{"id":19524,"date":"2025-09-02T14:12:40","date_gmt":"2025-09-02T04:12:40","guid":{"rendered":"https:\/\/www.pulserecruitment.com.au\/?p=19524"},"modified":"2025-09-02T20:12:54","modified_gmt":"2025-09-02T10:12:54","slug":"august-2025-cybersecurity-recap","status":"publish","type":"post","link":"https:\/\/www.pulserecruitment.com.au\/august-2025-cybersecurity-recap\/","title":{"rendered":"August 2025 Cybersecurity Recap"},"content":{"rendered":"<div id=\"chat-history\" class=\"chat-history-scroll-container\">\n<div id=\"0558c7443fc3197f\" class=\"conversation-container message-actions-hover-boundary ng-star-inserted\">\n<div class=\"response-container ng-tns-c4075186612-64 response-container-with-gpi ng-star-inserted response-container-has-multiple-responses\">\n<div class=\"presented-response-container ng-tns-c4075186612-64\">\n<div class=\"response-container-content ng-tns-c4075186612-64\">\n<div class=\"response-content ng-tns-c4075186612-64\">\n<div id=\"model-response-message-contentr_0558c7443fc3197f\" class=\"markdown markdown-main-panel stronger enable-updated-hr-color\" dir=\"ltr\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"chat-history\" class=\"chat-history-scroll-container\">\n<div id=\"0558c7443fc3197f\" class=\"conversation-container message-actions-hover-boundary ng-star-inserted\">\n<div class=\"response-container ng-tns-c4075186612-64 response-container-with-gpi ng-star-inserted response-container-has-multiple-responses\">\n<div class=\"response-container-footer ng-tns-c4075186612-64\">\n<div class=\"actions-container-v2 ng-tns-c3979938479-67\">\n<div class=\"buttons-container-v2 ng-tns-c3979938479-67 ng-star-inserted\">\n<div class=\"tooltip-anchor-point ng-tns-c3979938479-67 ng-star-inserted\">\n<p>August 2025 will undoubtedly be remembered as a pivotal month in the cybersecurity calendar. It was a period defined by an alarming escalation of third-party vendor compromises, the frantic patching of critical zero-day vulnerabilities, and a stark reminder that the human element remains the weakest link, particularly evident in Australia&#8217;s battle against a surging tide of phishing attacks. From global tech giants to local businesses, no entity seemed immune from the relentless onslaught of cyber threats. This deep dive will unravel the most impactful events, offering crucial insights for businesses and individuals striving to navigate an increasingly perilous digital landscape.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<blockquote><p><img decoding=\"async\" class=\"aligncenter wp-image-18126 size-full\" src=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Finding-the-Best-Tech-Sales-Opportunities.webp\" alt=\"Finding the Best Tech Sales Opportunities\" width=\"1000\" height=\"300\" srcset=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Finding-the-Best-Tech-Sales-Opportunities.webp 1000w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Finding-the-Best-Tech-Sales-Opportunities-300x90.webp 300w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Finding-the-Best-Tech-Sales-Opportunities-768x230.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p><\/blockquote>\n<div id=\"chat-history\" class=\"chat-history-scroll-container\">\n<div id=\"0558c7443fc3197f\" class=\"conversation-container message-actions-hover-boundary ng-star-inserted\">\n<div class=\"response-container ng-tns-c4075186612-64 response-container-with-gpi ng-star-inserted response-container-has-multiple-responses\">\n<div class=\"response-container-footer ng-tns-c4075186612-64\">\n<div class=\"actions-container-v2 ng-tns-c3979938479-67\">\n<div class=\"buttons-container-v2 ng-tns-c3979938479-67 ng-star-inserted\">\n<div class=\"tooltip-anchor-point ng-tns-c3979938479-67 ng-star-inserted\">\n<p>&nbsp;<\/p>\n<h2><b>The Global Echo: When Your Vendor&#8217;s Weakness Becomes Your Breach<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p>The overarching theme of August was the devastating ripple effect of third-party vendor compromises. This isn&#8217;t a new concept, but the scale and sophistication of the attacks observed this month reached unprecedented levels, demonstrating a clear strategic shift by threat actors.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>ShinyHunters and the Salesforce Platform Meltdown<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>At the forefront of this trend was a highly coordinated campaign, widely attributed to the notorious threat group <b>ShinyHunters<\/b> (also tracked by some as UNC6040). Their modus operandi was both clever and concerning: targeting the widely used Salesforce CRM platforms of numerous organizations. Instead of directly attacking the end companies, they found a chink in the armor of the shared service provider.