{"id":12480,"date":"2026-01-03T18:06:15","date_gmt":"2026-01-03T18:06:15","guid":{"rendered":"https:\/\/www.aicerts.ai\/news\/?post_type=news&#038;p=12480"},"modified":"2026-01-03T18:06:21","modified_gmt":"2026-01-03T18:06:21","slug":"conde-nast-leak-2-3m-wired-subscriber-records-exposed","status":"publish","type":"news","link":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/","title":{"rendered":"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed"},"content":{"rendered":"\n<p>Meanwhile, Cond\u00e9 Nast has stayed silent, leaving professionals to gauge exposure and regulatory fallout alone. This article unpacks the timeline, technical flaws, and governance gaps behind the unfolding crisis. Furthermore, it outlines concrete mitigation advice and strategic lessons for subscription-based publishers. Read on to understand the stakes and prepare your organisation for the next inevitable breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Breach Timeline Key Points<\/h2>\n\n\n\n<p>Lovely first contacted DataBreaches.net in early November 2025, requesting responsible disclosure help. Nevertheless, outreach attempts reportedly failed to reach Cond\u00e9 Nast security staff. Industry chatter about the Cond\u00e9 Nast leak intensified as evidence mounted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/subscriber-data-leak-close-up.jpg\" alt=\"Cond\u00e9 Nast leak exposed private subscriber records on unsecured digital platforms.\"\/><figcaption class=\"wp-element-caption\">Cond\u00e9 Nast leak exposed sensitive subscriber data, highlighting digital security risks.<\/figcaption><\/figure>\n\n\n\n<p>On 20 December, the hacker posted a WIRED subscriber archive to BreachForums. Subsequently, the file was mirrored across multiple channels during the holiday week.<\/p>\n\n\n\n<p>The forum post titled &#8220;Cond\u00e9 Nast leak&#8221; drew thousands of views within hours. Have I Been Pwned ingested the dataset on 27 December after verifying sample hashes. Moreover, Hudson Rock analysts validated additional records, citing strong overlap with fresh infostealer logs.<\/p>\n\n\n\n<p>The compressed timeline illustrates how disclosure friction can accelerate public exposure. In contrast, understanding the leaked content requires a closer look at the dataset itself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Leaked Data Scope Details<\/h2>\n\n\n\n<p>Researchers counted 2,366,576 total entries in the WIRED dump. However, unique email addresses numbered about 2.36 million, confirming minimal duplication.<\/p>\n\n\n\n<p>Only limited fields contained deeper personal data such as full names and addresses. Specifically, analysts saw 284,000 names, 194,000 addresses, 32,000 phone numbers, and 67,000 birthdates.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Subscriber records: 2.36 million unique emails<\/li>\n\n\n\n<li>Full names: 284,000 entries<\/li>\n\n\n\n<li>Addresses: 194,000 entries<\/li>\n\n\n\n<li>Phone numbers: 32,000 entries<\/li>\n\n\n\n<li>Birthdates: 67,000 entries<\/li>\n<\/ul>\n\n\n\n<p>Crucially, roughly 1,500 records bundled every attribute, presenting a concentrated privacy hazard. Consequently, even subscribers with minimal attributes face targeted phishing based on contextual intelligence.<\/p>\n\n\n\n<p>These numbers make the Cond\u00e9 Nast leak sizeable yet far from the actor&#8217;s claimed ceiling. Therefore, security teams must understand the root vulnerability that enabled the scrape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Method IDOR Flaws<\/h2>\n\n\n\n<p>Evidence points to classic IDOR vulnerabilities within Cond\u00e9 Nast\u2019s shared subscription APIs. Attackers abused sequential identifiers to request arbitrary user objects without permission checks. The Cond\u00e9 Nast leak stemmed from simple authorization gaps.<\/p>\n\n\n\n<p>Moreover, no rate limiting or authentication gate reportedly blocked automated enumeration. In contrast, modern access control frameworks demand contextual authorization for every object request.<\/p>\n\n\n\n<p>Lovely claims six independent flaws existed across multiple brand portals. Subsequently, one unresolved endpoint enabled the mass extraction of WIRED subscriber records.<\/p>\n\n\n\n<p>The exploit required no malware on Cond\u00e9 Nast systems, only browser requests and persistence. However, the impact radiates outward through mounting identity risk for affected readers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Escalating Subscriber Identity Risk<\/h2>\n\n\n\n<p>Email addresses fuel credential-stuffing attacks when paired with reused passwords. Furthermore, leaked personal data allows precise spear-phishing using brand language and subscription context.<\/p>\n\n\n\n<p>Addresses and birthdates also enable synthetic-identity fraud and insurance scams. Consequently, regulators classify such attributes as moderate to high sensitivity under many statutes.<\/p>\n\n\n\n<p>Experts warn the Cond\u00e9 Nast leak could spur doxing incidents against high-profile readers. Privacy advocates argue that identity risk intensifies when datasets span decades. Nevertheless, the broader identity risk will remain abstract until the promised 40-million cache appears.