{"id":128,"date":"2025-10-18T11:57:58","date_gmt":"2025-10-18T09:57:58","guid":{"rendered":"http:\/\/blog-2025.test\/?p=128"},"modified":"2026-02-12T20:22:16","modified_gmt":"2026-02-12T19:22:16","slug":"automation-connectivity-secure-supply-chains","status":"publish","type":"post","link":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/","title":{"rendered":"Automation and connectivity for secure supply chains"},"content":{"rendered":"\n<p>Cybersecurity Awareness Month 2025: Over 15 years driving B2B data integration and security. Technology is only half of success; the other half lies in people and making the right decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The challenge of digital supply chain security<\/h2>\n\n\n\n<p>In an increasingly interconnected global environment, supply chains are now the operational heart of sectors as diverse as finance, industry, and logistics. Their success depends not only on process efficiency but on the ability to exchange information agilely and securely among partners, suppliers, and customers.<\/p>\n\n\n\n<p>The problem: over 60% of security breaches originate from third-party vulnerabilities. Each B2B integration represents a potential attack surface. A compromised supplier can become the entry point to critical systems, as demonstrated by cases like SolarWinds, Target, or Maersk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">B2B Automation: Reducing human error and risk exposure<\/h2>\n\n\n\n<p><a href=\"https:\/\/neverhack.com\/en\/offers\/secure-file-transfer\">B2B data flow automation<\/a> is already a security differentiator. We&#8217;re not just talking about moving files: it&#8217;s about integrating heterogeneous systems from multiple actors in real-time, minimizing human error and guaranteeing traceability of every transaction.<\/p>\n\n\n\n<p><strong>Security benefits of automation:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Elimination of manual processes<\/strong>&nbsp;that introduce errors and vulnerabilities<\/li>\n\n\n\n<li><strong>Mandatory encryption<\/strong>&nbsp;in every transfer, with no exceptions for &#8220;urgency&#8221;<\/li>\n\n\n\n<li><strong>Complete traceability<\/strong>&nbsp;for audits and post-incident forensic analysis<\/li>\n\n\n\n<li><strong>Anomaly detection<\/strong>&nbsp;in transfer patterns and supplier behavior<\/li>\n\n\n\n<li><strong>Automated response<\/strong>&nbsp;to unauthorized access attempts or suspicious behavior<\/li>\n<\/ol>\n\n\n\n<p>This connectivity enables faster decision-making, reduced response times, and cost optimization, but above all, it significantly reduces the window of threat exposure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Secure MFT and EDI: Technology designed for hostile environments<\/h2>\n\n\n\n<p>After over 15 years of experience in integration, MFT, B2B, and EDI projects and services, we know that technology is only half\u2014or less, in fact\u2014of success. The other half lies in the human factor: constant coordination between business and IT teams, shared vision of objectives, and the ability of authorized voices to make the right decisions at the right time.<\/p>\n\n\n\n<p>Critical differences between basic transfer and enterprise MFT:<\/p>\n\n\n\n<p><strong>Traditional transfer (FTP, basic SFTP):<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Optional encryption or inconsistent implementation<\/li>\n\n\n\n<li>Credentials shared among multiple users<\/li>\n\n\n\n<li>No activity visibility or alerts<\/li>\n\n\n\n<li>Manual or non-existent auditing<\/li>\n\n\n\n<li>Files in clear text during processing<\/li>\n<\/ol>\n\n\n\n<p><strong>Enterprise-grade Managed File Transfer (MFT):<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Mandatory AES-256 + TLS 1.3 encryption in transit and at rest<\/li>\n\n\n\n<li>Certificate-based authentication + MFA<\/li>\n\n\n\n<li>SIEM integration for event correlation<\/li>\n\n\n\n<li>Automatic compliance (PCI-DSS, GDPR, DORA, NIS2)<\/li>\n\n\n\n<li>Anomaly detection and suspicious behavior monitoring<\/li>\n<\/ol>\n\n\n\n<p><strong>Secure EDI in regulated sectors:<\/strong><\/p>\n\n\n\n<p>Traditional <a href=\"https:\/\/neverhack.com\/en\/offers\/secure-file-transfer\">EDI protocols<\/a> were not designed with cybersecurity in mind. The solution is not to abandon them, but to implement them within secure tunnels:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>AS2 with digital certificates<\/strong>: Signature and encryption for each document<\/li>\n\n\n\n<li><strong>OFTP2 with TLS<\/strong>: European protocol with integrated security<\/li>\n\n\n\n<li><strong>REST