{"id":20777,"date":"2024-12-31T10:00:15","date_gmt":"2024-12-31T09:00:15","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=20777"},"modified":"2024-12-10T16:00:16","modified_gmt":"2024-12-10T15:00:16","slug":"cybertrends-2025-criminal-smokescreens-and-democratized-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/cybertrends-2025-criminal-smokescreens-and-democratized-cyberattacks\/","title":{"rendered":"Cybertrends 2025: Criminal smokescreens and democratized cyberattacks"},"content":{"rendered":"<figure id=\"attachment_20778\" aria-describedby=\"caption-attachment-20778\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20778\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg 680w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps-18x12.jpg 18w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps-375x250.jpg 375w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps-524x350.jpg 524w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-20778\" class=\"wp-caption-text\">Looking back to 2024 and forward to 2025: Cloud attacks, generative AI and supply chain attacks are shaping cyber security. (Image: www.depositphotos.com)<\/figcaption><\/figure>\n<p>So what can we expect in terms of cyber security in 2025?<\/p>\n<h3><strong>1. attackers are increasingly focusing on the cloud<\/strong><\/h3>\n<p>As more organizations protect their devices with Endpoint Detection and Response (EDR) and multi-factor authentication (MFA) becomes more prevalent, ransomware attackers are increasingly targeting cloud resources that don't normally have MFA. The \"prize\" for criminals is no longer passwords, but authentication tokens and browser cookies<\/p>\n<h3><strong>2. generative AI ensures the \"democratization\" of cybercriminal activities<\/strong><\/h3>\n<p>Tools and techniques used by professional cybercriminals are used as training data by many GenKI platforms. This means that certain cybercriminal activities have been \"democratized\" and low-skilled, opportunistic attackers can now create a phishing lure or ransomware code, for example, without much effort. Due to the lack of professionalism, these attacks have a low success rate, but their mass contributes to tying up the resources of the defenders and thus clearing the way for the professional attackers.<\/p>\n<h3><strong>3. cyber criminals are increasingly setting off smoke and mirrors <\/strong><\/h3>\n<p>Cybercriminals are increasingly using diversionary tactics to disguise their main activities and cause disruption and confusion to defenses. Smaller attack operations tie up response resources and lead to a reduction in the overall effectiveness of defenses. This leads to an imbalance between the good guys and the bad guys, even with well-positioned cyber security.<\/p>\n<h3><strong>4. attacks on the supply chain have a greater impact<\/strong><\/h3>\n<p>Attacks on the software supply chain, the consequences of which extend far beyond the business of individual companies, are an increasingly important element in the attack strategies of cyber criminals. They want to build up as much pressure as possible in order to lend even more weight to their ransom demands and increase the sums extorted.<\/p>\n<h3><strong>5. complex cyberattacks use LLM multi-agent systems<\/strong><\/h3>\n<p>Cybercriminals are also benefiting from the current development in the use of LLMs, which consists of chaining models together to create more complex tasks. For example, instead of just using ChatGPT to write a line of code, cybercriminals can now combine multiple LLMs to create more extensive projects such as AI-generated websites, videos or deepfakes.<\/p>\n<h3><strong>6. cyber criminals strive for more ROI<\/strong><\/h3>\n<p>Exploitation after the successful infiltration of a company is no longer a single-track process. Attackers are increasingly using a \"double-dip\" approach. When they steal cryptocurrencies, for example, they also steal cookies or ID documents to use them for other crimes.<\/p>\n<p><em>Source: <a href=\"https:\/\/www.sophos.com\/de-de\">news.sophos.com<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>In cyber security, the last few years have shown that you have to expect everything. However, as no one can see into the future, it is worth looking back at 2024 to assess developments, anticipate possible scenarios for the future, adapt and look forward to a new year with confidence. Security is well positioned, but vigilance is and remains the top priority. After all, criminals are increasingly opportunistic when it comes to their prey, clients and supporters.<\/p>","protected":false},"author":436,"featured_media":20778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[4178,4496,4492,5510,3813],"class_list":["post-20777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-cloud","tag-cyberattacke","tag-cyberkriminalitaet","tag-generative-ki","tag-software"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/cybertrends-2025-criminal-smokescreens-and-democratized-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersicherheit 2025\" \/>\n<meta property=\"og:description\" content=\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/cybertrends-2025-criminal-smokescreens-and-democratized-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-31T09:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dzana Muminovic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersicherheit 2025\" \/>\n<meta name=\"twitter:description\" content=\"#R\u00fcckblick auf 2024 und #Ausblick auf 2025: #Cloud-Angriffe, generative #KI und #Lieferketten-#Angriffe pr\u00e4gen die #Cybersicherheit.