
{"id":5083,"date":"2019-03-05T11:05:52","date_gmt":"2019-03-05T14:05:52","guid":{"rendered":"https:\/\/www.talsoft.com.ar\/site\/?page_id=5083"},"modified":"2020-08-18T16:39:06","modified_gmt":"2020-08-18T19:39:06","slug":"red-team-service","status":"publish","type":"page","link":"https:\/\/www.talsoft.com.ar\/site\/en\/red-team-service\/","title":{"rendered":"Red Team Service"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_fullwidth_post_title _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; meta=\u00bboff\u00bb featured_image=\u00bboff\u00bb][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb3.22&#8243;][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb3.25&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb3.27.4&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb]<\/p>\n<p><span lang=\"en-US\">The <\/span><span lang=\"en-US\"><strong>Red Team Talsoft TS <\/strong><\/span><strong><span lang=\"en-US\">allows to <\/span><span lang=\"en-US\">simulate an agent that makes attacks on corporate systems contemplating vectors of attacks at a digital, physical and human level of the company<\/span><\/strong><span lang=\"en-US\">, persistence is carried out over time, privilege escalation in corporate systems and even alteration and theft of strategic information for the business, <\/span><span lang=\"en-US\">in<strong> the same way that an intruder would do it but in an ethical manner<\/strong><\/span><span lang=\"en-US\"><strong>, with prior authorization and agreement of a confidentiality agreement<\/strong>.<\/span><\/p>\n<p><span lang=\"en-US\">The <\/span><strong><span lang=\"en-US\">Red Team T<\/span><span lang=\"en-US\">alsoft TS<\/span><\/strong><span lang=\"en-US\"><strong> periodically reports discoveries<\/strong>, so that you will always be aware of the progress on the operation of the client&#8217;s defense team.<\/span><\/p>\n<p><strong>The investment made by the company with our services, minimizes the loss of money and maximizes profits, even when cyber attacks occur<\/strong>. It will<strong> increase its image, prestige, loyalty<\/strong> because it will protect confidential information and the <strong>relationship with customers, investors, suppliers<\/strong>.<\/p>\n<p>We guarantee that with our services, <strong>you will be able to control and know the state of the computer security of your company and concentrate on the growth and prosperity of your business<\/strong>. <strong>Our professionals work in a traditional way, in the same way as an intruder but in an authorized way<\/strong>. Computer security experts will be available to help you in responding to incidents and taking decisions in a personalized way.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"tlid-translation translation\"><span class=\"\" title=\"\">CAT (Cyber Attack Taxonomy)<br \/><\/span><\/span><\/h2>\n<p align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Open Sans, sans-serif;\"><span style=\"font-size: small;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-5372 aligncenter\" src=\"https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-1024x576.jpg\" alt=\"\" width=\"960\" height=\"540\" srcset=\"https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-1024x576.jpg 1024w, https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-300x169.jpg 300w, https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-400x225.jpg 400w, https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-768x432.jpg 768w, https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-260x146.jpg 260w, https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN.jpg 1363w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>\u00a0<\/span><\/span><\/span><\/p>\n<h3 style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\"><span class=\"tlid-translation translation\"><span title=\"\">It&#8217;s time to start protecting your business.<\/span> <span class=\"\" title=\"\">Get your personalized quote at no cost with our experts, right now &#8230;<\/span><\/span><\/span><\/strong><\/h3>\n<p style=\"text-align: center;\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; next_background_color=\u00bb#ffffff\u00bb admin_label=\u00bbFeedback\u00bb _builder_version=\u00bb4.5.6&#8243; use_background_color_gradient=\u00bbon\u00bb background_color_gradient_start=\u00bb#cb0519&#8243; background_color_gradient_end=\u00bb#ffffff\u00bb background_color_gradient_direction=\u00bb243deg\u00bb background_color_gradient_start_position=\u00bb49%\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-12.png\u00bb background_size=\u00bbcontain\u00bb background_position=\u00bbtop_left\u00bb min_height=\u00bb1549px\u00bb overflow-x=\u00bbhidden\u00bb overflow-y=\u00bbhidden\u00bb custom_margin=\u00bb||\u00bb custom_padding=\u00bb13vw|||||\u00bb top_divider_height=\u00bb26vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_style=\u00bbasymmetric\u00bb bottom_divider_height=\u00bb22vw\u00bb collapsed=\u00bbon\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.5.6&#8243;][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25.3&#8243;][et_pb_testimonial author=\u00bbDavid Casta\u00f1eda\u00bb company_name=\u00bbProyectos Millennium\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto4.jpeg\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||73px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Very grateful, a very professional service and with immediate results on a very sensitive issue, such as computer security.