<\/p>\n<p>The primary attack vector involved sophisticated social engineering, specifically &#8220;vishing&#8221; (voice phishing). Attackers would trick employees \u2013 often those with administrative access \u2013 into installing malicious applications or divulging credentials, providing a backdoor into the Salesforce environment. Once inside, they could exfiltrate vast amounts of sensitive customer and business data.<\/p>\n<p>Among the high-profile victims caught in this net were:<\/p>\n<ul>\n<li><b>Google:<\/b> A significant subset of Google&#8217;s business customer database was accessed. While no direct consumer data was compromised, the breach exposed critical business contact information, including names, email addresses, and phone numbers, for their corporate clients. This incident alone highlights how even tech behemoths are vulnerable through their supply chain.<\/li>\n<li><b>Workday:<\/b> The prominent HR and finance software provider also fell victim, with attackers exploiting weaknesses in its Salesforce integrations to extract valuable business contact data. This poses a severe risk for Workday&#8217;s enterprise clients, as the compromised data could facilitate further targeted attacks.<\/li>\n<li><b>Pandora and Chanel:<\/b> These luxury brands experienced parallel breaches, resulting in the exposure of customer data, including names, email addresses, and phone numbers. The common thread again was a compromised third-party platform connected to their operations, underscoring that brand reputation and customer trust are directly tied to the security of every link in their digital chain.<\/li>\n<\/ul>\n<p>These incidents serve as a stark warning: your cybersecurity posture is only as strong as your weakest vendor&#8217;s. Robust third-party risk management, including regular audits and stringent contractual security requirements, is no longer optional \u2013 it&#8217;s foundational.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>Beyond Salesforce: Ransomware and Broader Supply Chain Exploits<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>The third-party vulnerability wasn&#8217;t limited to Salesforce. August also saw other significant supply chain and direct ransomware attacks:<\/p>\n<ul>\n<li><b>TransUnion:<\/b> The global credit reporting agency disclosed a breach affecting over <b>4.4 million customers<\/b>. The root cause was unauthorized access to a third-party application, allowing attackers to siphon off personal information. The implications for identity theft and financial fraud for those affected are severe.<\/li>\n<li><b>Manpower:<\/b> The international staffing giant confirmed it was hit by the <b>RansomHub<\/b> ransomware group. The attackers utilized a double-extortion model, not only encrypting systems but also exfiltrating a reported <b>500GB of data<\/b> before demanding a ransom.<\/li>\n<li><b>DaVita:<\/b> A ransomware attack on the dialysis firm affected <b>2.7 million people<\/b>, impacting critical patient records and other sensitive information. Breaches in healthcare are particularly devastating due to the highly personal and sensitive nature of the data involved.<\/li>\n<li><b>Orange Belgium:<\/b> The prominent telecom company detected a cyberattack that resulted in unauthorized access to data from <b>850,000 customer accounts<\/b>, once again proving that critical infrastructure providers are prime targets.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<blockquote><p><img decoding=\"async\" class=\"aligncenter wp-image-18111 size-full\" src=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Structuring-Your-Tech-Sales-Resume-for-Maximum-Impact.webp\" alt=\"Structuring Your Tech Sales Resume for Maximum Impact\" width=\"1000\" height=\"300\" srcset=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Structuring-Your-Tech-Sales-Resume-for-Maximum-Impact.webp 1000w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Structuring-Your-Tech-Sales-Resume-for-Maximum-Impact-300x90.webp 300w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/01\/Structuring-Your-Tech-Sales-Resume-for-Maximum-Impact-768x230.