{"id":5291,"date":"2017-09-07T06:14:44","date_gmt":"2017-09-07T04:14:44","guid":{"rendered":"https:\/\/news.save.ch\/?p=5291"},"modified":"2023-03-14T08:57:01","modified_gmt":"2023-03-14T07:57:01","slug":"sechs-hacker-methoden","status":null,"type":"post","link":"https:\/\/news.save.ch\/it\/sechs-hacker-methoden\/","title":{"rendered":"Sei metodi di hacking comuni"},"content":{"rendered":"<figure id=\"attachment_5292\" aria-describedby=\"caption-attachment-5292\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5292 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg\" alt=\" i sei metodi di hacking pi\u00f9 comuni\" width=\"500\" height=\"333\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg 500w, https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-5292\" class=\"wp-caption-text\">\u00a9 depositphotos<\/figcaption><\/figure>\n<p>Gli hacker fanno di tutto per entrare in possesso dei dati di accesso all'IT per gli account utente privilegiati. <a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a> spiega i sei metodi pi\u00f9 comuni che utilizzano per farlo:<\/p>\n<p><strong><em>Registrazione dei tasti:<\/em> <\/strong>In questo caso, le voci della tastiera dell'utente vengono registrate con l'aiuto del malware infiltrato. Un keylogger pu\u00f2 registrare tutti i dati o attendere voci specifiche.<\/p>\n<p><strong><em>Attacchi di forza bruta:<\/em> <\/strong>Con questo metodo, gli hacker cercano di indovinare le password semplicemente provando tutte le combinazioni possibili con il supporto di un software speciale. Quanto pi\u00f9 brevi e semplici sono le password e quanto meno frequentemente vengono cambiate, tanto maggiore \u00e8 la probabilit\u00e0 di successo.<\/p>\n<p><strong><em>Scraping della memoria:<\/em> <\/strong>Un malware si inserisce nella memoria di lavoro dei PC e vi cerca i dati di accesso. Pu\u00f2 trattarsi di password memorizzate in testo normale o di hash in ambienti Windows che possono essere utilizzati per attacchi pass-the-hash.<\/p>\n<p><strong><em>Fogli di calcolo con password:<\/em><\/strong> Molte aziende conservano ancora le password in tabelle centrali. Questo li rende un obiettivo particolarmente redditizio per i criminali informatici.<\/p>\n<p><strong><em>Ingegneria sociale:<\/em> <\/strong>In questo caso, gli hacker si fingono conoscenti o colleghi, ad esempio nelle e-mail. In questo modo, cercano di convincere le loro vittime a rivelare volontariamente i loro dati di accesso.<\/p>\n<p><strong><em>Dati di accesso codificati:<\/em> <\/strong>I criminali informatici spesso cercano anche password o chiavi SSH che si trovano nei codici di programmazione delle applicazioni, negli script o nei file di configurazione. Permettono un accesso ad ampio raggio, ma spesso non vengono modificati per anni.<\/p>\n<p>\"La maggior parte delle aziende \u00e8 ormai consapevole che i dati di accesso privilegiato giocano un ruolo decisivo negli attacchi informatici. Eppure spesso non sono sufficientemente protetti\", afferma Michael Kleist, Regional Director DACH di CyberArk.<\/p>\n<p>Secondo l'esperienza dell'esperto, molte aziende conservano le password in fogli di calcolo, modificano i dati di accesso troppo raramente o spesso concedono inutilmente agli utenti pieni diritti di amministrazione su PC e server. Inoltre, le misure di sicurezza informatica convenzionali sono spesso impotenti di fronte ai moderni attacchi informatici. L'intrusione di malware che serve a spiare i dati di accesso spesso non pu\u00f2 essere impedita dalla protezione perimetrale.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. CyberArk erl\u00e4utert die sechs h\u00e4ufigsten Methoden, die sie dabei anwenden: Keystroke Logging: Hierbei werden mit Hilfe einer eingeschleusten Schadsoftware die Eingaben eines Benutzers an der Tastatur protokolliert. Ein Keylogger kann entweder s\u00e4mtliche Daten aufzeichnen oder gezielt auf bestimmte Eingaben warten. Brute-Force-Attacken: [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,63],"class_list":["post-5291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Hacker-Methoden","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sechs h\u00e4ufige Hacker-Methoden - Save<\/title>\n<meta name=\"description\" content=\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/it\/sechs-hacker-methoden\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs h\u00e4ufige Hacker-Methoden - Save\" \/>\n<meta property=\"og:description\" content=\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/it\/sechs-hacker-methoden\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-07T04:14:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Sechs h\u00e4ufige Hacker-Methoden\",\"datePublished\":\"2017-09-07T04:14:44+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"keywords\":[\"Cyber-Crime\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\",\"name\":\"Sechs h\u00e4ufige Hacker-Methoden - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"datePublished\":\"2017-09-07T04:14:44+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"description\":\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"width\":500,\"height\":333,\"caption\":\"\u00a9 depositphotos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs h\u00e4ufige Hacker-Methoden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/it\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sei metodi di hacking comuni - Save","description":"Gli hacker farebbero di tutto per entrare in possesso dei dati di accesso all'IT per gli account utente privilegiati. I sei metodi pi\u00f9 comuni.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/it\/sechs-hacker-methoden\/","og_locale":"it_IT","og_type":"article","og_title":"Sechs h\u00e4ufige Hacker-Methoden - Save","og_description":"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.","og_url":"https:\/\/news.save.ch\/it\/sechs-hacker-methoden\/","og_site_name":"Save","article_published_time":"2017-09-07T04:14:44+00:00","article_modified_time":"2023-03-14T07:57:01+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Roger Str\u00e4ssle","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Sechs h\u00e4ufige Hacker-Methoden","datePublished":"2017-09-07T04:14:44+00:00","dateModified":"2023-03-14T07:57:01+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","keywords":["Cyber-Crime","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/","url":"https:\/\/news.save.ch\/sechs-hacker-methoden\/","name":"Sei metodi di hacking comuni - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","datePublished":"2017-09-07T04:14:44+00:00","dateModified":"2023-03-14T07:57:01+00:00","description":"Gli hacker farebbero di tutto per entrare in possesso dei dati di accesso all'IT per gli account utente privilegiati. I sei metodi pi\u00f9 comuni.","breadcrumb":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/sechs-hacker-methoden\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","width":500,"height":333,"caption":"\u00a9 depositphotos"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Sechs h\u00e4ufige Hacker-Methoden"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Risparmiare","description":"Rivista svizzera specializzata in sicurezza","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sulla sicurezza","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/it\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/5291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/comments?post=5291"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/5291\/revisions"}],"predecessor-version":[{"id":17490,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/5291\/revisions\/17490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media\/5292"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media?parent=5291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/categories?post=5291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/tags?post=5291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}