{"id":197,"date":"2023-06-10T08:59:24","date_gmt":"2023-06-10T12:59:24","guid":{"rendered":"https:\/\/aviancetechnologies.com\/blog\/news\/us\/?p=197"},"modified":"2023-06-10T08:59:24","modified_gmt":"2023-06-10T12:59:24","slug":"uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability","status":"publish","type":"post","link":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/","title":{"rendered":"Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability"},"content":{"rendered":"\n<p><strong><a href=\"https:\/\/aviancetechnologies.com\/blog\/news\/us\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/\">Google Drive<\/a><\/strong>, a widely used cloud storage platform, has recently faced scrutiny due to a security flaw that allows hackers to stealthily exfiltrate data without leaving any traces. This vulnerability poses a significant risk to user data and highlights the need for enhanced security measures within Google Workspace.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Exploitation of a Security Flaw:<\/strong><\/h2>\n\n\n\n<p>Experts conducting an in-depth analysis discovered a critical security flaw within Google Workspace, exposing a deficiency in its forensic measures. This flaw enables threat actors to exploit Google Drive, extracting data without triggering any detectable alerts or logs. It raises concerns about the transparency and accountability of actions performed within the platform.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Role of Google Workspace Security:<\/h2>\n\n\n\n<p>Google Workspace offers a level of transparency through &#8220;Drive log events,&#8221; which track various actions performed on Google Drive resources. However, this practice is limited to users with a paid license, leaving users with the default &#8220;Cloud Identity Free&#8221; license at a disadvantage. This restriction poses a challenge as critical activities performed by non-paid license holders may go unnoticed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Potential Complications:<\/h2>\n\n\n\n<p>Two primary scenarios illustrate the potential complications resulting from this security flaw. Firstly, if a threat actor compromises an admin user&#8217;s account, log records may only capture actions related to license assignment and revocation, leaving other activities untraceable. Secondly, during employee offboarding, individuals without a paid license can download files from their private drive without generating any log records, creating a potential risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recommendations for Improved Security:<\/h2>\n\n\n\n<p>To address this vulnerability, it is crucial for administrators to monitor all events related to license assignment and revocation under &#8220;Admin Log Events.&#8221; Regular threat hunts within Google Workspace should be conducted to detect and investigate suspicious activities. Proactive searches for instances where files are copied from shared drives to private drives, followed by downloads, can help identify and mitigate potential security breaches.<\/p>\n\n\n\n<p>The security flaw within Google Drive&#8217;s data exfiltration process emphasizes the need for enhanced security measures and greater transparency within Google Workspace. By addressing the identified vulnerability and implementing recommended measures, organizations can strengthen their data protection strategies and minimize the risk of unauthorized data access. It is essential for Google to acknowledge and respond to this issue promptly, working towards resolving it for the safety and trust of its users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Drive, a widely used cloud storage platform, has recently faced scrutiny due to a security flaw that allows hackers to stealthily exfiltrate data without leaving any traces. This vulnerability poses a significant risk to user data and highlights the need for enhanced security measures within Google Workspace. The Exploitation of a Security Flaw: Experts &#8230; <a title=\"Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability\" class=\"read-more\" href=\"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/\" aria-label=\"Read more about Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability\">Read more<\/a><\/p>\n","protected":false},"author":659,"featured_media":204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[74],"tags":[],"class_list":["post-197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Uncovering a Critical Flaw: Google Drive&#039;s Data Exfiltration Vulnerability - Aviance Technologies<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uncovering a Critical Flaw: Google Drive&#039;s Data Exfiltration Vulnerability - Aviance Technologies\" \/>\n<meta property=\"og:description\" content=\"Google Drive, a widely used cloud storage platform, has recently faced scrutiny due to a security flaw that allows hackers to stealthily exfiltrate data without leaving any traces. This vulnerability poses a significant risk to user data and highlights the need for enhanced security measures within Google Workspace. The Exploitation of a Security Flaw: Experts ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Aviance Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-10T12:59:24+00:00\" \/>\n<meta name=\"author\" content=\"Bikash Hutait\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bikash Hutait\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/\"},\"author\":{\"name\":\"Bikash