{"id":1394,"date":"2024-03-13T12:03:15","date_gmt":"2024-03-13T17:03:15","guid":{"rendered":"https:\/\/www.glasswire.com\/blog\/?p=1394"},"modified":"2024-03-20T05:20:18","modified_gmt":"2024-03-20T10:20:18","slug":"navigating-emerging-cyber-threats-in-2024","status":"publish","type":"post","link":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/","title":{"rendered":"Navigating Emerging Cyber Threats in 2024"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1200\" height=\"540\" src=\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg\" alt=\"\" class=\"wp-image-1395\"\/><\/figure>\n\n\n\n<p>As we step into 2024, the digital landscape continues to evolve at an unprecedented pace. With this rapid advancement comes a new wave of sophisticated cyber threats that exploit the latest technologies to breach security measures. This article delves into three emerging cyber threats that experts predict will dominate the cybersecurity arena in 2024: AI-powered phishing attacks, ransomware targeting IoT devices, and deepfake technology used for identity theft. Understanding these threats is the first step toward fortifying your defenses in the ever-changing battleground of cyber security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Emerging Cyber Threats: AI-Powered Phishing Attacks<\/strong><\/h2>\n\n\n\n<p>Phishing attacks are not new, but the integration of Artificial Intelligence (AI) into these deceptive practices marks a significant evolution. AI-powered phishing attacks use machine learning algorithms to create highly convincing fake emails and websites. These attacks are tailored to individual behaviors and preferences, making them incredibly difficult to detect. The AI systems learn from successful phishing attempts, continuously improving their tactics to bypass traditional security measures. To combat these advanced threats, organizations and individuals must employ AI-driven security solutions that can predict and neutralize phishing attempts before they reach their targets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ransomware Targeting IoT Devices<\/strong><\/h2>\n\n\n\n<p>The Internet of Things (IoT) has transformed our daily lives, connecting everything from home appliances to industrial machinery. However, this interconnectedness also opens up new avenues for cyber attacks. In 2024, experts predict a surge in ransomware attacks targeting IoT devices. Unlike traditional ransomware, these attacks could take control of essential devices, demanding payment to restore functionality. The potential for disruption is immense, from paralyzing smart homes to halting industrial processes. Protecting against IoT ransomware requires a multi-layered approach, including regular software updates, network segmentation, and the deployment of security solutions specifically designed for IoT ecosystems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deepfake Technology and Identity Theft<\/strong><\/h2>\n\n\n\n<p>Deepfake technology, which generates convincing fake audio and video recordings, is increasingly being used for malicious purposes, including identity theft. Cybercriminals can create realistic videos or voice recordings of individuals to bypass biometric security measures or to manipulate public opinion. In 2024, the use of deepfakes for identity theft is expected to rise. Attackers will create fake identities or impersonating trusted individuals to gain access to sensitive information. Defending against deepfake-related identity theft involves a combination of technological solutions, such as deepfake detection tools, and increased awareness of the threat posed by these convincing fakes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>The emerging cyber threats of 2024 represent a significant evolution in the tactics used by cybercriminals. AI-powered phishing, IoT ransomware, and deepfake technology for identity theft are just the tip of the iceberg. As these threats continue to evolve, so too must our strategies for combating them. It is essential to stay informed about the latest cyber threats and to invest in advanced security solutions capable of defending against these sophisticated attacks. By understanding and preparing for these emerging threats, we can protect our digital lives and maintain the integrity of our interconnected world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Protecting Your Digital Future from Emerging Cyber Threats<\/strong><\/h2>\n\n\n\n<p>The battle against cyber threats is ongoing, and staying ahead requires constant vigilance and adaptation. It&#8217;s clear that understanding emerging threats is crucial for building effective defenses. By leveraging advanced security technologies and fostering a culture of cybersecurity awareness, we can safeguard our digital future against the unseen dangers that lie ahead.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we step into 2024, the digital landscape continues to evolve at an unprecedented pace. With this rapid advancement comes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1395,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Cyber Threats in 2024 - GlassWire Blog<\/title>\n<meta name=\"description\" content=\"Plenty of emerging cyber threats in 2024 are mining internet security. Have an in-depth look at AI-powered phishing, IoT ransomware and more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Cyber Threats in 2024 - GlassWire Blog\" \/>\n<meta property=\"og:description\" content=\"Plenty of emerging cyber threats in 2024 are mining internet security. Have an in-depth look at AI-powered phishing, IoT ransomware and more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"GlassWire Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/glasswirelabs\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-13T17:03:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-20T10:20:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"GlassWire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GlassWire\" \/>\n<meta name=\"twitter:site\" content=\"@GlassWire\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GlassWire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\"},\"author\":{\"name\":\"GlassWire\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e\"},\"headline\":\"Navigating Emerging Cyber Threats in 2024\",\"datePublished\":\"2024-03-13T17:03:15+00:00\",\"dateModified\":\"2024-03-20T10:20:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\",\"url\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\",\"name\":\"Emerging Cyber Threats in 2024 - GlassWire Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg\",\"datePublished\":\"2024-03-13T17:03:15+00:00\",\"dateModified\":\"2024-03-20T10:20:18+00:00\",\"description\":\"Plenty of emerging cyber threats in 2024 are mining internet security. Have an in-depth look at AI-powered phishing, IoT ransomware and more!