APIs with OAuth 2.0<\/strong>: Granular access control and short-lived tokens<\/li>\n\n\n\n<li><strong>Mandatory schema validation<\/strong>: Prevention of injections and malicious payloads<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Operational and security risks without proper automation<\/h2>\n\n\n\n<p><strong>Not only in financial institutions, but also in companies across all sectors<\/strong>, dependence on manual processes, lack of visibility, or resistance to adopting secure integration standards end up generating&nbsp;<strong>critical bottlenecks<\/strong>:<\/p>\n\n\n\n<p><strong>Exposure to specific threats:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Man-in-the-Middle<\/strong>: Interception of communications without adequate encryption<\/li>\n\n\n\n<li><strong>Credential stuffing<\/strong>: Reuse of compromised credentials<\/li>\n\n\n\n<li><strong>Malware in EDI files<\/strong>: Malicious payloads in seemingly legitimate XML or JSON documents<\/li>\n\n\n\n<li><strong>Lateral access<\/strong>: Compromised supplier as gateway to internal network<\/li>\n\n\n\n<li><a href=\"https:\/\/neverhack.com\/en\/offers\/data-security\"><strong>Data exfiltration<\/strong>:<\/a> Unauthorized transfers without detection<\/li>\n\n\n\n<li><strong>Ransomware<\/strong>: Propagation through integrations without segmentation<\/li>\n<\/ol>\n\n\n\n<p><strong>Operational and regulatory consequences:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Delays in audits and compliance processes<\/li>\n\n\n\n<li>Supply interruptions affecting business continuity<\/li>\n\n\n\n<li>Unnecessary exposure to cybersecurity risks<\/li>\n\n\n\n<li><a href=\"https:\/\/neverhack.com\/en\/offers\/grc-center\">Regulatory sanctions <\/a>(DORA, NIS2, GDPR) for inadequate third-party management<\/li>\n\n\n\n<li>Loss of customer trust and reputational damage<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Implementing Zero Trust in B2B ecosystems<\/h2>\n\n\n\n<p><strong>B2B integration and Managed File Transfer (MFT) solutions<\/strong>&nbsp;address these challenges by combining automation, advanced encryption, continuous monitoring, and compliance with regulatory standards.<\/p>\n\n\n\n<p><strong>Zero Trust principles applied to supply chains:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Microsegmentation by supplier<\/strong>: Each business partner in its own network segment, limiting the blast radius in case of compromise.<\/li>\n\n\n\n<li><strong>Continuous verification<\/strong>: Authenticating once is not enough. Each transaction validates identity through certificates, short-lived tokens, and behavior analysis.<\/li>\n\n\n\n<li><strong>Least privilege<\/strong>: Granular permissions per specific data flow, without access to unrelated systems.<\/li>\n\n\n\n<li><strong>Payload inspection<\/strong>: Schema validation, malicious signature analysis, and sandboxing when necessary.<\/li>\n\n\n\n<li><strong>Telemetry and response<\/strong>: Enriched logs integrated with SIEM, anomaly alerts, and automated blocking capability.<\/li>\n<\/ol>\n\n\n\n<p>The result is a&nbsp;<strong>substantial reduction in operational risk<\/strong>: less exposure to cyberattacks, fewer service interruptions, and a more solid experience for all links in the chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance as implementation driver<\/h2>\n\n\n\n<p>Regulations that make B2B security mandatory:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>DORA (Digital Operational Resilience Act)<\/strong>: Requires financial institutions to manage digital supplier risk with demonstrable controls.<\/li>\n\n\n\n<li><strong>NIS2<\/strong>: Critical sectors must secure digital supply chains. Fines up to \u20ac10M or 2% of global revenue.<\/li>\n\n\n\n<li><strong>PCI-DSS 4.0<\/strong>: Expanded requirements on managing suppliers that process payment data.<\/li>\n\n\n\n<li><strong>GDPR<\/strong>: Processing responsibility includes breaches in processors and suppliers.<\/li>\n<\/ol>\n\n\n\n<p>For CISOs and security leaders, implementing secure MFT and EDI is not just good practice: it&#8217;s a regulatory requirement with measurable financial and legal consequences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reference architecture for secure integrations<\/h2>\n\n\n\n<p>Recommended stack:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>B2B integration gateway in DMZ<\/strong>: Traffic inspection with IDS\/IPS, WAF for APIs, DDoS protection.<\/li>\n\n\n\n<li><strong>Hardened MFT platform<\/strong>: At-rest encryption with HSM\/KMS, mandatory in-transit encryption, certificate-based authentication.