{"id":4820,"date":"2026-01-20T14:50:35","date_gmt":"2026-01-20T12:50:35","guid":{"rendered":"https:\/\/altanet.ro\/?p=4820"},"modified":"2026-04-14T14:11:54","modified_gmt":"2026-04-14T11:11:54","slug":"supply-chain-attacks-atac-lant-aprovizionare-securitate","status":"publish","type":"post","link":"https:\/\/altanet.ro\/en\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/","title":{"rendered":"Supply Chain Attacks: When you are attacked by the suppliers you trust the most"},"content":{"rendered":"<p>Imagine that you have installed the most expensive armored door at the entrance to your company, you have cameras and guards. No one can enter uninvited. But what do you do if the thief is the very plumber you called to fix the sink and to whom you willingly opened the door?<\/p>\n<p class=\"translation-block\">In the digital world, this scenario is called a <strong>Supply Chain Attack<\/strong>. In 2026, hackers have understood that large companies are difficult to break directly, so they attack easier targets: their software suppliers. At <strong>Altanet Craiova<\/strong> we believe this is one of the most insidious risks for today's business environment.<\/p>\n<h2><span style=\"color: #0088cc;\"><strong>What does a supply chain attack mean?<\/strong><\/span><\/h2>\n<p>Modern companies don't build all their software from scratch. We use dozens of \"ready-made\" programs: accounting applications, website plugins, printer drivers, or network monitoring platforms.<\/p>\n<p>Hackers don't attack you. They break into the servers of the company that produces that software (the vendor) and infect the next update. You, being a conscientious customer, do your update thinking it's for your own good. In reality, you've just installed the virus yourself into the heart of your system.<\/p>\n<h3><strong>Why is it so dangerous?<\/strong><\/h3>\n<p>This type of attack bypasses almost all classic security measures:<\/p>\n<ul>\n<li class=\"translation-block\"><strong>Blind Trust:<\/strong> Your antivirus trusts software digitally signed by large manufacturers (such as Microsoft, Adobe, or local ERP vendors). If the source is compromised, the antivirus will not detect anything suspicious initially.<\/li>\n<li class=\"translation-block\"><strong>Privileged Access:<\/strong> Maintenance or administration programs usually run with maximum privileges (Administrator). Once infected, they give hackers the keys to the entire kingdom.<\/li>\n<\/ul>\n<h2><strong>How do you protect yourself from your own suppliers?<\/strong><\/h2>\n<p>It's difficult, but not impossible. You need to adopt a \"Zero Trust\" mentality:<\/p>\n<ul>\n<li class=\"translation-block\"><strong>Software Inventory:<\/strong> You need to know exactly what software is running in your company and who makes it. Are you using an obscure WordPress plugin made by a student? That's a weak point.<\/li>\n<li class=\"translation-block\"><strong>Behavior Monitoring:<\/strong> Even if a program is \u201ctrustworthy,\u201d if it suddenly starts sending data to a server in Russia or China in the middle of the night, it should be blocked immediately. Endpoint Detection and Response (EDR) tools do exactly that.<\/li>\n<li class=\"translation-block\"><strong>Network segmentation:<\/strong> Don't let the print server communicate with the database server. If the print provider is compromised, hackers will remain isolated there.<\/li>\n<\/ul>\n<p class=\"translation-block\">To see concrete examples and understand the mechanics behind these incidents, you can read the explanations in the <a href=\"https:\/\/www.cloudflare.com\/learning\/security\/what-is-a-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener\">Cloudflare's Learning Center on Supply Chain Attacks<\/a>.<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Your security is only as strong as the weakest link in your supply chain. It's not enough to protect yourself; you must demand high standards from everyone you work with.<\/p>\n<p class=\"translation-block\">Do you want to know if your network is ready to detect suspicious activities coming from the inside? We offer advanced monitoring solutions and proactive <a href=\"https:\/\/altanet.ro\/en\/servicii-it\/\" target=\"_self\">IT services<\/a>. Visit our <a href=\"https:\/\/magazin.altanet.ro\/contact\" target=\"_self\">contact<\/a> page and let's secure the entire chain.<\/p>\n<hr \/>\n<p class=\"translation-block\"><em>This material is part of Altanet's educational series on digital security. Want to know what other risks you are exposed to this year? See <a href=\"https:\/\/altanet.ro\/en\/2026\/01\/13\/lista-ameintari-cibernetice-2026-rezumat\/\" target=\"_self\">Complete list of cyber threats in 2026<\/a>.