{"id":2226,"date":"2025-01-30T13:09:55","date_gmt":"2025-01-30T12:09:55","guid":{"rendered":"https:\/\/euroone.hu\/?p=2226"},"modified":"2025-01-30T13:58:08","modified_gmt":"2025-01-30T12:58:08","slug":"application-of-cyber-security-ttp-principles-in-it-security","status":"publish","type":"post","link":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/","title":{"rendered":"Application of Cyber Security TTP Principles in IT Security"},"content":{"rendered":"\n<p>The world of cybersecurity constantly evolves, and organizations must stay vigilant against emerging threats. A key tool for understanding attackers and developing defenses is the TTP (Tactics, Techniques, and Procedures) framework. Here, we outline the basic principles of TTP and their practical application in IT security.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is TTP?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tactics:<\/strong> The overall goals or strategies of attackers, such as obtaining data or disrupting systems. <\/li>\n\n\n\n<li><strong>Techniques:<\/strong> The methods or tools used to achieve these goals, like exploiting vulnerabilities or employing social engineering. <\/li>\n\n\n\n<li><strong>Procedures:<\/strong> The specific steps attackers take, detailing how techniques are carried out. <\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d9fc403eb8d&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d9fc403eb8d\" class=\"aligncenter size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTP-pyramid-1024x582.png\" alt=\"\" class=\"wp-image-2223\" srcset=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTP-pyramid-1024x582.png 1024w, https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTP-pyramid-300x170.png 300w, https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTP-pyramid-768x436.png 768w, https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTP-pyramid.png 1331w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><br>Why is TTP Important in IT Security?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tactics:<\/strong> Understanding attacker goals helps IT professionals identify targets and develop strategies to protect them.   <\/li>\n\n\n\n<li><strong>Techniques:<\/strong> Recognizing attack methods allows for specific defenses, such as enhanced training against social engineering or consistent patch management.  <\/li>\n\n\n\n<li><strong>Procedures:<\/strong> Analyzing attack steps helps security teams detect suspicious activities and prepare tailored defenses.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Integrating TTP-Based Protection<\/h2>\n\n\n\n<p>By incorporating TTP into IT security strategies, organizations can proactively defend against threats. This approach enhances threat detection, improves incident response, and strengthens overall cybersecurity.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Understanding TTP principles is crucial for anticipating and preventing cyber attacks. As attackers continually evolve, a TTP-based approach allows organizations to stay ahead, improving their overall security posture.   <\/p>\n\n\n\n<p>Read the full article on our International subsidiary\u2019s website by clicking on the image.<a href=\"https:\/\/socwise.eu\/protection-against-email-attacks-solutions-from-trend-micro\/(opens%20in%20a%20new%20tab)?utm_source=EO_blog&amp;utm_medium=BEC_attacks\"><\/a><a href=\"https:\/\/socwise.eu\/it-security-strategy-supported-by-ai\/?utm_source=EO_blog&amp;utm_medium=atkattintas\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/socwise.eu\/why-is-it-important-to-integrate-nac-systems-in-an-enterprise-it-system\/?utm_source=EO_blog&amp;utm_medium=atkattintas\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/socwise.eu\/introducing-our-engineering-team-at-the-forefront-of-it-security\/?utm_source=EO_blog&amp;utm_medium=atkattintas\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/socwise.eu\/application-of-cyber-security-ttp-basic-principles-in-it-security\/(opens in a new tab)?utm_source=EO_blog&amp;utm_medium=atkattintas\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"488\" height=\"329\" src=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/10\/socwise-poweredArtboard-1@4x-100.jpg\" alt=\"\" class=\"wp-image-1534\" style=\"width:220px\" srcset=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/10\/socwise-poweredArtboard-1@4x-100.jpg 488w, https:\/\/euroone.hu\/wp-content\/uploads\/2024\/10\/socwise-poweredArtboard-1@4x-100-300x202.jpg 300w\" sizes=\"auto, (max-width: 488px) 100vw, 488px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Applying TTP principles enables proactive cyber security defenses, increasing the effectiveness of threat detection and incident management.<\/p>\n","protected":false},"author":3,"featured_media":2580,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87],"tags":[],"class_list":["post-2226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application of Cyber Security TTP Principles in IT Security - EURO ONE<\/title>\n<meta name=\"description\" content=\"Learn TTP principles to help you identify cybersecurity threats and develop effective defence strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application of Cyber Security TTP Principles in IT Security - EURO ONE\" \/>\n<meta property=\"og:description\" content=\"Learn TTP principles to help you identify cybersecurity threats and develop effective defence strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/euroone\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-30T12:09:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-30T12:58:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mancz\u00e1k Rich\u00e1rd\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mancz\u00e1k Rich\u00e1rd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\"},\"author\":{\"name\":\"Mancz\u00e1k Rich\u00e1rd\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96\"},\"headline\":\"Application of Cyber Security TTP Principles in IT Security\",\"datePublished\":\"2025-01-30T12:09:55+00:00\",\"dateModified\":\"2025-01-30T12:58:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\"},\"wordCount\":229,\"publisher\":{\"@id\":\"https:\/\/euroone.hu\/#organization\"},\"image\":{\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\",\"url\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\",\"name\":\"Application of Cyber Security TTP Principles in IT Security - EURO ONE\",\"isPartOf\":{\"@id\":\"https:\/\/euroone.hu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg\",\"datePublished\":\"2025-01-30T12:09:55+00:00\",\"dateModified\":\"2025-01-30T12:58:08+00:00\",\"description\":\"Learn TTP principles to help you identify cybersecurity threats and develop effective defence strategies.