<\/li>\n\n\n\n<li><strong>Validation and translation<\/strong>: Secure format parsing, mandatory schema validation, input sanitization.<\/li>\n\n\n\n<li><strong>Segmented integration<\/strong>: Internal APIs with separate authentication, rate limiting per supplier, detailed logs to SIEM.<\/li>\n\n\n\n<li><strong>Observability<\/strong>: Health dashboards, ML alerts for deviations, automated runbooks.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The human factor in the security equation<\/h2>\n\n\n\n<p>Experience implementing B2B integration projects across multiple sectors demonstrates that the most advanced technology fails in the face of inadequate organizational decisions.<\/p>\n\n\n\n<p><strong>Frequent problems observed:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>MFT projects disabled because they &#8220;slow down processes,&#8221; without measuring risk<\/li>\n\n\n\n<li>Digital certificates expired for months due to lack of clear ownership<\/li>\n\n\n\n<li>Hardcoded credentials in &#8220;temporary&#8221; scripts that have been in production for years<\/li>\n\n\n\n<li>Shadow IT: suppliers using insecure tools because the official process is complex<\/li>\n<\/ol>\n\n\n\n<p><strong>What really works:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Security champions in integration teams: Bridge between IT, Security, and Business speaking the same language.<\/li>\n\n\n\n<li>Specific threat modeling: Regular exercises of &#8220;what if this supplier gets compromised?&#8221;<\/li>\n\n\n\n<li>B2B incident response playbooks: Clear procedures to isolate compromised suppliers.<\/li>\n\n\n\n<li>Relevant metrics: MTTR in supply chain, percentage of encrypted integrations, monitoring coverage.<\/li>\n\n\n\n<li>Executive buy-in: Budget and decisions that back up words about security priority.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Building resilient B2B ecosystems<\/h2>\n\n\n\n<p>At Neverhack, we don&#8217;t seek to earn our clients&#8217; trust with empty commercial messages, but with facts: working every day so that technology and people achieve the greatest efficiency together. If you want more information about our supply chain solutions, don&#8217;t hesitate to\u00a0contact us.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Awareness Month 2025: Over 15 years driving B2B data integration and security. Technology is only half of success; the other half lies in people and making the right decisions. The challenge of digital supply chain security In an increasingly interconnected global environment, supply chains are now the operational heart of sectors as diverse as &hellip; <a href=\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/\">Continued<\/a><\/p>\n","protected":false},"author":2,"featured_media":701,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20],"tags":[12,13,11],"class_list":["post-128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-regulation","tag-forensic","tag-neverhack","tag-resilience"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Automation and connectivity for secure supply chains - Neverhack<\/title>\n<meta name=\"description\" content=\"Secure your digital supply chain with enterprise MFT, Zero Trust, and B2B automation. Stay compliant with DORA, NIS2, and GDPR.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automation and connectivity for secure supply chains\" \/>\n<meta property=\"og:description\" content=\"Secure your digital supply chain with enterprise MFT, Zero Trust, and B2B automation. Stay compliant with DORA, NIS2, and GDPR.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/\" \/>\n<meta property=\"og:site_name\" content=\"Neverhack\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-18T09:57:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T19:22:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1408\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Elia PEREZ\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elia PEREZ\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/\",\"url\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/\",\"name\":\"Automation and connectivity for secure supply chains - Neverhack\",\"isPartOf\":{\"@id\":\"https:\/\/neverhack.com\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp\",\"datePublished\":\"2025-10-18T09:57:58+00:00\",\"dateModified\":\"2026-02-12T19:22:16+00:00\",\"author\":{\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/b4de59407b7bd9eef77dc35acd594ab0\"},\"description\":\"Secure your digital supply chain with enterprise MFT, Zero Trust, and B2B automation. Stay compliant with DORA, NIS2, and GDPR.