{"id":118652,"date":"2026-03-11T10:00:55","date_gmt":"2026-03-11T03:00:55","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=118652"},"modified":"2026-03-10T18:54:34","modified_gmt":"2026-03-10T11:54:34","slug":"ai-is-accelerating-cloud-cyberattacks-google-warns","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/ai-is-accelerating-cloud-cyberattacks-google-warns\/","title":{"rendered":"AI Is Accelerating Cloud Cyberattacks, Google Warns"},"content":{"rendered":"<p class=\"ai-optimize-6 ai-optimize-introduction\"><span data-contrast=\"auto\">Artificial intelligence is accelerating cyberattacks in the cloud, according to a new security report from Google. Researchers found that threat actors are exploiting vulnerabilities faster than ever, with the time between vulnerability disclosure and widespread exploitation shrinking dramatically,\u00a0from weeks to just days.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-7\"><span data-contrast=\"auto\">The report highlights how AI tools are helping attackers automate reconnaissance, vulnerability scanning, and exploit development. As a result, cybercriminals can\u00a0identify\u00a0weaknesses in enterprise systems and launch attacks at unprecedented\u00a0speed.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-8\"><span data-contrast=\"auto\">One of the most significant findings is<\/span><span data-contrast=\"auto\">\u00a0that\u00a0third-party software has become the primary target\u00a0for cloud attacks. Core cloud infrastructure from providers such as Amazon Web Services, Microsoft, and Google Cloud is typically well protected. Instead, attackers increasingly focus on vulnerable open-source libraries, developer tools, and external software components integrated into enterprise systems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-9\"><span data-contrast=\"auto\">In one example cited in the report, attackers began exploiting\u00a0a critical\u00a0vulnerability in React Server Components within\u00a048 hours\u00a0of public disclosure. Another case involved a vulnerability in the\u00a0XWiki\u00a0platform that allowed attackers to execute remote code on servers after organizations\u00a0failed to\u00a0apply available patches.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-10\"><span data-contrast=\"auto\">Attackers are also shifting their focus toward\u00a0identity-based attacks\u00a0rather than brute-force password attempts. The report notes that 21% of cloud intrusions involved compromised identities, while another 21% exploited trusted rela<\/span><span data-contrast=\"auto\">tionships with third-party vendors. Social engineering tactics such as phishing and voice-based\u00a0scams\u00a0continue to play\u00a0a major role\u00a0in these attacks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-11\"><span data-contrast=\"auto\">In many cases, attackers remain undetected for extended periods. The report found that 45% of cloud intrusions resulted in data theft without immediate extortion attempts, allowing attackers to maintain stealthy access to corporate systems.\u00a0<\/span>Therefore, security experts warn that organizations must deploy automated defenses to match the speed of AI-powered attacks. Specifically, companies should patch third-party software quickly and strengthen identity and access management. In addition, they must monitor networks for unusual activity and maintain a clear incident response plan. Ultimately, as AI reshapes both defense and cybercrime, businesses must assume attackers will move faster and prepare accordingly.<\/p>\n<p class=\"ai-optimize-14\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-15\"><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-16\"><a href=\"https:\/\/www.zdnet.com\/article\/google-cloud-threat-report-third-party-software-ai-attacks\/\"><span data-contrast=\"none\">https:\/\/www.zdnet.com\/article\/google-cloud-threat-report-third-party-software-ai-attacks\/<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is accelerating cyberattacks in the cloud, according to a new security report from Google. Researchers found that threat actors are exploiting vulnerabilities faster than ever, with the time between vulnerability disclosure and widespread exploitation shrinking dramatically,\u00a0from weeks to just days.\u00a0 The report highlights how AI tools are helping attackers automate reconnaissance, vulnerability scanning, [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":118653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488,1749,1538],"class_list":["post-118652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai","tag-cloud-cyberattacks","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Is Accelerating Cloud Cyberattacks, Google Warns - Eastgate Software<\/title>\n<meta name=\"description\" content=\"AI is accelerating cloud cyberattacks, with third-party software vulnerabilities becoming the primary entry point for attackers.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Is Accelerating Cloud Cyberattacks, Google Warns - Eastgate Software\" \/>\n<meta property=\"og:description\" content=\"AI is accelerating cloud cyberattacks, with third-party software vulnerabilities becoming the primary entry point for attackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/ai-is-accelerating-cloud-cyberattacks-google-warns\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-11T03:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"AI Is Accelerating Cloud Cyberattacks, Google Warns\",\"datePublished\":\"2026-03-11T03:00:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/\"},\"wordCount\":338,\"publisher\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Ai\",\"Cloud Cyberattacks\",\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/\",\"url\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/\",\"name\":\"AI Is Accelerating Cloud Cyberattacks, Google Warns - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2026-03-11T03:00:55+00:00\",\"description\":\"AI is accelerating cloud cyberattacks, with third-party software vulnerabilities becoming the primary entry point for attackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"AI Is Accelerating Cloud Cyberattacks, Google Warns\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wp.eastgate-software.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Is Accelerating Cloud Cyberattacks, Google Warns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wp.eastgate-software.com\/#website\",\"url\":\"https:\/\/wp.eastgate-software.com\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wp.eastgate-software.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/wp.eastgate-software.com\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\/\/wp.eastgate-software.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg\",\"contentUrl\":\"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/EastgateSoftware\/\",\"https:\/\/x.com\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Is Accelerating Cloud Cyberattacks, Google Warns - Eastgate Software","description":"AI is accelerating cloud cyberattacks, with third-party software vulnerabilities becoming the primary entry point for attackers.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"AI Is Accelerating Cloud Cyberattacks, Google Warns - Eastgate Software","og_description":"AI is accelerating cloud cyberattacks, with third-party software vulnerabilities becoming the primary entry point for attackers.","og_url":"https:\/\/wp.eastgate-software.com\/de\/ai-is-accelerating-cloud-cyberattacks-google-warns\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-03-11T03:00:55+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"AI Is Accelerating Cloud Cyberattacks, Google Warns","datePublished":"2026-03-11T03:00:55+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/"},"wordCount":338,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1","keywords":["Ai","Cloud Cyberattacks","cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/","url":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/","name":"AI Is Accelerating Cloud Cyberattacks, Google Warns - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1","datePublished":"2026-03-11T03:00:55+00:00","description":"AI is accelerating cloud cyberattacks, with third-party software vulnerabilities becoming the primary entry point for attackers.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"AI Is Accelerating Cloud Cyberattacks, Google Warns"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/ai-is-accelerating-cloud-cyberattacks-google-warns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"AI Is Accelerating Cloud Cyberattacks, Google Warns"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-6.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uRK","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/118652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=118652"}],"version-history":[{"count":3,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/118652\/revisions"}],"predecessor-version":[{"id":118656,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/118652\/revisions\/118656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/118653"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=118652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=118652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=118652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}