{"id":13512,"date":"2024-07-29T05:26:38","date_gmt":"2024-07-29T09:26:38","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=13512"},"modified":"2025-03-07T10:48:39","modified_gmt":"2025-03-07T15:48:39","slug":"three-steps-to-mitigate-subdomain-hijacking","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/","title":{"rendered":"Three Steps to Mitigate Subdomain Hijacking"},"content":{"rendered":"\n<p>The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.<\/p>\n\n\n\n<p>CSC analysis of DNS records revealed some alarming statistics\u201421% of subdomains do not resolve, and 63% display error codes like &#8220;404&#8221; or &#8220;502.&#8221; These unresolved subdomains pose significant security risks, especially through the sophisticated attack method of subdomain hijacking, which exploits overlooked DNS configurations.<\/p>\n\n\n\n<p>Subdomain hijacking occurs when cybercriminals exploit abandoned or improperly configured DNS records (also called dangling DNS) to redirect traffic to malicious sites. This can lead to phishing attacks or malware distribution, both of which can cause significant reputation damage to the targeted brand. Understanding the root causes and implications of dangling DNS is crucial for mitigating risk effectively. <\/p>\n\n\n\n<p>By prioritizing DNS hygiene, leveraging advanced monitoring tools, and enforcing robust security policies, organizations can mitigate the risks associated with dangling DNS and safeguard their digital assets effectively.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mitigation strategies<\/strong><\/h2>\n\n\n\n<p>Here are CSC\u2019s four steps to safeguard proactively against subdomain hijacking.<\/p>\n\n\n\n<p><strong>1. <\/strong><strong>Enforce security policies:<\/strong> Establish clear policies for managing DNS records, including regular audits and deletion protocols for unused subdomains. This ensures accountability across teams and reduces the likelihood of an oversight.<\/p>\n\n\n\n<p><strong>2. <\/strong><strong>Ensure rigorous DNS hygiene:<\/strong> Regularly review and remove unnecessary or outdated DNS records. This proactive approach reduces the attack surface and minimizes the risk of subdomain exploitation.<\/p>\n\n\n\n<p><strong>3. Deploy monitoring and alerts:<\/strong> Use tools like <a href=\"https:\/\/www.cscdbs.com\/en\/domain-security\/subdomain-monitoring\/\" target=\"_blank\" rel=\"noopener\">CSC&#8217;s Subdomain Monitoring<\/a> solution to receive real-time alerts on changes to DNS configurations. This enables swift identification and remediation of dangling DNS records before they can be exploited.<\/p>\n\n\n\n<p>Consider implementing technologies like DNS security extensions (DNSSEC), domain-based messaging, authentication and conformance (DMARC), and registry locks for critical domains. These protocols add layers of authentication to DNS transactions, enhancing the overall security posture.<\/p>\n\n\n\n<p>At CSC, we\u2019re committed to empowering businesses with the tools and insights needed to protect against continuously evolving cyber threats. Explore our <a href=\"https:\/\/www.cscdbs.com\/en\/domain-security\/subdomain-monitoring\/\" target=\"_blank\" rel=\"noopener\">Subdomain Monitoring solution<\/a> and take practical steps towards enhancing your organization&#8217;s security posture.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<p><strong>We\u2019re ready to talk<\/strong> <\/p>\n\n\n\n<p>To speak with one of our experts about your domain and DNS cyber hygiene, <a style=\"font-size: revert\" href=\"https:\/\/www.cscdbs.com\/en\/contact-us\/\" target=\"_blank\" rel=\"noopener\">complete our contact form<\/a><span style=\"font-size: revert;color: initial\">.<\/span><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.<\/p>\n","protected":false},"author":14,"featured_media":10461,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[547,548,521],"tags":[],"class_list":["post-13512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-management","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Steps to Mitigate Subdomain Hijacking | CSC<\/title>\n<meta name=\"description\" content=\"The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Steps to Mitigate Subdomain Hijacking | CSC\" \/>\n<meta property=\"og:description\" content=\"The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-29T09:26:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-07T15:48:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55040.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rivea Ravindran\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rivea Ravindran\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/\"},\"author\":{\"name\":\"Rivea Ravindran\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/e9c14876210a4b05a756aeb236b4f97f\"},\"headline\":\"Three Steps to Mitigate Subdomain Hijacking\",\"datePublished\":\"2024-07-29T09:26:38+00:00\",\"dateModified\":\"2025-03-07T15:48:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/\"},\"wordCount\":379,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55040.jpg\",\"articleSection\":[\"Domain Management\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/\",\"name\":\"Three Steps to Mitigate Subdomain Hijacking | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55040.jpg\",\"datePublished\":\"2024-07-29T09:26:38+00:00\",\"dateModified\":\"2025-03-07T15:48:39+00:00\",\"description\":\"The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55040.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55040.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/three-steps-to-mitigate-subdomain-hijacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Steps to Mitigate Subdomain Hijacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/e9c14876210a4b05a756aeb236b4f97f\",\"name\":\"Rivea Ravindran\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Steps to Mitigate Subdomain Hijacking | CSC","description":"The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/","og_locale":"en_US","og_type":"article","og_title":"Three Steps to Mitigate Subdomain Hijacking | CSC","og_description":"The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.","og_url":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2024-07-29T09:26:38+00:00","article_modified_time":"2025-03-07T15:48:39+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55040.jpg","type":"image\/jpeg"}],"author":"Rivea Ravindran","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Rivea Ravindran","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/"},"author":{"name":"Rivea Ravindran","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/e9c14876210a4b05a756aeb236b4f97f"},"headline":"Three Steps to Mitigate Subdomain Hijacking","datePublished":"2024-07-29T09:26:38+00:00","dateModified":"2025-03-07T15:48:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/"},"wordCount":379,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55040.jpg","articleSection":["Domain Management","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/","url":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/","name":"Three Steps to Mitigate Subdomain Hijacking | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55040.jpg","datePublished":"2024-07-29T09:26:38+00:00","dateModified":"2025-03-07T15:48:39+00:00","description":"The journey towards widespread Cloud adoption has significantly impacted domain name system (DNS) management practices. Initially, businesses operated their own data centers, however the shift towards external hosting providers has introduced complexities and increased the potential for DNS record mismanagement, and therefore, subdomain vulnerability.","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55040.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55040.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/three-steps-to-mitigate-subdomain-hijacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Three Steps to Mitigate Subdomain Hijacking"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/e9c14876210a4b05a756aeb236b4f97f","name":"Rivea Ravindran"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/13512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=13512"}],"version-history":[{"count":20,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/13512\/revisions"}],"predecessor-version":[{"id":14002,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/13512\/revisions\/14002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10461"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=13512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=13512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=13512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}