{"id":120,"date":"2025-10-18T11:57:58","date_gmt":"2025-10-18T09:57:58","guid":{"rendered":"http:\/\/blog-2025.test\/?p=120"},"modified":"2026-02-25T15:38:52","modified_gmt":"2026-02-25T14:38:52","slug":"the-weaponization-era-when-aibecomes-a-cyber-weapon","status":"publish","type":"post","link":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/","title":{"rendered":"The Weaponization Era: when AIbecomes a cyber weapon"},"content":{"rendered":"\n<p>The cybersecurity landscape has entered a dangerous new phase.&nbsp;<strong>Artificial intelligence, once pretended to be our digital protector, has become a double-edged sword<\/strong>&nbsp;\u2014 simultaneously strengthening our defenses while arming cybercriminals with unprecedented capabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The numbers don&#8217;t lie<\/h2>\n\n\n\n<p>The statistics offer a sobering picture of our current reality.&nbsp;<strong>AI-driven cyberattacks surged by 47% globally in 2025<\/strong>, while&nbsp;<strong>68% of cyber threat analysts report that AI-generated phishing attempts are now harder to detect<\/strong>. Perhaps most alarming:&nbsp;<strong>87% of global organizations faced AI-powered cyberattacks in the past year<\/strong>, with the average cost of an AI-powered data breach reaching&nbsp;<strong>$5.72 million<\/strong>.<\/p>\n\n\n\n<p>These aren&#8217;t distant threats \u2014 they&#8217;re happening now.&nbsp;<strong>In 2025, global AI-driven cyberattacks are projected to surpass 28 million incidents<\/strong>, with&nbsp;<strong>14% of major corporate breaches being fully autonomous<\/strong>, requiring no human intervention after the AI launched the attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">From science fiction to reality<\/h2>\n\n\n\n<p>What makes this&nbsp;<em>era<\/em>&nbsp;particularly dangerous is how AI has&nbsp;<strong>democratized sophisticated cyber warfare<\/strong>. Traditional attacks required specialized knowledge and significant time investment. Today,&nbsp;<strong>82.6% of phishing emails use AI technology in some form<\/strong>, and these AI-crafted messages achieve a&nbsp;<strong>78% open rate<\/strong>&nbsp;\u2014 a success rate that would terrifies security professionals.<\/p>\n\n\n\n<p>The weaponization extends far beyond simple phishing.&nbsp;<strong>41% of ransomware families now include AI components for adaptive payload delivery<\/strong>, while&nbsp;<strong>synthetic media attacks, including deepfakes, grew by 62% year-over-year in 2025.<\/strong><\/p>\n\n\n\n<p>A few of these numbers come out from here:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/sqmagazine.co.uk\/ai-cyber-attacks-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/sqmagazine.co.uk\/ai-cyber-attacks-statistics\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.aiacceleratorinstitute.com\/how-ai-is-redefining-cyber-attack-and-defense-strategies\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.aiacceleratorinstitute.com\/how-ai-is-redefining-cyber-attack-and-defense-strategies\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.crowdstrike.com\/en-us\/blog\/crowdstrike-2025-threat-hunting-report-ai-weapon-target\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/www.crowdstrike.com\/en-us\/blog\/crowdstrike-2025-threat-hunting-report-ai-weapon-target\/<\/a><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">In the real world<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The North Korean Connection<\/h3>\n\n\n\n<p>Perhaps no case better illustrates AI weaponization than&nbsp;<strong>FAMOUS CHOLLIMA<\/strong>, a North Korean hacking group that has&nbsp;<strong>infiltrated over 320 companies in the last 12 months \u2014 a 220% year-over-year increase<\/strong>. These operatives use&nbsp;<strong>generative AI to create attractive resumes<\/strong>, deploy&nbsp;<strong>real-time deepfake&nbsp;<\/strong><em>(stay tuned we will talk also about that in a future article)&nbsp;<\/em><strong>technology to mask their true identities in video interviews<\/strong>, and leverage&nbsp;<strong>AI code tools to perform their jobs while funding nuclear weapons programs<\/strong>.<\/p>\n\n\n\n<p>The sophistication is incredible. These aren&#8217;t simple scams \u2014 they&#8217;re&nbsp;<strong>multi-layered operations using &#8220;laptop farms&#8221; in the U.S.<\/strong>&nbsp;to evade geolocation controls, allowing North Korean operatives to work remotely for American companies while remaining physically overseas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The $25 Million Deepfake Robbery<\/h3>\n\n\n\n<p>In what security experts call a watershed moment,&nbsp;<strong>a Hong Kong-based Arup employee was tricked into transferring $25.6 million to fraudsters during a video conference call<\/strong>. Every participant in the meeting was a deep-fake&nbsp;<strong>AI-generated representation of the company&#8217;s CFO and colleagues<\/strong>. The employee initially suspected phishing but was convinced by the realistic video call featuring familiar faces and voices.<\/p>\n\n\n\n<p>This wasn&#8217;t a Hollywood plot. It was a&nbsp;<strong>15-transaction operation across five bank accounts<\/strong>, executed through deepfakes created from&nbsp;<strong>publicly available videos of company executives<\/strong>. The fraud was only discovered when the employee later contacted headquarters for confirmation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malware is Evolving<\/h3>\n\n\n\n<p><strong>BlackMamba<\/strong>&nbsp;represents the new frontier of AI-weaponized malware. This proof-of-concept demonstrates how AI can&nbsp;<strong>re-synthesize its keylogging capability every time it executes<\/strong>, making the malicious component truly polymorphic.