<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=\u00bbRodrigo Alfaro \u00bb job_title=\u00bbCEO\u00bb company_name=\u00bbGemforce\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto5.jpeg\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abWe were receiving attacks on our website, from the moment we contacted Talsoft they attended us instantly and were involved in solving the problem, what impressed me the most was their availability and determination to help us solve the problem.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial company_name=\u00bbAvisLatam\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto1.jpeg\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||96px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abThey delivered a quality service and accommodated the project delivery times, as they were quite limited.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25.3&#8243; custom_padding=\u00bb||\u00bb][et_pb_testimonial author=\u00bbCarlos Bergia\u00bb job_title=\u00bbSysAdmin\u00bb company_name=\u00bbWcentrix\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto3.jpeg\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abVery easy to contact Talsoft, either by mail or skype, communication was very fast. With regard to vulnerability scanning, very satisfied with the tool.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_testimonial author=\u00bbRicardo May\u00bb company_name=\u00bbNexuscom Arg.\u00bb portrait_url=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/foto2.jpeg\u00bb _builder_version=\u00bb4.5.6&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbrgba(0,0,0,0)\u00bb background_image=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2014\/05\/bg_talsoft_1354x619.jpg\u00bb custom_padding=\u00bb||70px|||\u00bb border_radii=\u00bbon|20px|20px|20px|20px\u00bb]<\/p>\n<p><span class=\"tlid-translation translation\"><span title=\"\"><\/span><\/span><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">\u00abWith your consulting services we managed to improve the computer security of our systems, allowing us to reach a level of excellence and thus certify PCI-DSS.\u00bb<\/span><\/span><\/p>\n<p>[\/et_pb_testimonial][et_pb_text _builder_version=\u00bb4.5.6&#8243; text_font=\u00bb||||||||\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_layout=\u00bbdark\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb]<\/p>\n<h3><\/h3>\n<h2><span style=\"font-size: xx-large;\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">Why control and know the computer security of your company?<\/span><\/span><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_divider color=\u00bb#00b4ff\u00bb divider_weight=\u00bb2px\u00bb _builder_version=\u00bb3.25.1&#8243; width=\u00bb100px\u00bb custom_margin=\u00bb||0px\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.5.6&#8243; text_font=\u00bbOverpass|300|||||||\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb background_layout=\u00bbdark\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb]<\/p>\n<div class=\"text-wrap tlid-copy-target\">\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\"><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\" class=\"\">The main consequences for your business in a computer attack, causes loss of money, information theft, image \/ reputation damage, legal problems.<\/span><\/span><span class=\"tlid-translation-gender-indicator translation-gender-indicator\"><\/span><\/div>\n<\/div>\n<div class=\"tlid-result-transliteration-container result-transliteration-container transliteration-container\">\n<div class=\"tlid-transliteration-content transliteration-content full\"><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjkwNyJ9fQ==@\u00bb button_text=\u00bbContact Us\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.5.6&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb19px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bbrgba(0,0,0,0)\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bb#ffffff\u00bb button_border_radius=\u00bb100px\u00bb button_font=\u00bbOverpass|900||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_padding=\u00bb17px|52px|17px|52px|true|true\u00bb box_shadow_style=\u00bbpreset3&#8243; box_shadow_vertical=\u00bb0px\u00bb box_shadow_blur=\u00bb0px\u00bb box_shadow_spread=\u00bb-10px\u00bb box_shadow_color=\u00bbrgba(25,114,255,0.4)\u00bb locked=\u00bboff\u00bb box_shadow_color__hover=\u00bb#2585b2&#8243; box_shadow_blur__hover_enabled=\u00bbon\u00bb box_shadow_blur__hover=\u00bb40px\u00bb box_shadow_vertical__hover_enabled=\u00bbon\u00bb box_shadow_vertical__hover=\u00bb10px\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb3.25.3&#8243; custom_padding=\u00bb0px||0px|||\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25.3&#8243;][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25.3&#8243;][et_pb_image src=\u00bbhttps:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2020\/08\/cyber-security-15.jpg\u00bb _builder_version=\u00bb3.25.3&#8243; transform_scale_tablet=\u00bb100%|100%\u00bb transform_scale_phone=\u00bb\u00bb transform_scale_last_edited=\u00bbon|desktop\u00bb