\",\"breadcrumb\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#primaryimage\",\"url\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp\",\"contentUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp\",\"width\":1408,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/neverhack.com\/b\/en\/home-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automation and connectivity for secure supply chains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/neverhack.com\/b\/#website\",\"url\":\"https:\/\/neverhack.com\/b\/\",\"name\":\"Neverhack\",\"description\":\"Advanced cybersecurity solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/neverhack.com\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/neverhack.com\/b\/#\/schema\/person\/b4de59407b7bd9eef77dc35acd594ab0\",\"name\":\"Elia PEREZ\",\"description\":\"Chief Product Officer at Neverhack, Elia shapes the vision and product strategy of the company\u2019s cybersecurity ecosystem. Combining design, technology, and clarity, he turns complex security challenges into accessible and meaningful experiences.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Automation and connectivity for secure supply chains - Neverhack","description":"Secure your digital supply chain with enterprise MFT, Zero Trust, and B2B automation. Stay compliant with DORA, NIS2, and GDPR.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Automation and connectivity for secure supply chains","og_description":"Secure your digital supply chain with enterprise MFT, Zero Trust, and B2B automation. Stay compliant with DORA, NIS2, and GDPR.","og_url":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/","og_site_name":"Neverhack","article_published_time":"2025-10-18T09:57:58+00:00","article_modified_time":"2026-02-12T19:22:16+00:00","og_image":[{"width":1408,"height":800,"url":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp","type":"image\/webp"}],"author":"Elia PEREZ","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elia PEREZ","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/","url":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/","name":"Automation and connectivity for secure supply chains - Neverhack","isPartOf":{"@id":"https:\/\/neverhack.com\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#primaryimage"},"image":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#primaryimage"},"thumbnailUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp","datePublished":"2025-10-18T09:57:58+00:00","dateModified":"2026-02-12T19:22:16+00:00","author":{"@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/b4de59407b7bd9eef77dc35acd594ab0"},"description":"Secure your digital supply chain with enterprise MFT, Zero Trust, and B2B automation. Stay compliant with DORA, NIS2, and GDPR.","breadcrumb":{"@id":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#primaryimage","url":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp","contentUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2025\/10\/image-1018-1.webp","width":1408,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/neverhack.com\/b\/en\/blog\/automation-connectivity-secure-supply-chains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/neverhack.com\/b\/en\/home-en\/"},{"@type":"ListItem","position":2,"name":"Automation and connectivity for secure supply chains"}]},{"@type":"WebSite","@id":"https:\/\/neverhack.com\/b\/#website","url":"https:\/\/neverhack.com\/b\/","name":"Neverhack","description":"Advanced cybersecurity solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/neverhack.com\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/neverhack.com\/b\/#\/schema\/person\/b4de59407b7bd9eef77dc35acd594ab0","name":"Elia PEREZ","description":"Chief Product Officer at Neverhack, Elia shapes the vision and product strategy of the company\u2019s cybersecurity ecosystem. Combining design, technology, and clarity, he turns complex security challenges into accessible and meaningful experiences."}]}},"lang":"en","translations":{"en":128},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":6,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/128\/revisions"}],"predecessor-version":[{"id":2727,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/posts\/128\/revisions\/2727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media\/701"}],"wp:attachment":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media?parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/categories?post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/tags?post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}