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dzana Muminovic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\"},\"author\":{\"name\":\"Dzana Muminovic\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/fec7ef439501699ff11318c09e0e3f71\"},\"headline\":\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken\",\"datePublished\":\"2024-12-31T09:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\"},\"wordCount\":415,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\",\"keywords\":[\"Cloud\",\"Cyberattacke\",\"Cyberkriminalit\u00e4t\",\"generative KI\",\"Software\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\",\"url\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\",\"name\":\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\",\"datePublished\":\"2024-12-31T09:00:15+00:00\",\"description\":\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\",\"width\":680,\"height\":454,\"caption\":\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit. (Bild: www.depositphotos.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/fec7ef439501699ff11318c09e0e3f71\",\"name\":\"Dzana Muminovic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/66239b9267e149f63e25b3b77d701d16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/66239b9267e149f63e25b3b77d701d16?s=96&d=mm&r=g\",\"caption\":\"Dzana Muminovic\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/dzana-muminovic\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybertrends 2025: Criminal smokescreens and democratized cyberattacks - MQ Management and Quality","description":"Looking back to 2024 and forward to 2025: Cloud attacks, generative AI and supply chain attacks are shaping cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/cybertrends-2025-criminal-smokescreens-and-democratized-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Cybersicherheit 2025","og_description":"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.","og_url":"https:\/\/www.m-q.ch\/en\/cybertrends-2025-criminal-smokescreens-and-democratized-cyberattacks\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2024-12-31T09:00:15+00:00","og_image":[{"width":680,"height":454,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","type":"image\/jpeg"}],"author":"Dzana Muminovic","twitter_card":"summary_large_image","twitter_title":"Cybersicherheit 2025","twitter_description":"#R\u00fcckblick auf 2024 und #Ausblick auf 2025: #Cloud-Angriffe, generative #KI und #Lieferketten-#Angriffe pr\u00e4gen die #Cybersicherheit.","twitter_image":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","twitter_misc":{"Written by":"Dzana Muminovic","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/"},"author":{"name":"Dzana Muminovic","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/fec7ef439501699ff11318c09e0e3f71"},"headline":"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken","datePublished":"2024-12-31T09:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/"},"wordCount":415,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","keywords":["Cloud","Cyberattacke","Cyberkriminalit\u00e4t","generative KI","Software"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","url":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","name":"Cybertrends 2025: Criminal smokescreens and democratized cyberattacks - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","datePublished":"2024-12-31T09:00:15+00:00","description":"Looking back to 2024 and forward to 2025: Cloud attacks, generative AI and supply chain attacks are shaping cyber security.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","width":680,"height":454,"caption":"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit. (Bild: www.depositphotos.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/fec7ef439501699ff11318c09e0e3f71","name":"Dzana Muminovic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/66239b9267e149f63e25b3b77d701d16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/66239b9267e149f63e25b3b77d701d16?s=96&d=mm&r=g","caption":"Dzana Muminovic"},"url":"https:\/\/www.m-q.ch\/en\/author\/dzana-muminovic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/20777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/436"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=20777"}],"version-history":[{"count":2,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/20777\/revisions"}],"predecessor-version":[{"id":20780,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/20777\/revisions\/20780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/20778"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=20777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=20777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=20777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}