{"id":25754,"date":"2026-05-07T06:10:55","date_gmt":"2026-05-07T10:10:55","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=25754"},"modified":"2026-05-07T15:37:14","modified_gmt":"2026-05-07T11:37:14","slug":"passwords-hacking-research-2026","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/passwords-hacking-research-2026\/25754\/","title":{"rendered":"Cracked in under a minute: (nearly) every other password"},"content":{"rendered":"<p>Every year, hundreds of millions of real user passwords leak onto the dark web. We analyzed 231 million unique passwords from dark-web leaks between 2023 and 2026, and the conclusions are bleak: the vast majority are extremely weak. To crack 60% of these passwords, a hacker needs only an hour and a few dollars in their pocket. Furthermore, password cracking is accelerating by the year; in <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">our similar 2024 study<\/a>, the percentage of vulnerable passwords was lower.<\/p>\n<p>Today we\u2019re looking at just how reliable the average password is (spoiler: not really), and how you can secure your data and accounts using more robust methods. At the same time, we\u2019ll highlight the patterns most commonly found in actual user passwords.<\/p>\n<h2>How passwords are cracked<\/h2>\n<p>In our previous study, we detailed the <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">methods for storing and cracking passwords<\/a>, but here\u2019s a quick refresher on the essentials.<\/p>\n<p>These days, passwords are almost never stored in plain text. For instance, if you create an account with the password \u201cPassword123!\u201d, the server won\u2019t store it as-is. Instead, the password is <a href=\"https:\/\/www.kaspersky.com\/blog\/the-wonders-of-hashing\/4441\/\" target=\"_blank\" rel=\"noopener nofollow\">hashed<\/a> using specific algorithms, turning it into a fixed-length string of letters and numbers (a hash) which is what actually stays on the server. For example, here\u2019s what the MD5 hash for \u201cPassword123!\u201d looks like:<\/p>\n<p><code>2c103f2c4ed1e59c0b4e2e01821770fa<\/code>.<\/p>\n<p>Every time the user enters their password, it\u2019s converted into a hash and compared against the one stored on the server; if the hashes match, the password is correct. If an attacker gets their hands on this hash, they have to decrypt it to recover the original password \u2014 this is what\u2019s known as \u201cpassword cracking\u201d. This is typically done using owned or rented GPUs, and several methods can be employed for the crack:<\/p>\n<ul>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Brute-force_search\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Exhaustive enumeration (brute force)<\/strong><\/a><strong>.<\/strong> The computer tries every possible combination of characters, calculating the hash for each one. This method is the easiest way to crack short passwords, or those consisting of a single character set (such as digits only).<\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Rainbow_table\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Rainbow tables<\/strong><\/a><strong>.<\/strong> A total nightmare for anyone with a simple password, this is essentially a \u201cphone book\u201d for passwords whose hashes have already been cracked via brute force or smart algorithms. All an attacker has to do is find a matching hash and see which password corresponds to it.<\/li>\n<li><strong>Smart cracking<\/strong>. These algorithms are trained on databases of leaked passwords. They understand the frequency of different character combinations, and run their checks from the most likely to the least popular sequences. They account for dictionary words, character substitutions (a \u2192 @ or s \u2192 $), and consider common password structures like \u201cdictionary word + number + special character\u201d, while checking hashes against rainbow tables. Combining these methods significantly accelerates the cracking process.<\/li>\n<\/ul>\n<p>Beyond that, attackers can also intercept passwords in plain text. There are numerous ways to do this, ranging from phishing (where a victim is lured to a fake web page and enters their password voluntarily) and keyloggers that capture keystrokes, to stealers or Trojans that swipe documents, cookies, clipboard data, and more. Unfortunately, many users keep their passwords as plain text in notes, messaging apps, and documents, or save them in browsers where <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-store-passwords-securely\/48784\/\" target=\"_blank\" rel=\"noopener nofollow\">attackers can extract them in seconds<\/a>.<\/p>\n<p>Every year, we track around a hundred million plain-text password leaks. We use these databases to warn <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> users if their data has been compromised. To address the most frequent question we get on this: no, we don\u2019t know our users\u2019 passwords. We\u2019ve explained in non-techie language exactly how we compare your passwords to leaked ones without actually knowing them \u2014 and why neither your passwords stored in <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>nor even their hashes ever leave your device \u2014 in our overviews of <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-international-password-day-2024\/51095\/\" target=\"_blank\" rel=\"noopener nofollow\">our leak analysis technology<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/how-secure-is-your-password-manager\/47034\/\" target=\"_blank\" rel=\"noopener nofollow\">our password manager\u2019s internal architecture<\/a>. Give them a read; you\u2019ll be surprised by just how elegant the design is.