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<div id=\"chat-history\" class=\"chat-history-scroll-container\">\n<div id=\"0558c7443fc3197f\" class=\"conversation-container message-actions-hover-boundary ng-star-inserted\">\n<div class=\"response-container ng-tns-c4075186612-64 response-container-with-gpi ng-star-inserted response-container-has-multiple-responses\">\n<div class=\"response-container-footer ng-tns-c4075186612-64\">\n<div class=\"actions-container-v2 ng-tns-c3979938479-67\">\n<div class=\"buttons-container-v2 ng-tns-c3979938479-67 ng-star-inserted\">\n<div class=\"tooltip-anchor-point ng-tns-c3979938479-67 ng-star-inserted\">\n<h2><b>The Constant Battle: Critical Vulnerabilities and Emerging Threats<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p>Even without third-party exploits, the cybersecurity community was kept on its toes by a stream of critical vulnerabilities and the evolving nature of threats.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>Microsoft&#8217;s Patch Tuesday: A Zero-Day Emergency<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Microsoft&#8217;s August 2025 security update was particularly heavy, addressing a staggering <b>107 vulnerabilities<\/b>. Among these, the most critical fix targeted a publicly disclosed and actively exploited <b>zero-day vulnerability<\/b> in Windows Kerberos (CVE-2025-53779). This flaw could allow an authenticated attacker to gain domain administrator privileges, effectively handing over the keys to an entire network. The urgency for immediate patching couldn&#8217;t be overstated. The update also included crucial fixes for remote code execution flaws in Windows Graphics Component and GDI+, which are frequently exploited vectors for initial access.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>Network Devices Under Siege: Citrix and Fortinet Flaws<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Perimeter network devices, often the first line of defense, continued to be prime targets.<\/p>\n<ul>\n<li>Hackers exploited a memory-overflow flaw (CVE-2025-6543) in <b>Citrix NetScaler ADC and Gateway<\/b> to breach critical infrastructure in the Netherlands. These devices are widely used for secure remote access and load balancing, making their compromise incredibly dangerous.<\/li>\n<li><b>Fortinet<\/b> issued an urgent warning to customers, advising immediate patching for a critical remote unauthenticated command injection flaw in FortiSIEM (CVE-2025-25256). The alarm was raised due to the public circulation of functional exploit code, indicating that attacks were imminent or already underway.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>The AI Threat Becomes Real: &#8216;PromptLock&#8217; Ransomware<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Perhaps one of the most concerning developments was the identification of the first known proof-of-concept for <b>AI-powered ransomware, dubbed &#8216;PromptLock.&#8217;<\/b> This innovative threat leverages generative AI to create highly customized and evasive malicious scripts, making traditional signature-based detection more challenging. While still in its early stages, &#8216;PromptLock&#8217; signals a terrifying new frontier where AI can be weaponized to make cyberattacks more sophisticated, personalized, and scalable.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>Persistent State-Sponsored Activity<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>State-sponsored actors continued their relentless campaigns:<\/p>\n<ul>\n<li>The <b>FBI<\/b> issued a warning about Russian government-linked cyber actors actively targeting networking devices and critical infrastructure, demonstrating a continued focus on disruption and espionage.<\/li>\n<li>A China-linked APT (Advanced Persistent Threat) group, <b>&#8216;Salt Typhoon,&#8217;<\/b> was found to have maintained persistent access to critical infrastructure globally for years by stealthily exploiting known router flaws. This highlights the long-term, patient nature of state-level cyber espionage.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<blockquote><p><img decoding=\"async\" class=\"aligncenter wp-image-17808 size-full\" src=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/12\/Understanding-the-Challenges-of-Tech-Sales-Staffing.webp\" alt=\"Understanding the Challenges of Tech Sales Staffing\" width=\"1000\" height=\"300\" srcset=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/12\/Understanding-the-Challenges-of-Tech-Sales-Staffing.webp 1000w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/12\/Understanding-the-Challenges-of-Tech-Sales-Staffing-300x90.webp 300w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/12\/Understanding-the-Challenges-of-Tech-Sales-Staffing-768x230.