{"id":2340,"date":"2026-05-12T16:25:27","date_gmt":"2026-05-12T14:25:27","guid":{"rendered":"https:\/\/cyber-detect.com\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/"},"modified":"2026-05-12T16:25:27","modified_gmt":"2026-05-12T14:25:27","slug":"godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity","status":"publish","type":"post","link":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/","title":{"rendered":"GODZILLA Project: Cyber-Detect at the heart of tomorrow&#8217;s cybersecurity"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p> <\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p> <\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence. Led by Sesame IT (Jiz\u00f4 AI)  in partnership with  Loria (University of Lorraine \u2013 CNRS) and Cyber-Detect, this ambitious program aims to anticipate next-generation cyber threats by studying the use of AI in autonomous and sophisticated attacks.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>In a context where cyberattacks are becoming increasingly complex, fast, and difficult to detect, GODZILLA aims to develop defense mechanisms capable of identifying unprecedented malicious behaviors before they compromise critical infrastructures.<br\/>This project is fully aligned with the French and European strategy for digital sovereignty and cyber resilience.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Within this consortium, Cyber-Detect plays a key role thanks to its advanced expertise in malware analysis and malicious ecosystems. Since its creation, the company has been developing technologies capable of detecting, understanding, and neutralizing complex threats through behavioral and morphological analysis. This expertise now constitutes an essential pillar of the GODZILLA project.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Cyber-Detect&#8217;s objective in this program is notably to contribute its ability to identify new forms of attacks driven or assisted by artificial intelligence. Cyber-Detect&#8217;s objective in this program is notably to contribute its ability to identify new forms of attacks driven or assisted by artificial intelligence.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Beyond technological innovation, Cyber-Detect&#8217;s participation in GODZILLA also confirms the ability of French cybersecurity players to collaborate closely with academic research to address major strategic challenges. Beyond technological innovation, Cyber-Detect&#8217;s participation in GODZILLA also confirms the ability of French cybersecurity players to collaborate closely with academic research to address major strategic challenges.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Being associated with a project supported by France 2030 also represents significant recognition of Cyber-Detect&#8217;s expertise in a sector that has become a national priority.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>With GODZILLA, Cyber-Detect actively contributes to building tomorrow&#8217;s cybersecurity tools: more intelligent, more predictive, and capable of facing emerging threats in a constantly evolving digital environment.<\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p> <\/p>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p> <\/p>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.<\/p>\n","protected":false},"author":1,"featured_media":2337,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GODZILLA Project: Cyber-Detect at the heart of tomorrow&#039;s cybersecurity - Cyber-Detect<\/title>\n<meta name=\"description\" content=\"The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GODZILLA Project: Cyber-Detect at the heart of tomorrow&#039;s cybersecurity - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-12T14:25:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"473\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"adminbilliotte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminbilliotte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\"},\"author\":{\"name\":\"adminbilliotte\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\"},\"headline\":\"GODZILLA Project: Cyber-Detect at the heart of tomorrow&#8217;s cybersecurity\",\"datePublished\":\"2026-05-12T14:25:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\"},\"wordCount\":318,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\",\"name\":\"GODZILLA Project: Cyber-Detect at the heart of tomorrow's cybersecurity - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png\",\"datePublished\":\"2026-05-12T14:25:27+00:00\",\"description\":\"The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png\",\"width\":900,\"height\":473},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GODZILLA Project: Cyber-Detect at the heart of tomorrow&#8217;s cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\",\"name\":\"adminbilliotte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"caption\":\"adminbilliotte\"},\"url\":\"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GODZILLA Project: Cyber-Detect at the heart of tomorrow's cybersecurity - Cyber-Detect","description":"The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"GODZILLA Project: Cyber-Detect at the heart of tomorrow's cybersecurity - Cyber-Detect","og_description":"The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.","og_url":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/","og_site_name":"Cyber-Detect","article_published_time":"2026-05-12T14:25:27+00:00","og_image":[{"width":900,"height":473,"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png","type":"image\/png"}],"author":"adminbilliotte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminbilliotte","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/"},"author":{"name":"adminbilliotte","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47"},"headline":"GODZILLA Project: Cyber-Detect at the heart of tomorrow&#8217;s cybersecurity","datePublished":"2026-05-12T14:25:27+00:00","mainEntityOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/"},"wordCount":318,"commentCount":0,"publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png","articleSection":["Actualit\u00e9s"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/","url":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/","name":"GODZILLA Project: Cyber-Detect at the heart of tomorrow's cybersecurity - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png","datePublished":"2026-05-12T14:25:27+00:00","description":"The GODZILLA project, recently awarded in the I_Demo call for projects under the France 2030 plan, marks a major breakthrough in cybersecurity and artificial intelligence.","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/05\/CyD-Template_linkedin-18.png","width":900,"height":473},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/godzilla-project-cyber-detect-at-the-heart-of-tomorrows-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"GODZILLA Project: Cyber-Detect at the heart of tomorrow&#8217;s cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47","name":"adminbilliotte","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","caption":"adminbilliotte"},"url":"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/"}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/2340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=2340"}],"version-history":[{"count":1,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/2340\/revisions"}],"predecessor-version":[{"id":2341,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/2340\/revisions\/2341"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media\/2337"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=2340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/categories?post=2340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/tags?post=2340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}