transform_translate=\u00bb10vw|0px\u00bb transform_translate_tablet=\u00bb0vw|0vw\u00bb transform_translate_phone=\u00bb\u00bb transform_translate_last_edited=\u00bbon|desktop\u00bb transform_translate_linked=\u00bboff\u00bb transform_rotate=\u00bb0deg|0deg|318deg\u00bb transform_rotate_tablet=\u00bb0deg|0deg|14deg\u00bb transform_rotate_phone=\u00bb\u00bb transform_rotate_last_edited=\u00bbon|desktop\u00bb transform_skew_tablet=\u00bb\u00bb transform_skew_phone=\u00bb\u00bb transform_skew_last_edited=\u00bbon|desktop\u00bb transform_origin_tablet=\u00bb\u00bb transform_origin_phone=\u00bb\u00bb transform_origin_last_edited=\u00bbon|desktop\u00bb transform_styles_last_edited=\u00bbon|desktop\u00bb custom_margin=\u00bb|-30vw|8vw||false\u00bb transform_styles_tablet=\u00bb\u00bb transform_styles_phone=\u00bb\u00bb border_radii=\u00bbon|500px|500px|500px|500px\u00bb locked=\u00bboff\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Red Team Talsoft TS allows to simulate an agent that makes attacks on corporate systems contemplating vectors of attacks at a digital, physical and human level of the company, persistence is carried out over time, privilege escalation in corporate systems and even alteration and theft of strategic information for the business, in the same [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<span lang=\"en-US\">The <\/span><span lang=\"en-US\"><strong>Red Team Talsoft TS <\/strong><\/span><strong><span lang=\"en-US\">allows to <\/span><span lang=\"en-US\">simulate an agent that makes attacks on corporate systems contemplating vectors of attacks at a digital, physical and human level of the company<\/span><\/strong><span lang=\"en-US\">, persistence is carried out over time, privilege escalation in corporate systems and even alteration and theft of strategic information for the business, <\/span><span lang=\"en-US\">in<strong> the same way that an intruder would do it but in an ethical manner<\/strong><\/span><span lang=\"en-US\"><strong>, with prior authorization and agreement of a confidentiality agreement<\/strong>.<\/span>\n\n<span lang=\"en-US\">The <\/span><strong><span lang=\"en-US\">Red Team T<\/span><span lang=\"en-US\">alsoft TS<\/span><\/strong><span lang=\"en-US\"><strong> periodically reports discoveries<\/strong>, so that you will always be aware of the progress on the operation of the client's defense team.<\/span>\n\n<strong>The investment made by the company with our services, minimizes the loss of money and maximizes profits, even when cyber attacks occur<\/strong>. It will<strong> increase its image, prestige, loyalty<\/strong> because it will protect confidential information and the <strong>relationship with customers, investors, suppliers<\/strong>.\n\nWe guarantee that with our services, <strong>you will be able to control and know the state of the computer security of your company and concentrate on the growth and prosperity of your business<\/strong>. <strong>Our professionals work in a traditional way, in the same way as an intruder but in an authorized way<\/strong>. Computer security experts will be available to help you in responding to incidents and taking decisions in a personalized way.\n\n[tw_divider type=\"line\" height=\"20\"]\n\n[tw_pricing_table column=\"1\" price_category_list=\"siaas\"]\n\n[tw_divider type=\"line\" height=\"40\"]\n<h2><span class=\"tlid-translation translation\"><span class=\"\" title=\"\">Know the opinion of our clients<\/span><\/span><\/h2>\n[tw_divider type=\"space\" height=\"20\"]\n\n[tw_testimonials test_style=\"style_2\" category_ids=\"\" count=\"5\" bg_color=\" \" text_color=\" \" name_color=\" \" direction=\"right\" duration=\"1000\" timeout=\"2000\"]\n\n[tw_divider type=\"space\" height=\"20\"]\n<h2><span class=\"tlid-translation translation\"><span class=\"\" title=\"\">CAT (Cyber Attack Taxonomy)\n<\/span><\/span><\/h2>\n<p align=\"justify\"><span style=\"color: #000000;\"><span style=\"font-family: Open Sans, sans-serif;\"><span style=\"font-size: small;\"><img class=\"size-large wp-image-5372 aligncenter\" src=\"https:\/\/www.talsoft.com.ar\/site\/wp-content\/uploads\/2019\/10\/CAT-V1.0-EN-1024x576.jpg\" alt=\"\" width=\"960\" height=\"540\" \/>\u00a0<\/span><\/span><\/span><\/p>\n\n<h3 style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\"><span class=\"tlid-translation translation\"><span title=\"\">It's time to start protecting your business.<\/span> <span class=\"\" title=\"\">Get your personalized quote at no cost with our experts, right now ...<\/span><\/span><\/span><\/strong><\/h3>\n<p style=\"text-align: center;\">[tw_button icon=\"\" link=\"http:\/\/www.talsoft.com.ar\/site\/contact-us\/\" size=\"medium\" rounded=\"true\" style=\"flat\" hover=\"default\" color=\"#f01d1d\" target=\"_blank\"]Get a Quote[\/tw_button]<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-5083","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/5083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=5083"}],"version-history":[{"count":9,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/5083\/revisions"}],"predecessor-version":[{"id":6426,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/pages\/5083\/revisions\/6426"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=5083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}