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<div id=\"chat-history\" class=\"chat-history-scroll-container\">\n<div id=\"0558c7443fc3197f\" class=\"conversation-container message-actions-hover-boundary ng-star-inserted\">\n<div class=\"response-container ng-tns-c4075186612-64 response-container-with-gpi ng-star-inserted response-container-has-multiple-responses\">\n<div class=\"response-container-footer ng-tns-c4075186612-64\">\n<div class=\"actions-container-v2 ng-tns-c3979938479-67\">\n<div class=\"buttons-container-v2 ng-tns-c3979938479-67 ng-star-inserted\">\n<div class=\"tooltip-anchor-point ng-tns-c3979938479-67 ng-star-inserted\">\n<h2><b>Australia in the Crosshairs: Local Incidents and a Phishing Epidemic<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p>While global trends reverberated Down Under, Australia also grappled with its own specific set of cybersecurity challenges in August.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>High-Profile Australian Breaches<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li><b>iiNet Data Breach:<\/b> One of the most significant domestic incidents was the data breach at Australian internet service provider iiNet. The company confirmed that an unknown third party gained unauthorized access to its order management system using stolen employee credentials. The breach exposed the personal data of over <b>280,000 customers<\/b>. While iiNet stated no financial information or identity documents were compromised, the stolen data\u2014including email addresses, phone numbers, and some physical addresses\u2014leaves customers highly vulnerable to targeted phishing attempts, identity theft, and other malicious scams.<\/li>\n<li><b>Belmont Christian College Ransomware Claims:<\/b> The education sector, a frequent target, saw Belmont Christian College in New South Wales reportedly hit by a ransomware group. The attackers claimed responsibility and asserted they exfiltrated student and employee data. This incident reinforces the ongoing threat ransomware poses to Australian schools, where data sensitivity is extremely high.<\/li>\n<li><b>Wine Works Australia Ransomware Attack:<\/b> The ransomware group Direwolf claimed an attack on Wine Works Australia, a significant player in the wine production and distribution industry. The group alleged they stole a substantial <b>22GB of data<\/b>, including critical financial and customer records. While the company had not publicly confirmed the claims at the time, such incidents can cause severe operational disruption and reputational damage.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>The Alarming Surge in Phishing<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Perhaps the most pervasive and concerning trend for Australia in August was the dramatic increase in successful phishing attempts. A report from the <b>Australian Cyber Security Magazine<\/b> painted a grim picture: the rate of Australian workers clicking on phishing links has <b>more than doubled (a 140% increase)<\/b> in the last nine months. This statistic is a stark reminder that even with advanced technological defenses, the human element remains the most exploited vulnerability. Sophisticated social engineering, often leveraging current events or personalized lures, continues to be incredibly effective in bypassing security controls.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #2c9a63;\"><b>Government Response and Regulatory Evolution<\/b><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>The Australian Government and its cybersecurity agencies were active in responding to and preparing for these threats:<\/p>\n<ul>\n<li><b>Australian Signals Directorate (ASD) and ACSC Alerts:<\/b> The <b>Australian Cyber Security Centre (ACSC)<\/b>, part of the ASD, issued critical advisories throughout August. These included:\n<ul>\n<li>A joint advisory with international partners warning specifically about Chinese state-sponsored actors compromising networks worldwide, explicitly mentioning those within Australia, for global espionage activities.<\/li>\n<li>An urgent alert regarding multiple critical vulnerabilities in <b>Citrix NetScaler ADC and Gateway devices<\/b>, emphasizing their active exploitation and the need for immediate patching.<\/li>\n<\/ul>\n<\/li>\n<li><b>Evolving Cybersecurity Strategy:<\/b> The Australian Government also released a pivotal discussion paper on the second phase of its <b>2023-2030 Cyber Security Strategy<\/b>. This signifies a deeper commitment to embedding robust cyber standards across Australian society and enhancing the country&#8217;s regulatory framework. Key areas of discussion included:\n<ul>\n<li>The potential for harmonizing Australia&#8217;s currently complex and sometimes fragmented cybersecurity regulatory landscape.