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Has your supplier been hacked? Learn what Supply Chain Attacks are and how hackers break in through trusted applications.<\/p>","protected":false},"author":2,"featured_media":4822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[325,52,329,328,327,324,323,326],"class_list":["post-4820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securitate-cibernetica","tag-actualizari-infectate","tag-altanet-craiova","tag-cybersecurity","tag-protectie-retea","tag-riscuri-furnizori","tag-securitate-software","tag-supply-chain-attacks","tag-zero-trust"],"featured_image_src":{"landsacpe":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-1140x445.jpg",1140,445,true],"list":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-463x348.jpg",463,348,true],"medium":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-300x164.jpg",300,164,true],"full":["https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg",2560,1396,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Supply Chain Attacks: Cand esti atacat prin softurile de incredere<\/title>\n<meta name=\"description\" content=\"Furnizorul tau a fost spart? Afla ce sunt Supply Chain Attacks si cum hackerii intra prin aplicatiile de incredere.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/altanet.ro\/en\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Attacks: Cand esti atacat prin softurile de incredere\" \/>\n<meta property=\"og:description\" content=\"Furnizorul tau a fost spart? Afla ce sunt Supply Chain Attacks si cum hackerii intra prin aplicatiile de incredere.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/altanet.ro\/en\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/\" \/>\n<meta property=\"og:site_name\" content=\"Altanet\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-20T12:50:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T11:11:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1396\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cristi Nefiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cristi Nefiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/\"},\"author\":{\"name\":\"Cristi Nefiru\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/#\\\/schema\\\/person\\\/c700a208fcd09d44b3b512626fac4be1\"},\"headline\":\"Supply Chain Attacks: Cand esti atacat prin furnizorii in care ai cea mai mare incredere\",\"datePublished\":\"2026-01-20T12:50:35+00:00\",\"dateModified\":\"2026-04-14T11:11:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/\"},\"wordCount\":524,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg\",\"keywords\":[\"Actualizari Infectate\",\"Altanet Craiova\",\"Cybersecurity\",\"Protectie Retea\",\"Riscuri Furnizori\",\"Securitate Software\",\"Supply Chain Attacks\",\"Zero Trust\"],\"articleSection\":[\"Securitate cibernetica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/\",\"url\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/\",\"name\":\"Supply Chain Attacks: Cand esti atacat prin softurile de incredere\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg\",\"datePublished\":\"2026-01-20T12:50:35+00:00\",\"dateModified\":\"2026-04-14T11:11:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/#\\\/schema\\\/person\\\/c700a208fcd09d44b3b512626fac4be1\"},\"description\":\"Furnizorul tau a fost spart? Afla ce sunt Supply Chain Attacks si cum hackerii intra prin aplicatiile de incredere.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/altanet.ro\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg\",\"width\":2560,\"height\":1396,\"caption\":\"Ilustratie izometrica cu o banda transportoare care introduce pachete de software intr-o cetate unul dintre ele fiind un cal troian simbolizand atacul Supply Chain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/2026\\\/01\\\/20\\\/supply-chain-attacks-atac-lant-aprovizionare-securitate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\\\/\\\/altanet.ro\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain Attacks: Cand esti atacat prin furnizorii in care ai cea mai mare incredere\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/#website\",\"url\":\"https:\\\/\\\/altanet.ro\\\/\",\"name\":\"Altanet\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/altanet.