/\">\u5185\u6838 APC<\/a>\uff08\u5f02\u6b65\u8fc7\u7a0b\u8c03\u7528\uff09\u653b\u51fb\u624b\u6bb5\uff0c\u4f7f\u5f97\u8fd9\u79cd\u653b\u51fb\u5177\u6709\u9690\u853d\u6027\u3002\u9488\u5bf9\u5185\u6838\u8fdb\u884c\u7684\u653b\u51fb\u5df2\u7ecf\u4f17\u6240\u5468\u77e5\uff0c\u5e76\u4e14\u80fd\u591f\u8fdb\u884c\u9632\u62a4\u3002\u4f46\u662f\u5185\u6838 APC \u653b\u51fb\u662f\u622a\u7136\u4e0d\u540c\u7684\u653b\u51fb\u624b\u6bb5\u3002\u8fd9\u79cd\u624b\u6bb5\u65e0\u9700\u653b\u51fb\u5185\u6838\u6765\u83b7\u53d6\u6743\u9650\u3002\u5185\u6838 APC \u653b\u51fb<u>\u5df2\u7ecf\u5177\u6709<\/u>\u4e86\u5185\u6838\u6743\u9650\uff0c\u5e76\u5229\u7528\u8fd9\u4e9b\u6743\u9650\u5b9e\u73b0\u76ee\u7684\uff0c\u5373\u8ba9\u5408\u6cd5\u7684\u7a0b\u5e8f\u6267\u884c\u6076\u610f\u4ee3\u7801\uff0c\u800c\u4e0d\u662f\u6267\u884c\u7a0b\u5e8f\u81ea\u8eab\u7684\u5408\u6cd5\u4ee3\u7801\u3002<\/p>\n<p>\u4ece\u6700\u7ec8\u7528\u6237\u7684\u89d2\u5ea6\u6765\u770b\uff0c\u4ed6\u4eec\u53ea\u80fd\u770b\u5230\u52d2\u7d22\u8f6f\u4ef6\u753b\u9762\uff0c\u800c\u65e0\u6cd5\u770b\u5230\u8fd9\u4e9b\u8f6f\u4ef6\u5728\u7aef\u70b9\u4e2d\u8fdb\u884c\u7684\u5176\u4ed6\u6d3b\u52a8\u3002\u4e0e\u6b64\u540c\u65f6\uff0c\u6076\u610f\u8f6f\u4ef6\u7ee7\u7eed\u4ee5\u4e1c\u897f\u5411\u4f20\u64ad\uff0c\u5c3d\u5176\u6240\u80fd\u5730\u611f\u67d3\u5185\u90e8\u548c\u5916\u90e8\u5b58\u5728\u6f0f\u6d1e\u7684\u8ba1\u7b97\u673a\u3002<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-95680 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-500x281.png\" alt=\"\" width=\"500\" height=\"281\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-500x281.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-768x432.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-510x287.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-71x40.png 71w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2-534x300.png 534w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps2.png 1912w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\">WannaCry \u653b\u51fb\u5e8f\u5217\u7b80\u56fe<\/p>\n<p>&nbsp;<\/p>\n<p>\u63a5\u4e0b\u6765\u8c08\u8c08 Palo Alto Networks Traps\u3002Traps Advanced Endpoint Protection \u5305\u542b\u4e86\u591a\u79cd\u9632\u62a4\u5df2\u77e5\u548c\u672a\u77e5\u6076\u610f\u8f6f\u4ef6\u3001\u52d2\u7d22\u8f6f\u4ef6\u53ca\u6f0f\u6d1e\u5229\u7528\u7684\u624b\u6bb5\uff0c\u80fd\u591f\u5728\u7aef\u70b9\u906d\u53d7\u4fb5\u5bb3\u4e4b\u524d\u963b\u6b62\u6076\u610f\u7a0b\u5e8f\u7684\u6267\u884c\u3002\u901a\u8fc7\u5411\u653b\u51fb\u751f\u547d\u5468\u671f\u7684\u5173\u952e\u9636\u6bb5\u65bd\u52a0\u9632\u62a4\uff0c\u4e0d\u8bba\u7aef\u70b9\u4f7f\u7528\u4f55\u79cd\u64cd\u4f5c\u7cfb\u7edf\u3001\u662f\u8054\u673a\u8fd8\u662f\u8131\u673a\u3001\u662f\u5426\u8fde\u63a5\u5230\u516c\u53f8\u7f51\u7edc\uff0cTraps \u90fd\u53ef\u4ee5\u9632\u6b62\u52d2\u7d22\u8f6f\u4ef6\u7684\u653b\u51fb\u3002<\/p>\n<p>\u5728 WannaCry \u7206\u53d1\u4e4b\u524d\uff0c\u53d7\u5230 Traps \u4fdd\u62a4\u7684\u7aef\u70b9\u80fd\u591f\u68c0\u6d4b\u5230\u653b\u51fb\u751f\u547d\u5468\u671f\u4e2d\u7684\u76f8\u5173\u9636\u6bb5\u5e76\u8fdb\u884c\u963b\u6b62\u3002\u9996\u5148\uff0c\u5f53\u5185\u6838\u6743\u9650\u5c1d\u8bd5\u63d0\u5347\u5230\u7528\u6237\u7ea7\u522b\u65f6\uff0cTraps \u80fd\u591f\u68c0\u6d4b\u5230\u6f0f\u6d1e\u5229\u7528\u6280\u672f\u3002\u5f53 Traps \u68c0\u6d4b\u5230\u76f8\u5173\u64cd\u4f5c\u540e\uff0c\u4f1a\u963b\u6b62\u653b\u51fb\u3002\u5982\u679c\u65e0\u6548\uff0c\u6076\u610f\u8fdb\u7a0b\u9632\u62a4\u6a21\u5757\u4f1a\u68c0\u6d4b\u5e76\u963b\u6b62\u751f\u6210\u5b50\u8fdb\u7a0b\u7684\u7236\u8fdb\u7a0b\u3002\u5982\u679c\u4e4b\u524d\u7684\u6a21\u5757\u90fd\u6ca1\u6709\u68c0\u6d4b\u5230\u8be5\u5a01\u80c1\uff0c\u4ee3\u7406\u4f1a\u901a\u8fc7\u672c\u5730\u5206\u6790\u3001\u52d2\u7d22\u8f6f\u4ef6\u9632\u62a4\u6a21\u5757\u6216\u8be6\u7ec6\u7684 WildFire \u5206\u6790\u5c06\u653b\u51fb\u8bc6\u522b\u4e3a\u5df2\u77e5\u5a01\u80c1\u5e76\u52a0\u4ee5\u963b\u6b62\u3002<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:56.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-95667 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-500x281.png\" alt=\"\" width=\"500\" height=\"281\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-500x281.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-230x129.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-768x431.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-510x286.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-71x40.png 71w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1-535x300.png 535w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/12\/Traps1.png 1910w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>\u5728 WannaCry \u653b\u51fb\u671f\u95f4\u548c\u4e4b\u540e\uff0c\u5e76\u6ca1\u6709 Palo Alto Networks \u5ba2\u6237\u53d7\u5230 WannaCry \u611f\u67d3\u7684\u62a5\u544a\uff0c\u56e0\u4e3a\u5728 2017 \u5e74 5 \u6708 12 \u65e5\uff0c\u82f1\u56fd\u56fd\u5bb6\u536b\u751f\u7f72\u906d\u5230\u653b\u51fb\u7684\u4e00\u4e2a\u6708\u524d\uff0c\u76f8\u5173\u5a01\u80c1\u5df2\u7ecf\u63d0\u4ea4\u5230\u4e86 WildFire \u6076\u610f\u8f6f\u4ef6\u9632\u62a4\u670d\u52a1\u3002\u5f53\u6211\u4eec\u67e5\u770b AutoFocus \u65f6\uff0c\u6211\u4eec\u53d1\u73b0 WannaCry \u9996\u6b21\u53d1\u73b0\u7684\u65e5\u671f\u662f 2017 \u5e74 4 \u6708 16 \u65e5\uff0c\u5728\u90a3\u65f6\u9632\u62a4\u624b\u6bb5\u5c31\u5df2\u7ecf\u521b\u5efa\u5e76\u53d1\u9001\u7ed9\u6240\u6709\u7684 