{"id":7550,"date":"2021-10-18T14:57:52","date_gmt":"2021-10-18T14:57:52","guid":{"rendered":"https:\/\/www.webtechmantra.com\/?p=7550"},"modified":"2022-02-25T11:25:09","modified_gmt":"2022-02-25T11:25:09","slug":"misconfigured-cloud-apis","status":"publish","type":"post","link":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/","title":{"rendered":"Misconfigured Cloud APIs are a Major Security Risk"},"content":{"rendered":"<p>APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily &#8212; and, importantly, rapidly. They\u2019re bits of software which facilitate communication or interaction between apps, services, or platforms. Think of them as the interpreter which sends requests and responses between endpoints.<\/p>\n<p>According to a survey of 1,500 developers <u><a href=\"https:\/\/www.devopsdigest.com\/api-adoption-on-the-rise-across-all-industries\" target=\"_blank\" rel=\"nofollow noopener\">published this year<\/a><\/u>, 61.3 percent of respondents said that they used a greater number of APIs in 2020 than they had in 2019. For 2021, 71.1 percent said they expected to use more APIs than they had in 2020.<\/p>\n<p>One trend driving the upswing in API usage is the increased focus of companies adopting \u201cas a Service\u201d business models. APIs allow programmatic access to an organization\u2019s software without a GUI. Cloud APIs, in particular, have experienced a particular boom in activity as cloud services have become a bigger part of our daily lives &#8212; whether for work or for entertainment. As organizations continually add new apps and platforms to their technology stack offerings, APIs are there to help with the service integration.<\/p>\n<p>So far, so good.<\/p>\n<p>The problem is that, as useful as APIs undoubtedly are, misconfigured APIs pose a major problem, leaving cloud environments extremely vulnerable to attack. For those without safeguarding tools such as <u><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/web-application-and-api-protection-waap\/\" target=\"_blank\" rel=\"noopener\">WAAP<\/a><\/u>, the results can be extremely bad news.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_61 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#The_threat_of_misconfigured_APIs\" title=\"The threat of misconfigured APIs\">The threat of misconfigured APIs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#Get_onboard_with_WAAP_solutions\" title=\"Get onboard with WAAP solutions\">Get onboard with WAAP solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#Be_aware_of_the_risks\" title=\"Be aware of the risks\">Be aware of the risks<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"The_threat_of_misconfigured_APIs\"><\/span><strong>The threat of misconfigured APIs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A recent report, titled the <u><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/WMDZOWK6\" rel=\"nofollow\">2021 IBM Security X-Force Cloud Threat Landscape Report<\/a><\/u>, highlights the threat posed by misconfigured APIs. The report looked at how attackers exploit vulnerabilities in enterprise protection, and drew conclusions as to why these exist. It found that two-thirds of threats to cloud environments involve misconfigured API keys allowing improper access to systems.<\/p>\n<p>Improperly secured APIs act as an open line of possible communication that attackers can use to exploit vulnerabilities in cloud resources. The problem is also getting worse; not better. According to Gartner analysts, by 2022 APIs will represent the threat vector that is utilized most frequently by hackers when they attack enterprise application data.<\/p>\n<p>There are a couple of ways this scenario can play out. For starters, developers can create APIs that lack the right authentication tools. In doing so, they make it easier for everyone &#8212; including bad actors &#8212; to access what could be sensitive information in the form of data and systems. There is additionally a risk of insufficient authorization control, allowing attackers to target even backend API calls organizations may not assume that hackers will be aware of.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Get_onboard_with_WAAP_solutions\"><\/span><strong>Get onboard with WAAP solutions<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Traditional security solutions have a hard time offering protection in a world of cloud APIs. Sales of web application firewall (WAF) physical appliances have slowed as cloud hosting has become an increasingly popular architecture. Standard WAF technology has not been able to keep course with innovation in this area alone, especially when it comes to helping organizations that are operating in complex, multi-cloud setups across multiple cloud environments.<\/p>\n<p>As the IBM report highlights, there are plenty of challenges that need to be addressed in this area. Just because the classic safeguards don\u2019t work on their own doesn\u2019t mean that security protocols should be ignored. If anything &#8212; with a growing number of threats on the landscape &#8212; efforts need to be doubled.