<\/li>\n<li>Initiatives aimed at significantly uplifting cyber standards for small and medium-sized businesses (SMBs), often the most vulnerable due to limited resources.<\/li>\n<li>Exploring the implementation of a &#8220;safe harbour&#8221; for ethical hackers and security researchers who responsibly discover and disclose vulnerabilities, encouraging more proactive security.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>Navigating the Future: Key Takeaways for Robust Cyber Defense<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p>The events of August 2025 offer invaluable lessons for organizations globally and particularly in Australia.<\/p>\n<ol start=\"1\">\n<li><b>Prioritize Third-Party Risk Management:<\/b> It&#8217;s no longer enough to secure your own perimeter. Vigorously vet all vendors, understand their security postures, and ensure contractual agreements reflect robust security standards. Implement continuous monitoring of third-party access and data handling.<\/li>\n<li><b>Patch Diligently and Swiftly:<\/b> The constant flow of critical vulnerabilities, including zero-days, demands an agile and efficient patching strategy. Automate where possible and prioritize critical updates, especially for operating systems and network devices.<\/li>\n<li><b>Invest in Human Firewalls: Enhanced Security Awareness Training:<\/b> The alarming phishing statistics underscore that people are the primary target. Implement frequent, engaging, and realistic security awareness training that focuses on identifying social engineering tactics, recognizing phishing attempts, and understanding the risks of credential compromise.<\/li>\n<li><b>Embrace Multi-Factor Authentication (MFA):<\/b> This remains one of the most effective deterrents against credential theft. Implement MFA across all critical systems and for all users, particularly those with administrative privileges.<\/li>\n<li><b>Develop Incident Response Plans:<\/b> Breaches are increasingly inevitable. A well-rehearsed incident response plan can significantly mitigate the damage, reduce downtime, and ensure compliance with reporting obligations.<\/li>\n<li><b>Stay Informed on Emerging Threats:<\/b> The advent of AI-powered ransomware like &#8216;PromptLock&#8217; signifies a new era. Continuously monitor threat intelligence to understand new attack vectors and adapt your defenses accordingly.<\/li>\n<\/ol>\n<p>August 2025 served as a potent reminder that the cybersecurity threat landscape is dynamic, relentless, and increasingly sophisticated. By understanding these trends and proactively implementing robust defense strategies, organizations can significantly improve their resilience against the inevitable challenges ahead.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"text-align: center;\">ARE YOU LOOKING FOR A NEW JOB?<\/p>\n<p style=\"text-align: center;\">Pulse Recruitment is a specialist IT, sales and marketing recruitment agency designed specifically to help find the best sales staff within the highly competitive Asia-Pacific and United States of America market. Find out more by getting in <strong><a href=\"https:\/\/www.pulserecruitment.com.au\/contact-us\/\">contact<\/a><\/strong> with us!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>August 2025 will undoubtedly be remembered as a pivotal month in the cybersecurity calendar. It was a period defined by an alarming escalation of third-party vendor compromises, the frantic patching of critical zero-day vulnerabilities, and a stark reminder that the human element remains the weakest link, particularly evident in Australia&#8217;s battle against a surging tide&hellip;<\/p>\n","protected":false},"author":15,"featured_media":19413,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","footnotes":""},"categories":[77],"tags":[],"class_list":["post-19524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts\/19524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/comments?post=19524"}],"version-history":[{"count":1,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts\/19524\/revisions"}],"predecessor-version":[{"id":19526,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts\/19524\/revisions\/19526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/media\/19413"}],"wp:attachment":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/media?parent=19524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/categories?post=19524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/tags?post=19524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}