Palo Alto Networks \u9632\u706b\u5899\u3001\u7aef\u70b9\u7b49\u4f4d\u7f6e\u3002<\/p>\n<p>\u603b\u7684\u6765\u8bf4\uff0c\u653b\u51fb\u8005\u5fc5\u987b\u5728\u653b\u51fb\u751f\u547d\u5468\u671f\u7684\u6bcf\u4e2a\u9636\u6bb5\u90fd\u53d6\u5f97\u6210\u529f\u624d\u80fd\u8fdb\u884c\u653b\u51fb\uff0c\u56e0\u6b64 Traps Advanced Endpoint Protection \u4ec5\u9700\u6210\u529f\u5e72\u9884\u5176\u4e2d\u4e00\u4e2a\u9636\u6bb5\u4fbf\u53ef\u963b\u6b62\u653b\u51fb\u3002<\/p>\n<p>\u8981\u8fdb\u4e00\u6b65\u4e86\u89e3\u7aef\u70b9\u9632\u62a4\u7684\u57fa\u672c\u8981\u6c42\uff0c\u8bf7<a href=\"https:\/\/www.sans.org\/webcasts\/109540\" rel=\"nofollow,noopener\" >\u89c2\u770b\u6b64\u6309\u9700\u7f51\u7edc\u76f4\u64ad<\/a>\u6765\u4e86\u89e3 Traps \u5982\u4f55\u7b80\u5316\u9632\u62a4\u5e76\u964d\u4f4e\u4fdd\u62a4\u8d44\u6e90\u654f\u611f\u73af\u5883\u7684\u6210\u672c\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u867d\u7136\u52d2\u7d22\u8f6f\u4ef6\u5df2\u4e0d\u518d\u65b0\u5947\uff0c\u4f46\u7531 WannaCry\u3001Petya\/NotPetya \u548c\u6700\u8fd1\u7684 TrickBot \u6240\u53d1\u8d77\u7684\u653b\u51fb\u5df2\u8868\u660e\u73b0\u6709\u7684\u9632\u62a4\u624b\u6bb5\u5df2\u65e0\u529b\u5e94\u5bf9\u9ad8\u7ea7\u7684\u52d2\u7d22\u8f6f\u4ef6\u653b\u51fb\u3002\u653b\u51fb\u8005\u6539\u5584\u4e86\u653b\u51fb\u7684\u624b\u6bb5\u548c\u6076\u610f\u8f6f\u4ef6\u7684\u7528\u6cd5\uff0c\u4f7f\u653b\u51fb\u66f4\u4e3a\u590d\u6742\u3001\u66f4\u52a0\u81ea\u52a8\u5316\u3001\u66f4\u5177\u6709\u9488\u5bf9\u6027\uff0c\u5e76\u4e14\u66f4\u5bb9\u6613\u89c4\u907f\u3002 \u867d\u7136\u8ddd\u79bb WannaCry \u7684\u9996\u6b21\u653b\u51fb\u5df2\u7ecf\u8fc7\u53bb\u4e24\u5e74\u4e4b\u4e45\uff0c\u4f46\u8fd9\u6b3e\u8f6f\u4ef6\u4ecd\u7136\u5341\u5206\u6d3b\u8dc3\uff0c\u5728\u65b0\u95fb\u4e2d\u8fd8\u80fd\u6301\u7eed\u770b\u5230\u4e0e\u8fd9\u6b3e\u5371\u9669\u7684\u6076\u610f\u8f6f\u4ef6\u76f8\u5173\u7684\u6f0f\u6d1e\u3002WannaCry \u6301\u7eed\u6709\u6548\u7684\u539f\u56e0\u662f\u8fd9\u6b3e\u8f6f\u4ef6\u540c\u65f6\u5229\u7528\u6076\u610f\u8f6f\u4ef6\u548c\u6f0f\u6d1e\u5229\u7528\u6765\u5b9e\u73b0\u653b\u51fb\u76ee\u7684\u3002\u9996\u5148\uff0c\u5b83\u5229\u7528 Microsoft SMB \u534f\u8bae\u4e2d\u7684\u6f0f\u6d1e\u6765\u83b7\u53d6\u5185\u6838\u7ea7\u522b\u7684\u6743\u9650\u3002\u7136\u540e\u5229\u7528\u5185\u6838 APC\uff08\u5f02\u6b65\u8fc7\u7a0b\u8c03\u7528\uff09\u653b\u51fb\u624b\u6bb5\uff0c\u4f7f\u5f97\u8fd9\u79cd\u653b\u51fb\u5177\u6709\u9690\u853d\u6027\u3002\u9488\u5bf9\u5185\u6838\u8fdb\u884c\u7684\u653b\u51fb\u5df2\u7ecf\u4f17\u6240\u5468\u77e5\uff0c\u5e76\u4e14\u80fd\u591f\u8fdb\u884c\u9632\u62a4\u3002\u4f46\u662f\u5185\u6838 APC \u653b\u51fb\u662f\u622a\u7136\u4e0d\u540c\u7684\u653b\u51fb\u624b\u6bb5\u3002\u8fd9\u79cd\u624b\u6bb5\u65e0\u9700\u653b\u51fb\u5185\u6838\u6765\u83b7\u53d6\u6743\u9650\u3002\u5185\u6838 APC \u653b\u51fb\u5df2\u7ecf\u5177\u6709\u4e86\u5185\u6838\u6743\u9650\uff0c\u5e76\u5229\u7528\u8fd9\u4e9b\u6743\u9650\u5b9e\u73b0\u76ee\u7684\uff0c\u5373\u8ba9\u5408\u6cd5\u7684\u7a0b\u5e8f\u6267\u884c\u6076\u610f\u4ee3\u7801\uff0c\u800c\u4e0d\u662f\u6267\u884c\u7a0b\u5e8f\u81ea\u8eab\u7684\u5408\u6cd5\u4ee3\u7801\u3002 \u4ece\u6700\u7ec8\u7528\u6237\u7684\u89d2\u5ea6\u6765\u770b\uff0c\u4ed6\u4eec\u53ea\u80fd\u770b\u5230\u52d2\u7d22\u8f6f\u4ef6\u753b\u9762\uff0c\u800c\u65e0\u6cd5\u770b\u5230\u8fd9\u4e9b\u8f6f\u4ef6\u5728\u7aef\u70b9\u4e2d\u8fdb\u884c\u7684\u5176\u4ed6\u6d3b\u52a8\u3002\u4e0e\u6b64\u540c\u65f6\uff0c\u6076\u610f\u8f6f\u4ef6\u7ee7\u7eed\u4ee5\u4e1c\u897f\u5411\u4f20\u64ad\uff0c\u5c3d\u5176\u6240\u80fd\u5730\u611f\u67d3\u5185\u90e8\u548c\u5916\u90e8\u5b58\u5728\u6f0f\u6d1e\u7684\u8ba1\u7b97\u673a\u3002 WannaCry \u653b\u51fb\u5e8f\u5217\u7b80\u56fe &nbsp; \u63a5\u4e0b\u6765\u8c08\u8c08 Palo Alto Networks Traps\u3002Traps Advanced Endpoint Protection \u5305\u542b\u4e86\u591a\u79cd\u9632\u62a4\u5df2\u77e5\u548c\u672a\u77e5\u6076\u610f\u8f6f\u4ef6\u3001\u52d2\u7d22\u8f6f\u4ef6\u53ca\u6f0f\u6d1e\u5229\u7528\u7684\u624b\u6bb5\uff0c\u80fd\u591f\u5728\u7aef\u70b9\u906d\u53d7\u4fb5\u5bb3\u4e4b\u524d\u963b\u6b62\u6076\u610f\u7a0b\u5e8f\u7684\u6267\u884c\u3002\u901a\u8fc7\u5411\u653b\u51fb\u751f\u547d\u5468\u671f\u7684\u5173\u952e\u9636\u6bb5\u65bd\u52a0\u9632\u62a4\uff0c\u4e0d\u8bba\u7aef\u70b9\u4f7f\u7528\u4f55\u79cd\u64cd\u4f5c\u7cfb\u7edf\u3001\u662f\u8054\u673a\u8fd8\u662f\u8131\u673a\u3001\u662f\u5426\u8fde\u63a5\u5230\u516c\u53f8\u7f51\u7edc\uff0cTraps \u90fd\u53ef\u4ee5\u9632\u6b62\u52d2\u7d22\u8f6f\u4ef6\u7684\u653b\u51fb\u3002 \u5728 &hellip;<\/p>\n","protected":false},"author":483,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3540],"tags":[4339,4342],"coauthors":[5049,2416],"class_list":["post-97274","post","type-post","status-publish","format-standard","hentry","category-3540","tag-malware-zh-hans","tag-ransomware-zh-hans"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/483"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=97274"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97274\/revisions"}],"predecessor-version":[{"id":97276,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97274\/revisions\/97276"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=97274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=97274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=97274"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=97274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}