{"id":5112,"date":"2020-07-16T05:19:50","date_gmt":"2020-07-16T05:19:50","guid":{"rendered":"https:\/\/aviancetechnologies.com\/blog\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/"},"modified":"2020-07-16T05:19:50","modified_gmt":"2020-07-16T05:19:50","slug":"twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools","status":"publish","type":"post","link":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/","title":{"rendered":"Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;"},"content":{"rendered":"<p>\u00a0\u00a0 <\/p>\n<p>[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;]<\/p>\n<h2>Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;<\/h2>\n<p><\/p>\n<div id=\"piano-inline-content-wrapper\" data-piano-inline-content-wrapper=\"\">\n<ul class=\"summary-list\">\n<li>Twitter said Wednesday that a &#8220;coordinated social engineering attack&#8221; was behind a hack that compromised high-profile accounts.<\/li>\n<li>The attack &#8220;successfully targeted some of our employees,&#8221; the company said, giving hackers access to &#8220;internal systems and tools.&#8221;<\/li>\n<li>The company appeared to discount allegations that the attack was knowingly enabled by one of its employees, as one outlet had claimed.<\/li>\n<li>A Twitter spokesperson told Business Insider that the company&#8217;s &#8220;investigation continues and we hope to have more to share there soon.&#8221;<\/li>\n<li>Visit Business Insider&#8217;s homepage for more stories.<\/li>\n<\/ul>\n<p>Twitter announced Wednesday that hackers had targeted its employees, enabling them to access &#8220;internal systems and tools&#8221; that led to the compromise of some of the most popular accounts on the social network.<\/p>\n<p>The company said a &#8220;coordinated social engineering attack&#8221; had &#8220;successfully targeted some of our employees.&#8221; This appears to contradict with\u00a0a report from Motherboard that alleges that the hack was knowingly enabled by one of its workers. The outlet&#8217;s claim was based on an interview with a purported hacker, and it has not been confirmed.<\/p>\n<p>Asked about the Motherboard story, a Twitter spokesperson told Business Insider that the company&#8217;s &#8220;investigation continues, and we hope to have more to share there soon.&#8221;<\/p>\n<p>The attack began Wednesday with several high-profile accounts, from Joe Biden to Kim Kardashian, posting links to a Bitcoin account. Users were asked to send the account money \u2014 and promised they would receive twice as much back.<\/p>\n<p>The perpetrators claim they made more than $118,000.<\/p>\n<p>The hack revealed that Twitter employees enjoy a good deal of control over users&#8217; accounts \u2014 raising questions about security beyond what a user can access. The internal tools that were exploited allow employees to both suspend accounts and reset the email addresses associated with them.<\/p>\n<p>&#8220;Internally,&#8221; the company <a target=\"_blank\" href=\"https:\/\/twitter.com\/TwitterSupport\/status\/1283591853955219458\" data-analytics-module=\"body_link\" rel=\"noopener noreferrer\">said Wednesday<\/a>, &#8220;we&#8217;ve taken significant steps to limit access to internal systems and tools while our investigation is ongoing.&#8221;<\/p>\n<p>In 2017, a contractor working with Twitter&#8217;s Trust and Safety division was able to shut down President Donald Trump&#8217;s account for 11 minutes after it was reported. And in 2019, two former Twitter employees were charged by the Department of Justice with spying for Saudi Arabia by mining personal information from accounts.<\/p>\n<p>Alex Stamos, director of the Stanford Internet Observatory, gave The New York Times several theories for how the hackers could have accessed the account and said that it appeared to have come internally from Twitter&#8217;s system, as opposed to users&#8217; individual accounts being compromised through a password.<\/p>\n<p>&#8220;It could have been much worse,&#8221; Stamos said. &#8220;We got lucky that this is what they decided to do with their power.&#8221;<\/p>\n<p><em>Have a news tip? Email this reporter: cdavis@insider.com<\/em><\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<div class=\"post-item-metadata entry-meta\">\n<p class=\"has-background has-very-light-gray-background-color\">Disclaimer: Content may be edited for style and length.\u00a0<a class=\"newsium-categories category-color-1\" href=\"http:\/\/feedproxy.google.com\/~r\/typepad\/alleyinsider\/silicon_alley_insider\/~3\/PmkLb2kHldM\/twitter-says-bitcoin-hackers-had-access-internal-systems-and-tools-2020-7\" target=\"_blank\" rel=\"noopener noreferrer\">Story Source<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217; Twitter said Wednesday that a &#8220;coordinated social engineering attack&#8221; was behind a hack that compromised high-profile accounts. The attack &#8220;successfully targeted some of our employees,&#8221; the company said, giving hackers access to &#8220;internal &#8230; <a title=\"Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;\" class=\"read-more\" href=\"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/\" aria-label=\"Read more about Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":5113,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,30],"tags":[],"class_list":["post-5112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Twitter says Bitcoin hackers had access to &#039;internal