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage\",\"url\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg\",\"contentUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg\",\"width\":1200,\"height\":540,\"caption\":\"emerging cyber threats 2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glasswire.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating Emerging Cyber Threats in 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#website\",\"url\":\"https:\/\/www.glasswire.com\/blog\/\",\"name\":\"GlassWire Blog\",\"description\":\"Free Firewall Software &amp; Network Monitor.\",\"publisher\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glasswire.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\",\"name\":\"Glasswire\",\"url\":\"https:\/\/www.glasswire.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png\",\"contentUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png\",\"width\":216,\"height\":60,\"caption\":\"Glasswire\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/glasswirelabs\",\"https:\/\/twitter.com\/GlassWire\",\"https:\/\/www.instagram.com\/glasswireofficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e\",\"name\":\"GlassWire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g\",\"caption\":\"GlassWire\"},\"url\":\"https:\/\/www.glasswire.com\/blog\/author\/glasswire\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Cyber Threats in 2024 - GlassWire Blog","description":"Plenty of emerging cyber threats in 2024 are mining internet security. Have an in-depth look at AI-powered phishing, IoT ransomware and more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Cyber Threats in 2024 - GlassWire Blog","og_description":"Plenty of emerging cyber threats in 2024 are mining internet security. Have an in-depth look at AI-powered phishing, IoT ransomware and more!","og_url":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/","og_site_name":"GlassWire Blog","article_publisher":"https:\/\/www.facebook.com\/glasswirelabs","article_published_time":"2024-03-13T17:03:15+00:00","article_modified_time":"2024-03-20T10:20:18+00:00","og_image":[{"width":1200,"height":540,"url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg","type":"image\/jpeg"}],"author":"GlassWire","twitter_card":"summary_large_image","twitter_creator":"@GlassWire","twitter_site":"@GlassWire","twitter_misc":{"Written by":"GlassWire","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#article","isPartOf":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/"},"author":{"name":"GlassWire","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e"},"headline":"Navigating Emerging Cyber Threats in 2024","datePublished":"2024-03-13T17:03:15+00:00","dateModified":"2024-03-20T10:20:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/"},"wordCount":539,"publisher":{"@id":"https:\/\/www.glasswire.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/","url":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/","name":"Emerging Cyber Threats in 2024 - GlassWire Blog","isPartOf":{"@id":"https:\/\/www.glasswire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg","datePublished":"2024-03-13T17:03:15+00:00","dateModified":"2024-03-20T10:20:18+00:00","description":"Plenty of emerging cyber threats in 2024 are mining internet security. Have an in-depth look at AI-powered phishing, IoT ransomware and more!","breadcrumb":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#primaryimage","url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg","contentUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/03\/cybert24-80.jpg","width":1200,"height":540,"caption":"emerging cyber threats 2024"},{"@type":"BreadcrumbList","@id":"https:\/\/www.glasswire.com\/blog\/2024\/03\/13\/navigating-emerging-cyber-threats-in-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glasswire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Navigating Emerging Cyber Threats in 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.glasswire.com\/blog\/#website","url":"https:\/\/www.glasswire.com\/blog\/","name":"GlassWire Blog","description":"Free Firewall Software &amp; Network Monitor.","publisher":{"@id":"https:\/\/www.glasswire.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glasswire.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.glasswire.com\/blog\/#organization","name":"Glasswire","url":"https:\/\/www.glasswire.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png","contentUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png","width":216,"height":60,"caption":"Glasswire"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/glasswirelabs","https:\/\/twitter.com\/GlassWire","https:\/\/www.instagram.com\/glasswireofficial\/"]},{"@type":"Person","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e","name":"GlassWire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g","caption":"GlassWire"},"url":"https:\/\/www.glasswire.com\/blog\/author\/glasswire\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/1394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/comments?post=1394"}],"version-history":[{"count":3,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/1394\/revisions"}],"predecessor-version":[{"id":1404,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/1394\/revisions\/1404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/media\/1395"}],"wp:attachment":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/media?parent=1394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/categories?post=1394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/tags?post=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}