<\/p>\n<h2>60% of passwords are cracked in under an hour<\/h2>\n<p>We expanded the database from our previous study by an additional 38 million real passwords posted by attackers on dark-web forums and compared the results. Testing was conducted using a single RTX 5090 GPU for passwords hashed with the MD5 algorithm. The data for the analysis was obtained from our <a href=\"https:\/\/dfi.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Digital Footprint Intelligence<\/a> service. You can review the algorithm we used to assess password strength in <a href=\"https:\/\/securelist.com\/password-brute-force-time\/112984\/\" target=\"_blank\" rel=\"noopener\">our article on Securelist<\/a>.<\/p>\n<p>Unfortunately, passwords remain as weak as ever, while cracking them becomes faster and easier with every year. Today, 60% of passwords can be cracked in less than an hour; two years ago, that figure <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">was<\/a> 59%. But the truly frightening part is something else: <strong>nearly half of all passwords (48%) are cracked in less than a minute<\/strong>!<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"208\">Cracking time<\/td>\n<td width=\"208\">Percentage of passwords crackable within this time in 2024<\/td>\n<td width=\"208\">Percentage of passwords crackable within this time today<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">Less than a minute<\/td>\n<td width=\"208\">45%<\/td>\n<td width=\"208\">48%<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">Less than an hour<\/td>\n<td width=\"208\">59% (+14%)<\/td>\n<td width=\"208\">60% (+12%)<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">Less than 24 hours<\/td>\n<td width=\"208\">67% (+8%)<\/td>\n<td width=\"208\">68% (+8%)<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">Less than a month<\/td>\n<td width=\"208\">73% (+6%)<\/td>\n<td width=\"208\">74% (+6%)<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">Less than a year<\/td>\n<td width=\"208\">77% (+4%)<\/td>\n<td width=\"208\">77% (+3%)<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">More than a year<\/td>\n<td width=\"208\">23%<\/td>\n<td width=\"208\">23%<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"wp-caption aligncenter\">\n<p class=\"wp-caption-text\">Password cracking time: two years ago and today<\/p>\n<\/div>\n<p>Attackers owe this boost in speed to graphics processors, which grow more powerful every year. While an RTX 4090 in 2024 could brute-force MD5 hashes at a rate of 164 gigahashes (billion hashes) per second, the new RTX 5090 has increased that speed by 34% \u2014 reaching 220 gigahashes per second.<\/p>\n<p>And although a high-end video card like that currently retails for several thousand dollars, the price tag isn\u2019t much of a barrier: there are plenty of cheap cloud services available for renting GPU computing power. Depending on the configuration and the model, rental costs range from a few cents to a few dollars per hour. As we\u2019ve seen, one hour is all an attacker needs to crack three out of every five passwords they\u2019ve found in a leak. Plus, depending on the scale of the task, they can always rent ten or even a hundred GPUs instead of just one\u2026<\/p>\n<p>It\u2019s worth noting that cracking <em>every<\/em> password in a dataset doesn\u2019t take much longer than cracking a <em>single one<\/em>. During each iteration, once the attacker calculates a hash for a specific character combination, they check if that same hash exists anywhere in the dataset \u2014 and the larger the dataset, the easier it is to find a match. If a match is found, the corresponding password is flagged as \u201ccracked\u201d, and the algorithm moves along to the next one.<\/p>\n<h2>Which passwords are vulnerable?<\/h2>\n<p>The strength of any password depends on its length, content variety, and the randomness of that content. Passwords created by humans turn out to be the least resilient \u2014 unfortunately, humans are quite predictable. We use dictionary words and character combinations that smart algorithms have long since mastered, we avoid long random strings, and patterns can be found even in keystrokes we believe are random. Interestingly enough, passwords generated by AI still carry the fingerprints of a human approach; we covered this in a separate post on how to create a <a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">strong yet memorable password<\/a>.<\/p>\n<p>Password length is the primary factor affecting cracking time. As you can see from the table below, it takes less than 24 hours to crack almost any eight-character password.