<\/p>\n<p>This is where WAAP comes into play. Cloud WAAP services include a variety of security modules. It is based around an auto-scaling, multi-tenant cloud infrastructure, with core features including bot mitigation to protect against the growing number of bot attacks directed at online services, API protection, WAF, and safeguards against potentially devastating DDoS attacks designed to knock online services offline. Cloud WAAP services also regularly come with other service components that are able to improve the performance of web applications.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Be_aware_of_the_risks\"><\/span><strong>Be aware of the risks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Deploying WAAP instead of simply a WAF can help ensure coverage of both web applications and APIs. This is something that every organization should be hyper-aware of. The world isn\u2019t going to shift away from its focus on the cloud anytime soon. Cloud applications have proven transformative across a broad range of sectors &#8212; with no example proving the point more than the past 18 months of the pandemic. During that time, both users and companies alike flocked to the cloud to carry out just about every facet of daily life.<\/p>\n<p>Whether it\u2019s to cater to employees or customers, organizations have come to embrace this \u201cnew normal\u201d &#8212; and, in most cases, the idea of being the subject of a possible cyberattack is too devastating to consider.<\/p>\n<p>If you don\u2019t want to see those risks manifest at any point, invest in the right protective measures. It\u2019s an essential part of security, circa 2021 &#8212; and far, far beyond.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component<\/p>\n","protected":false},"author":1,"featured_media":7552,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[787,11],"tags":[1508,1509],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Misconfigured Cloud APIs are a Major Security Risk<\/title>\n<meta name=\"description\" content=\"APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily and, importantly, rapidly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Misconfigured Cloud APIs are a Major Security Risk\" \/>\n<meta property=\"og:description\" content=\"APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily and, importantly, rapidly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\" \/>\n<meta property=\"og:site_name\" content=\"WTM - Technology, Business, Finance, Digital Marketing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webtechmantra\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T14:57:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-25T11:25:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/Misconfigured-Cloud-APIs-are-a-Major-Security-Risk-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Web Tech Mantra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webtechmantra\" \/>\n<meta name=\"twitter:site\" content=\"@webtechmantra\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Tech Mantra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\"},\"author\":{\"name\":\"Web Tech Mantra\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124\"},\"headline\":\"Misconfigured Cloud APIs are a Major Security Risk\",\"datePublished\":\"2021-10-18T14:57:52+00:00\",\"dateModified\":\"2022-02-25T11:25:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\"},\"wordCount\":803,\"publisher\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\"},\"keywords\":[\"Cloud API\",\"Security Risk\"],\"articleSection\":[\"Security\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\",\"url\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\",\"name\":\"Misconfigured Cloud APIs are a Major Security Risk\",\"isPartOf\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#website\"},\"datePublished\":\"2021-10-18T14:57:52+00:00\",\"dateModified\":\"2022-02-25T11:25:09+00:00\",\"description\":\"APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily and, importantly, rapidly.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.webtechmantra.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Misconfigured Cloud APIs are a Major Security Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.webtechmantra.com\/#website\",\"url\":\"https:\/\/www.webtechmantra.com\/\",\"name\":\"WTM - Technology, Business, Finance, Digital Marketing\",\"description\":\"Technology, Business, Finance, Digital Marketing\",\"publisher\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.webtechmantra.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\",\"name\":\"WTM - Technology, Business, Finance, Digital Marketing\",\"url\":\"https:\/\/www.webtechmantra.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png\",\"contentUrl\":\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png\",\"width\":250,\"height\":64,\"caption\":\"WTM - Technology, Business, Finance, Digital Marketing\"},\"image\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webtechmantra\",\"https:\/\/twitter.com\/webtechmantra\",\"https:\/\/www.pinterest.com\/webtechmantraofficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124\",\"name\":\"Web Tech Mantra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815\",\"contentUrl\":\"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815\",\"caption\":\"Web Tech Mantra\"},\"description\":\"Web Tech Mantra website came up with a new helpful content update on finance, technology, business, health, and more topics niche. We studied, analyzed and presented on this platform. With all our knowledge, we established a platform to build a proper and trustful rapport with the internet world. We also covered the social media world through web tech mantra, so every social media user can access the informational world through the web tech mantra.