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/altanet.ro\\\/#\\\/schema\\\/person\\\/c700a208fcd09d44b3b512626fac4be1\",\"name\":\"Cristi Nefiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g\",\"caption\":\"Cristi Nefiru\"},\"url\":\"https:\\\/\\\/altanet.ro\\\/en\\\/author\\\/cristi-nefiru\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Attacks: Cand esti atacat prin softurile de incredere","description":"Has your supplier been hacked? Learn what Supply Chain Attacks are and how hackers break in through trusted applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/altanet.ro\/en\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Attacks: Cand esti atacat prin softurile de incredere","og_description":"Furnizorul tau a fost spart? Afla ce sunt Supply Chain Attacks si cum hackerii intra prin aplicatiile de incredere.","og_url":"https:\/\/altanet.ro\/en\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/","og_site_name":"Altanet","article_published_time":"2026-01-20T12:50:35+00:00","article_modified_time":"2026-04-14T11:11:54+00:00","og_image":[{"width":2560,"height":1396,"url":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg","type":"image\/jpeg"}],"author":"Cristi Nefiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cristi Nefiru","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#article","isPartOf":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/"},"author":{"name":"Cristi Nefiru","@id":"https:\/\/altanet.ro\/#\/schema\/person\/c700a208fcd09d44b3b512626fac4be1"},"headline":"Supply Chain Attacks: Cand esti atacat prin furnizorii in care ai cea mai mare incredere","datePublished":"2026-01-20T12:50:35+00:00","dateModified":"2026-04-14T11:11:54+00:00","mainEntityOfPage":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/"},"wordCount":524,"commentCount":0,"image":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#primaryimage"},"thumbnailUrl":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg","keywords":["Actualizari Infectate","Altanet Craiova","Cybersecurity","Protectie Retea","Riscuri Furnizori","Securitate Software","Supply Chain Attacks","Zero Trust"],"articleSection":["Securitate cibernetica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/","url":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/","name":"Supply Chain Attacks: Cand esti atacat prin softurile de incredere","isPartOf":{"@id":"https:\/\/altanet.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#primaryimage"},"image":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#primaryimage"},"thumbnailUrl":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg","datePublished":"2026-01-20T12:50:35+00:00","dateModified":"2026-04-14T11:11:54+00:00","author":{"@id":"https:\/\/altanet.ro\/#\/schema\/person\/c700a208fcd09d44b3b512626fac4be1"},"description":"Has your supplier been hacked? Learn what Supply Chain Attacks are and how hackers break in through trusted applications.","breadcrumb":{"@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#primaryimage","url":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg","contentUrl":"https:\/\/altanet.ro\/wp-content\/uploads\/2026\/01\/supply-chain-attacks-cand-esti-atacat-prin-softurile-de-incredere-v2-scaled.jpg","width":2560,"height":1396,"caption":"Ilustratie izometrica cu o banda transportoare care introduce pachete de software intr-o cetate unul dintre ele fiind un cal troian simbolizand atacul Supply Chain"},{"@type":"BreadcrumbList","@id":"https:\/\/altanet.ro\/2026\/01\/20\/supply-chain-attacks-atac-lant-aprovizionare-securitate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/altanet.ro\/"},{"@type":"ListItem","position":2,"name":"Supply Chain Attacks: Cand esti atacat prin furnizorii in care ai cea mai mare incredere"}]},{"@type":"WebSite","@id":"https:\/\/altanet.ro\/#website","url":"https:\/\/altanet.ro\/","name":"Altanet","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/altanet.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/altanet.ro\/#\/schema\/person\/c700a208fcd09d44b3b512626fac4be1","name":"Cristi Nefiru","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b792a51bbc1c34dea33b26c5a3a2001fece19940e3ad78619f715f6b141d0a33?s=96&d=mm&r=g","caption":"Cristi Nefiru"},"url":"https:\/\/altanet.ro\/en\/author\/cristi-nefiru\/"}]}},"_links":{"self":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts\/4820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/comments?post=4820"}],"version-history":[{"count":4,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts\/4820\/revisions"}],"predecessor-version":[{"id":5435,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/posts\/4820\/revisions\/5435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/media\/4822"}],"wp:attachment":[{"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/media?parent=4820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/categories?post=4820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/altanet.ro\/en\/wp-json\/wp\/v2\/tags?post=4820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}