&nbsp;<strong>Every execution creates a unique variant<\/strong>, defeating traditional signature-based detection systems.<\/p>\n\n\n\n<p>BlackMamba&#8217;s approach:&nbsp;<em>it&nbsp;<\/em><strong><em>reaches out to OpenAI&#8217;s API at runtime to generate malicious code<\/em><\/strong><em>, then executes it in memory using Python&#8217;s exec() function. To security systems, it appears as benign communication with a high-reputation service<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Acceleration Factor<\/h2>\n\n\n\n<p><strong>WormGPT<\/strong>\u00a0and\u00a0<strong>FraudGPT<\/strong>\u00a0have emerged as the &#8220;<em>dark ChatGPTs<\/em>&#8221; AI tools specifically designed for cybercrime with\u00a0<strong>no ethical guardrails<\/strong>. These platforms, sold as subscription services for\u00a0<strong>$60-$700 monthly<\/strong>, enable even\u00a0<strong>inexperienced cybercriminals to craft sophisticated phishing campaigns and generate malicious code<\/strong>.<\/p>\n\n\n\n<p>The result?\u00a0<strong>A 1,265% increase in AI-driven phishing attempts<\/strong>\u00a0and\u00a0<strong>credential phishing attacks increasing by 703%<\/strong>\u00a0in the second half of 2024 alone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Beyond Traditional Boundaries<\/h2>\n\n\n\n<p>What distinguishes this era is how AI has eliminated traditional friction in cybercrime.\u00a0<strong>The old security advice \u2014 &#8220;spot the typo, spot the scam&#8221; \u2014 is officially obsolete<\/strong>. AI now crafts flawless, hyper-personalized phishing emails that bypass both technical filters and human intuition.<\/p>\n\n\n\n<p>More concerning is the emergence of\u00a0<strong>autonomous AI agents attacking other AI models<\/strong>. These systems can\u00a0<strong>poison synthetic data used to train AI models<\/strong>\u00a0and\u00a0<strong>tamper with open-source models before public release<\/strong>, creating vulnerabilities that activate only after widespread deployment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Response Imperative<\/h2>\n\n\n\n<p>The cybersecurity industry recognizes the magnitude of this, in fact the&nbsp;<strong>AI cybersecurity market is projected to reach $82.56 billion by 2029, growing at a CAG rate of 28%<\/strong>. However,&nbsp;<strong>68% of cyber threat analysts report that traditional threat intelligence is insufficient against AI-accelerated attacks<\/strong>.<\/p>\n\n\n\n<p>This isn&#8217;t merely about upgrading tools, it&#8217;s about&nbsp;<strong>fundamentally rethinking cybersecurity, architecture and models<\/strong>&nbsp;as well as&nbsp;<strong>AI-powered defenses<\/strong>&nbsp;are no longer optional; they&#8217;re essential for survival in an environment where&nbsp;<strong>35% of botnet operations now incorporate machine learning algorithms<\/strong>&nbsp;to evade detection in real-time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Future Curse<\/h2>\n\n\n\n<p>The weaponization of AI represents more than a technological challenge. It&#8217;s an&nbsp;<strong>important<\/strong><strong>change that demands immediate action<\/strong>. Organizations can no longer rely on periodic security reviews or traditional perimeter defenses. The new reality requires&nbsp;<strong>continuous adaptation, AI-powered detection systems, and human-AI collaboration<\/strong>.<\/p>\n\n\n\n<p>As we navigate this weaponization&nbsp;<em>era<\/em>, one thing appears clear, that&nbsp;<strong>the organizations that adapt quickly will survive<\/strong>. And the question isn&#8217;t whether AI will continue to be weaponized, it&#8217;s whether we&#8217;ll be ready when it is.<\/p>\n\n\n\n<p>\ud83d\udd0e Want to dive deeper into real-world cases, stats, and strategies to defend against AI-powered cyberattacks?<\/p>\n\n\n\n<p><a href=\"https:\/\/neverhack.com\/en\/offers\/soc-mssp\">https:\/\/neverhack.com\/en\/offers\/soc-mssp<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/neverhack.com\/en\/offers\/offensive-security\">https:\/\/neverhack.com\/en\/offers\/offensive-security<\/a><\/p>\n\n\n\n<p><em>Raffaele Sarno<\/em><\/p>\n\n\n\n<p>Head Pre-sale Manager, NEVERHACK Security Operation Department, Italy<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybersecurity landscape has entered a dangerous new phase.&nbsp;Artificial intelligence, once pretended to be our digital protector, has become a double-edged sword&nbsp;\u2014 simultaneously strengthening our defenses while arming cybercriminals with unprecedented capabilities. The numbers don&#8217;t lie The statistics offer a sobering picture of our current reality.&nbsp;AI-driven cyberattacks surged by 47% globally in 2025, while&nbsp;68% of &hellip; <a href=\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/\">Continued<\/a><\/p>\n","protected":false},"author":3,"featured_media":709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[12,594],"class_list":["post-120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-incident","tag-forensic","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI as a cyber weapon: the weaponization era | Neverhack<\/title>\n<meta name=\"description\" content=\"AI-driven cyberattacks surged 47% in 2025. Explore how artificial intelligence is being weaponized by cybercriminals and how to defend against it.