\",\"breadcrumb\":{\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage\",\"url\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg\",\"contentUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg\",\"width\":2560,\"height\":1344},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\/\/euroone.hu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application of Cyber Security TTP Principles in IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/euroone.hu\/#website\",\"url\":\"https:\/\/euroone.hu\/\",\"name\":\"Euroone\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/euroone.hu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/euroone.hu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/euroone.hu\/#organization\",\"name\":\"Euroone\",\"url\":\"https:\/\/euroone.hu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png\",\"contentUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png\",\"width\":741,\"height\":768,\"caption\":\"Euroone\"},\"image\":{\"@id\":\"https:\/\/euroone.hu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/euroone\",\"https:\/\/www.linkedin.com\/company\/euro-one\/\",\"https:\/\/www.youtube.com\/@euroonezrt\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96\",\"name\":\"Mancz\u00e1k Rich\u00e1rd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g\",\"caption\":\"Mancz\u00e1k Rich\u00e1rd\"},\"url\":\"https:\/\/euroone.hu\/en\/author\/richard-manczak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application of Cyber Security TTP Principles in IT Security - EURO ONE","description":"Learn TTP principles to help you identify cybersecurity threats and develop effective defence strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Application of Cyber Security TTP Principles in IT Security - EURO ONE","og_description":"Learn TTP principles to help you identify cybersecurity threats and develop effective defence strategies.","og_url":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/","og_site_name":"EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.","article_publisher":"https:\/\/www.facebook.com\/euroone","article_published_time":"2025-01-30T12:09:55+00:00","article_modified_time":"2025-01-30T12:58:08+00:00","og_image":[{"width":2560,"height":1344,"url":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg","type":"image\/jpeg"}],"author":"Mancz\u00e1k Rich\u00e1rd","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mancz\u00e1k Rich\u00e1rd","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#article","isPartOf":{"@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/"},"author":{"name":"Mancz\u00e1k Rich\u00e1rd","@id":"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96"},"headline":"Application of Cyber Security TTP Principles in IT Security","datePublished":"2025-01-30T12:09:55+00:00","dateModified":"2025-01-30T12:58:08+00:00","mainEntityOfPage":{"@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/"},"wordCount":229,"publisher":{"@id":"https:\/\/euroone.hu\/#organization"},"image":{"@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/","url":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/","name":"Application of Cyber Security TTP Principles in IT Security - EURO ONE","isPartOf":{"@id":"https:\/\/euroone.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage"},"image":{"@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg","datePublished":"2025-01-30T12:09:55+00:00","dateModified":"2025-01-30T12:58:08+00:00","description":"Learn TTP principles to help you identify cybersecurity threats and develop effective defence strategies.","breadcrumb":{"@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#primaryimage","url":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg","contentUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/11\/TTPArtboard-1@3x-100-scaled.jpg","width":2560,"height":1344},{"@type":"BreadcrumbList","@id":"https:\/\/euroone.hu\/en\/application-of-cyber-security-ttp-principles-in-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/euroone.hu\/en\/"},{"@type":"ListItem","position":2,"name":"Application of Cyber Security TTP Principles in IT Security"}]},{"@type":"WebSite","@id":"https:\/\/euroone.hu\/#website","url":"https:\/\/euroone.hu\/","name":"Euroone","description":"","publisher":{"@id":"https:\/\/euroone.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/euroone.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/euroone.hu\/#organization","name":"Euroone","url":"https:\/\/euroone.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/euroone.hu\/#\/schema\/logo\/image\/","url":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png","contentUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png","width":741,"height":768,"caption":"Euroone"},"image":{"@id":"https:\/\/euroone.hu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/euroone","https:\/\/www.linkedin.com\/company\/euro-one\/","https:\/\/www.youtube.com\/@euroonezrt"]},{"@type":"Person","@id":"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96","name":"Mancz\u00e1k Rich\u00e1rd","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/euroone.hu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g","caption":"Mancz\u00e1k Rich\u00e1rd"},"url":"https:\/\/euroone.hu\/en\/author\/richard-manczak\/"}]}},"_links":{"self":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts\/2226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/comments?post=2226"}],"version-history":[{"count":6,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts\/2226\/revisions"}],"predecessor-version":[{"id":2584,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts\/2226\/revisions\/2584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/media\/2580"}],"wp:attachment":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/media?parent=2226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/categories?post=2226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/tags?post=2226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}