\",\"sameAs\":[\"https:\/\/webtechmantra.com\"],\"url\":\"https:\/\/www.webtechmantra.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Misconfigured Cloud APIs are a Major Security Risk","description":"APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily and, importantly, rapidly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/","og_locale":"en_US","og_type":"article","og_title":"Misconfigured Cloud APIs are a Major Security Risk","og_description":"APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily and, importantly, rapidly.","og_url":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/","og_site_name":"WTM - Technology, Business, Finance, Digital Marketing","article_publisher":"https:\/\/www.facebook.com\/webtechmantra","article_published_time":"2021-10-18T14:57:52+00:00","article_modified_time":"2022-02-25T11:25:09+00:00","og_image":[{"width":1200,"height":608,"url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/Misconfigured-Cloud-APIs-are-a-Major-Security-Risk-1.jpg","type":"image\/jpeg"}],"author":"Web Tech Mantra","twitter_card":"summary_large_image","twitter_creator":"@webtechmantra","twitter_site":"@webtechmantra","twitter_misc":{"Written by":"Web Tech Mantra","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#article","isPartOf":{"@id":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/"},"author":{"name":"Web Tech Mantra","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124"},"headline":"Misconfigured Cloud APIs are a Major Security Risk","datePublished":"2021-10-18T14:57:52+00:00","dateModified":"2022-02-25T11:25:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/"},"wordCount":803,"publisher":{"@id":"https:\/\/www.webtechmantra.com\/#organization"},"keywords":["Cloud API","Security Risk"],"articleSection":["Security","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/","url":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/","name":"Misconfigured Cloud APIs are a Major Security Risk","isPartOf":{"@id":"https:\/\/www.webtechmantra.com\/#website"},"datePublished":"2021-10-18T14:57:52+00:00","dateModified":"2022-02-25T11:25:09+00:00","description":"APIs are on the rise. Short for Application Protocol Interface, APIs represent a crucial component when it comes to software development, granting developers the ability to build microservices and applications more easily and, importantly, rapidly.","breadcrumb":{"@id":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.webtechmantra.com\/misconfigured-cloud-apis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.webtechmantra.com\/"},{"@type":"ListItem","position":2,"name":"Misconfigured Cloud APIs are a Major Security Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.webtechmantra.com\/#website","url":"https:\/\/www.webtechmantra.com\/","name":"WTM - Technology, Business, Finance, Digital Marketing","description":"Technology, Business, Finance, Digital Marketing","publisher":{"@id":"https:\/\/www.webtechmantra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webtechmantra.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.webtechmantra.com\/#organization","name":"WTM - Technology, Business, Finance, Digital Marketing","url":"https:\/\/www.webtechmantra.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png","contentUrl":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png","width":250,"height":64,"caption":"WTM - Technology, Business, Finance, Digital Marketing"},"image":{"@id":"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webtechmantra","https:\/\/twitter.com\/webtechmantra","https:\/\/www.pinterest.com\/webtechmantraofficial\/"]},{"@type":"Person","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124","name":"Web Tech Mantra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/image\/","url":"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815","contentUrl":"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815","caption":"Web Tech Mantra"},"description":"Web Tech Mantra website came up with a new helpful content update on finance, technology, business, health, and more topics niche. We studied, analyzed and presented on this platform. With all our knowledge, we established a platform to build a proper and trustful rapport with the internet world. We also covered the social media world through web tech mantra, so every social media user can access the informational world through the web tech mantra.","sameAs":["https:\/\/webtechmantra.com"],"url":"https:\/\/www.webtechmantra.com\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/7550"}],"collection":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/comments?post=7550"}],"version-history":[{"count":0,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/7550\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/media\/7552"}],"wp:attachment":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/media?parent=7550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/categories?post=7550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/tags?post=7550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}