systems and tools&#039; - Aviance Technologies<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twitter says Bitcoin hackers had access to &#039;internal systems and tools&#039; - Aviance Technologies\" \/>\n<meta property=\"og:description\" content=\"\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217; Twitter said Wednesday that a &#8220;coordinated social engineering attack&#8221; was behind a hack that compromised high-profile accounts. The attack &#8220;successfully targeted some of our employees,&#8221; the company said, giving hackers access to &#8220;internal ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Aviance Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-16T05:19:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ATN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/\"},\"author\":{\"name\":\"ATN\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\"},\"headline\":\"Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;\",\"datePublished\":\"2020-07-16T05:19:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg\",\"articleSection\":[\"NEWS\",\"TECHNOLOGY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/\",\"name\":\"Twitter says Bitcoin hackers had access to 'internal systems and tools' - Aviance Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg\",\"datePublished\":\"2020-07-16T05:19:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"name\":\"Aviance Technologies\",\"description\":\"Latest Technology Trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\",\"name\":\"Aviance Technologies\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"width\":217,\"height\":77,\"caption\":\"Aviance Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\",\"name\":\"ATN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"caption\":\"ATN\"},\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twitter says Bitcoin hackers had access to 'internal systems and tools' - Aviance Technologies","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Twitter says Bitcoin hackers had access to 'internal systems and tools' - Aviance Technologies","og_description":"\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217; Twitter said Wednesday that a &#8220;coordinated social engineering attack&#8221; was behind a hack that compromised high-profile accounts. The attack &#8220;successfully targeted some of our employees,&#8221; the company said, giving hackers access to &#8220;internal ... Read more","og_url":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/","og_site_name":"Aviance Technologies","article_published_time":"2020-07-16T05:19:50+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg","type":"image\/jpeg"}],"author":"ATN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ATN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#article","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/"},"author":{"name":"ATN","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc"},"headline":"Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;","datePublished":"2020-07-16T05:19:50+00:00","mainEntityOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/"},"wordCount":493,"publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg","articleSection":["NEWS","TECHNOLOGY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/","url":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/","name":"Twitter says Bitcoin hackers had access to 'internal systems and tools' - Aviance Technologies","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#primaryimage"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg","datePublished":"2020-07-16T05:19:50+00:00","breadcrumb":{"@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#primaryimage","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/07\/Twitter-says-Bitcoin-hackers-had-access-to-internal-systems-and.jpeg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/aviancetechnologies.com\/blog\/twitter-says-bitcoin-hackers-had-access-to-internal-systems-and-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aviancetechnologies.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Twitter says Bitcoin hackers had access to &#8216;internal systems and tools&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/aviancetechnologies.com\/blog\/#website","url":"https:\/\/aviancetechnologies.com\/blog\/","name":"Aviance Technologies","description":"Latest Technology Trends","publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aviancetechnologies.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aviancetechnologies.com\/blog\/#organization","name":"Aviance Technologies","url":"https:\/\/aviancetechnologies.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","width":217,"height":77,"caption":"Aviance Technologies"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc","name":"ATN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","caption":"ATN"},"url":"https:\/\/aviancetechnologies.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/5112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=5112"}],"version-history":[{"count":0,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/5112\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media\/5113"}],"wp:attachment":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=5112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=5112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=5112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}