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Weaponization Era: when AIbecomes a cyber weapon\" \/>\n<meta property=\"og:description\" content=\"AI-driven cyberattacks surged 47% in 2025. Explore how artificial intelligence is being weaponized by cybercriminals and how to defend against it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/\" \/>\n<meta property=\"og:site_name\" content=\"Neverhack\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-18T09:57:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T14:38:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1408\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"J\u00e9r\u00e9my BELLA\u00cfCHE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"J\u00e9r\u00e9my BELLA\u00cfCHE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/\",\"url\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/\",\"name\":\"AI as a cyber weapon: the weaponization era | Neverhack\",\"isPartOf\":{\"@id\":\"https:\/\/neverhack.com\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp\",\"datePublished\":\"2025-10-18T09:57:58+00:00\",\"dateModified\":\"2026-02-25T14:38:52+00:00\",\"author\":{\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/3c4131860387c0b9eda2d96d04fb861a\"},\"description\":\"AI-driven cyberattacks surged 47% in 2025. Explore how artificial intelligence is being weaponized by cybercriminals and how to defend against it.\",\"breadcrumb\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#primaryimage\",\"url\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp\",\"contentUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp\",\"width\":1408,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/neverhack.com\/b\/en\/home-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Weaponization Era: when AIbecomes a cyber weapon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/neverhack.com\/b\/#website\",\"url\":\"https:\/\/neverhack.com\/b\/\",\"name\":\"Neverhack\",\"description\":\"Advanced cybersecurity solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/neverhack.com\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/3c4131860387c0b9eda2d96d04fb861a\",\"name\":\"J\u00e9r\u00e9my BELLA\u00cfCHE\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI as a cyber weapon: the weaponization era | Neverhack","description":"AI-driven cyberattacks surged 47% in 2025. Explore how artificial intelligence is being weaponized by cybercriminals and how to defend against it.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Weaponization Era: when AIbecomes a cyber weapon","og_description":"AI-driven cyberattacks surged 47% in 2025. Explore how artificial intelligence is being weaponized by cybercriminals and how to defend against it.","og_url":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/","og_site_name":"Neverhack","article_published_time":"2025-10-18T09:57:58+00:00","article_modified_time":"2026-02-25T14:38:52+00:00","og_image":[{"width":1408,"height":800,"url":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp","type":"image\/webp"}],"author":"J\u00e9r\u00e9my BELLA\u00cfCHE","twitter_card":"summary_large_image","twitter_misc":{"Written by":"J\u00e9r\u00e9my BELLA\u00cfCHE","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/","url":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/","name":"AI as a cyber weapon: the weaponization era | Neverhack","isPartOf":{"@id":"https:\/\/neverhack.com\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#primaryimage"},"image":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#primaryimage"},"thumbnailUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp","datePublished":"2025-10-18T09:57:58+00:00","dateModified":"2026-02-25T14:38:52+00:00","author":{"@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/3c4131860387c0b9eda2d96d04fb861a"},"description":"AI-driven cyberattacks surged 47% in 2025. Explore how artificial intelligence is being weaponized by cybercriminals and how to defend against it.","breadcrumb":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#primaryimage","url":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp","contentUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-9.webp","width":1408,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/neverhack.com\/b\/en\/blog\/the-weaponization-era-when-aibecomes-a-cyber-weapon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/neverhack.com\/b\/en\/home-en\/"},{"@type":"ListItem","position":2,"name":"The Weaponization Era: when AIbecomes a cyber weapon"}]},{"@type":"WebSite","@id":"https:\/\/neverhack.com\/b\/#website","url":"https:\/\/neverhack.com\/b\/","name":"Neverhack","description":"Advanced cybersecurity solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/neverhack.com\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/3c4131860387c0b9eda2d96d04fb861a","name":"J\u00e9r\u00e9my BELLA\u00cfCHE"}]}},"lang":"en","translations":{"en":120},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":7,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"predecessor-version":[{"id":2071,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/120\/revisions\/2071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media\/709"}],"wp:attachment":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}