<\/p>\n\n\n\n<p>Risk appetite for silence is shrinking under global privacy regimes. Next, we examine Cond\u00e9 Nast\u2019s public response and legal responsibilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cond\u00e9 Response And Obligations<\/h2>\n\n\n\n<p>By year\u2019s end, Cond\u00e9 Nast had issued no formal confirmation or breach notification. Meanwhile, journalists received only routine \u201cno comment\u201d replies from corporate representatives.<\/p>\n\n\n\n<p>Under New York\u2019s updated breach law, companies must notify residents \u201cwithout unreasonable delay\u201d after confirmation. Moreover, GDPR imposes a 72-hour disclosure clock when European personal data is implicated.<\/p>\n\n\n\n<p>Failure to disclose could heighten class-action exposure and regulatory fines. Consequently, the Cond\u00e9 Nast leak may test enforcement resolve in multiple jurisdictions.<\/p>\n\n\n\n<p>Silence also erodes reader trust faster than any exploit. Therefore, subscribers need actionable guidance right now.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Practical Mitigation Steps Now<\/h2>\n\n\n\n<p>Individual users should begin with an email lookup on Have I Been Pwned. Additionally, enable two-factor authentication and create unique passwords across every service.<\/p>\n\n\n\n<p>Next, monitor credit reports and freeze accounts if suspicious activity emerges. Furthermore, treat any subscription renewal notice as suspicious until verified through official portals.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Force password resets for affected accounts<\/li>\n\n\n\n<li>Deploy web application firewalls immediately<\/li>\n\n\n\n<li>Conduct access-control audits focusing on IDOR vulnerabilities<\/li>\n<\/ul>\n\n\n\n<p>Professionals can boost breach response skills with the <a href=\"https:\/\/www.aicerts.ai\/certifications\/business\/ai-project-manager\">AI Project Manager<\/a> certification. A Cond\u00e9 Nast leak scenario illustrates why corporate incident playbooks need rehearsals.<\/p>\n\n\n\n<p>These steps lower immediate harm for readers and brands. Finally, the industry must absorb strategic lessons to avoid repeating history.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Broader Industry Security Lessons<\/h2>\n\n\n\n<p>Legacy media houses often centralise customer systems across dozens of mastheads. Consequently, one insecure endpoint jeopardises brand portfolios worth billions.<\/p>\n\n\n\n<p>IDOR vulnerabilities persist because business pressure rewards rapid feature delivery over rigorous authorization reviews. In contrast, embedding security champions in agile teams keeps controls aligned with architecture changes.<\/p>\n\n\n\n<p>Vulnerability disclosure policies, including security.txt files, further reduce friction with independent researchers. Moreover, mature programs incentivise early reporting before frustrated researchers escalate.<\/p>\n\n\n\n<p>The Cond\u00e9 Nast leak underscores investor expectations for transparent, prompt incident handling. Therefore, boards must measure incident response speed alongside newsroom metrics.<\/p>\n\n\n\n<p>Stronger governance, layered controls, and open communication remain the clearest safeguards. However, preparation alone cannot replace continued vigilance after every code push.<\/p>\n\n\n\n<p>The Cond\u00e9 Nast leak exposes weaknesses spanning technology, process, and culture. However, clarity on impacts and responsibilities enables swift containment. Security teams must patch IDOR vulnerabilities, monitor data markets, and brief executives transparently. Subscribers should secure accounts, stay alert for phishing, and value unique credentials. Meanwhile, regulators will watch corporate disclosures closely during the coming weeks. Consequently, decisive communication can limit reputational damage far more than legal silence. Act now, deepen skills, and explore certifications to strengthen organisational resilience against the next breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>News of a massive media data spill broke just before New Year. However, the Cond\u00e9 Nast leak has surfaced on dark-web forums, exposing WIRED subscribers worldwide. Researchers quickly confirmed the authenticity using cross-matched infostealer logs and industry breach trackers. Consequently, more than 2.3 million email addresses are already searchable on Have I Been Pwned. The threat actor, calling themselves Lovely, claims additional troves totalling 40 million records remain in reserve. <\/p>\n","protected":false},"featured_media":12479,"parent":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cond\u00e9 Nast leak","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.","_yoast_wpseo_canonical":""},"tags":[18134,18135,18132,18131,18133,18137,18136],"news_category":[4,3],"communities":[],"class_list":["post-12480","news","type-news","status-publish","has-post-thumbnail","hentry","tag-breach-response","tag-conde-nast-leak","tag-have-i-been-pwned","tag-identity-risk","tag-idor-vulnerabilities","tag-media-cybersecurity","tag-subscriber-records","news_category-ai","news_category-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed - AI CERTs News<\/title>\n<meta name=\"description\" content=\"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed - AI CERTs News\" \/>\n<meta property=\"og:description\" content=\"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/\" \/>\n<meta property=\"og:site_name\" content=\"AI CERTs News\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-03T18:06:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/\",\"url\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/\",\"name\":\"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed - AI CERTs News\",\"isPartOf\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg\",\"datePublished\":\"2026-01-03T18:06:15+00:00\",\"dateModified\":\"2026-01-03T18:06:21+00:00\",\"description\":\"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#primaryimage\",\"url\":\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg\",\"contentUrl\":\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg\",\"width\":1536,\"height\":1024,\"caption\":\"WIRED newsroom staff react quickly to the Cond\u00e9 Nast leak and subscriber data breach.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aicerts.ai\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/www.aicerts.ai\/news\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/#website\",\"url\":\"https:\/\/www.aicerts.ai\/news\/\",\"name\":\"Aicerts News\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aicerts.ai\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/#organization\",\"name\":\"Aicerts News\",\"url\":\"https:\/\/www.aicerts.ai\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg\",\"contentUrl\":\"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Aicerts News\"},\"image\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed - AI CERTs News","description":"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/","og_locale":"en_US","og_type":"article","og_title":"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed - AI CERTs News","og_description":"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.","og_url":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/","og_site_name":"AI CERTs News","article_modified_time":"2026-01-03T18:06:21+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/","url":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/","name":"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed - AI CERTs News","isPartOf":{"@id":"https:\/\/www.aicerts.ai\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#primaryimage"},"image":{"@id":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg","datePublished":"2026-01-03T18:06:15+00:00","dateModified":"2026-01-03T18:06:21+00:00","description":"Conde Nast leak puts 2.3 million WIRED subscriber records at risk; learn key facts, IDOR lessons, and next steps to shield personal data.","breadcrumb":{"@id":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#primaryimage","url":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg","contentUrl":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/01\/wired-newsroom-after-leak.jpg","width":1536,"height":1024,"caption":"WIRED newsroom staff react quickly to the Cond\u00e9 Nast leak and subscriber data breach."},{"@type":"BreadcrumbList","@id":"https:\/\/www.aicerts.ai\/news\/conde-nast-leak-2-3m-wired-subscriber-records-exposed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aicerts.ai\/news\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.aicerts.ai\/news\/news\/"},{"@type":"ListItem","position":3,"name":"Cond\u00e9 Nast leak: 2.3M WIRED subscriber records exposed"}]},{"@type":"WebSite","@id":"https:\/\/www.aicerts.ai\/news\/#website","url":"https:\/\/www.aicerts.ai\/news\/","name":"Aicerts News","description":"","publisher":{"@id":"https:\/\/www.aicerts.ai\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aicerts.ai\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aicerts.ai\/news\/#organization","name":"Aicerts News","url":"https:\/\/www.aicerts.ai\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg","contentUrl":"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg","width":1,"height":1,"caption":"Aicerts News"},"image":{"@id":"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news\/12480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/types\/news"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/comments?post=12480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/media\/12479"}],"wp:attachment":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/media?parent=12480"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/tags?post=12480"},{"taxonomy":"news_category","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news_category?post=12480"},{"taxonomy":"communities","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/communities?post=12480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}