Hutait\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/91771b824ae7772f1c8059d13e624630\"},\"headline\":\"Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability\",\"datePublished\":\"2023-06-10T12:59:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/\"},\"wordCount\":386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg\",\"articleSection\":[\"INTERNET\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/\",\"name\":\"Uncovering a Critical Flaw: Google Drive's Data Exfiltration Vulnerability - Aviance Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg\",\"datePublished\":\"2023-06-10T12:59:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg\",\"width\":1200,\"height\":800,\"caption\":\"uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"name\":\"Aviance Technologies\",\"description\":\"Latest Technology Trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\",\"name\":\"Aviance Technologies\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"width\":217,\"height\":77,\"caption\":\"Aviance Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/91771b824ae7772f1c8059d13e624630\",\"name\":\"Bikash Hutait\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3115e6a20c2c34db0e7d9012a14f4c3090238b9477d30ef16d90510cb5c93d26?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3115e6a20c2c34db0e7d9012a14f4c3090238b9477d30ef16d90510cb5c93d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3115e6a20c2c34db0e7d9012a14f4c3090238b9477d30ef16d90510cb5c93d26?s=96&d=mm&r=g\",\"caption\":\"Bikash Hutait\"},\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/author\\\/bikash03\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uncovering a Critical Flaw: Google Drive's Data Exfiltration Vulnerability - Aviance Technologies","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Uncovering a Critical Flaw: Google Drive's Data Exfiltration Vulnerability - Aviance Technologies","og_description":"Google Drive, a widely used cloud storage platform, has recently faced scrutiny due to a security flaw that allows hackers to stealthily exfiltrate data without leaving any traces. This vulnerability poses a significant risk to user data and highlights the need for enhanced security measures within Google Workspace. The Exploitation of a Security Flaw: Experts ... Read more","og_url":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/","og_site_name":"Aviance Technologies","article_published_time":"2023-06-10T12:59:24+00:00","author":"Bikash Hutait","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bikash Hutait","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#article","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/"},"author":{"name":"Bikash Hutait","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/91771b824ae7772f1c8059d13e624630"},"headline":"Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability","datePublished":"2023-06-10T12:59:24+00:00","mainEntityOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/"},"wordCount":386,"commentCount":0,"publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/06\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg","articleSection":["INTERNET"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/","url":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/","name":"Uncovering a Critical Flaw: Google Drive's Data Exfiltration Vulnerability - Aviance Technologies","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/06\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg","datePublished":"2023-06-10T12:59:24+00:00","breadcrumb":{"@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#primaryimage","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/06\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/06\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability.jpg","width":1200,"height":800,"caption":"uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/aviancetechnologies.com\/blog\/uncovering-a-critical-flaw-google-drives-data-exfiltration-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aviancetechnologies.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Uncovering a Critical Flaw: Google Drive&#8217;s Data Exfiltration Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/aviancetechnologies.com\/blog\/#website","url":"https:\/\/aviancetechnologies.com\/blog\/","name":"Aviance Technologies","description":"Latest Technology Trends","publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aviancetechnologies.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aviancetechnologies.com\/blog\/#organization","name":"Aviance Technologies","url":"https:\/\/aviancetechnologies.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","width":217,"height":77,"caption":"Aviance Technologies"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/91771b824ae7772f1c8059d13e624630","name":"Bikash Hutait","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3115e6a20c2c34db0e7d9012a14f4c3090238b9477d30ef16d90510cb5c93d26?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3115e6a20c2c34db0e7d9012a14f4c3090238b9477d30ef16d90510cb5c93d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3115e6a20c2c34db0e7d9012a14f4c3090238b9477d30ef16d90510cb5c93d26?s=96&d=mm&r=g","caption":"Bikash Hutait"},"url":"https:\/\/aviancetechnologies.com\/blog\/author\/bikash03\/"}]}},"_links":{"self":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/users\/659"}],"replies":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":0,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media\/204"}],"wp:attachment":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}