<\/p>\n<div id=\"attachment_55758\" style=\"width: 1314px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/05\/07153126\/passwords-hacking-research-2026-01-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55758\" class=\"wp-image-55758 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2026\/05\/07153126\/passwords-hacking-research-2026-01-EN.png\" alt=\"Percentage of varying password lengths crackable within a given timeframe\" width=\"1304\" height=\"432\"><\/a><p id=\"caption-attachment-55758\" class=\"wp-caption-text\">Percentage of varying password lengths crackable within a given timeframe<\/p><\/div>\n<p>But the predictability of your password is just as important. Think you\u2019re boosting security by adding a number or a special character to a memorable word? You are, but only slightly. The patterns people use to create passwords are easily predictable and, at times, pretty amusing \u2014 though this is no laughing matter.<\/p>\n<h2>What we learned about password patterns<\/h2>\n<p>Analysis of over 200 million passwords revealed characteristic patterns that allow smart algorithms to crack user passwords with ease.<\/p>\n<h3>Pick a number<\/h3>\n<p>More than half of all passwords (53%) end with one or more digits, while nearly one in six (17%) starts with a number. Every eighth password (12%) contains sequences that look a lot like years \u2014 ranging from 1950 to 2030 \u2014 and one in ten (10%) specifically falls between 1990 and 2026. This most likely happens because folks add their birth year (or that of someone close), some other significant year, or the year they created the password or account. Fun fact: based on the distribution of these dates, it suggests that the most active internet users were born between 2000 and 2012.<\/p>\n<p>However, among all numeric combinations, the most popular turned out to be\u2026 you guessed it: \u201c1234\u201d. Overall, patterns involving sequential keyboard presses (\u201cqwerty, ,\u201dytrewq\u201d, and the like) appear in 3% of passwords.<\/p>\n<h3>Special characters aren\u2019t a silver bullet<\/h3>\n<p>Most password policies in recent years require at least one special character. The absolute winner in this category is the @ symbol: it appears in one out of every 10 passwords. The period (.) comes in second, followed by the exclamation point (!) in third.<\/p>\n<h3>Love rules the world\u2026 and Skibidi Toilet does too<\/h3>\n<p>Emotionally charged words often form the foundation of a password, and despite everything, positive words are more common. Frequently occurring examples include \u201clove\u201d, \u201cangel\u201d, \u201cteam\u201d, \u201cmate\u201d, \u201clife\u201d, and \u201cstar\u201d. That said, negativity pops up too \u2014 mostly in the form of common English swear words.<\/p>\n<p>Interestingly, viral memes are reflected in passwords as well. Between 2023 and 2026, the use of the word <a href=\"https:\/\/en.wikipedia.org\/wiki\/Skibidi_Toilet\" target=\"_blank\" rel=\"noopener nofollow\">Skibidi<\/a> in passwords skyrocketed 36-fold! Naturally (see the link if it doesn\u2019t seem natural), \u201ctoilet\u201d saw a boost too, though to a lesser extent.<\/p>\n<h2>Users tend to keep their passwords unchanged for years<\/h2>\n<p>More than half of the passwords (54%) we identified in recent leaks have surfaced before. Part of this can be explained by the same data migrating from one dataset to another. However, there\u2019s a much more troubling reason too: many users simply haven\u2019t changed their passwords in years.<\/p>\n<p>Analyzing the dates found within passwords shows that combinations containing the years from 2020 through 2024 remain popular. It seems people add the current year to their password when they create it \u2014 and then forget about it for several years. This actually allows us to calculate the average lifespan of a password: about three to five years.<\/p>\n<p>This is a dangerous trend. For one, smart algorithms can crack much more complex passwords over that kind of timeframe. Secondly, the longer your password remains unchanged, the higher the probability it will leak \u2014 whether through a breach, malware infection, or a phishing attack.<\/p>\n<p>The situation gets even worse when the same password is used across multiple accounts. In this case, attackers don\u2019t even need to crack anything; they just need to find your password in a single leak and plug it into other sites.<\/p>\n<h2>How to protect your passwords and accounts<\/h2>\n<p>If you\u2019ve realized while reading this post that your own passwords are among those easily crackable \u2014 don\u2019t panic. We\u2019ve put together a list of simple but essential tips for you.<\/p>\n<h3>Use a password manager<\/h3>\n<p>The weakest passwords are the ones people come up with themselves. Creating and memorizing hundreds of sequences of 16\u201320 random characters (since every site requires a unique, long password) is a daunting, unrealistic task.<\/p>\n<p>That\u2019s why you should delegate password generation and storage to <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">our password manager<\/a>. It doesn\u2019t just create and store complex, randomized passwords in an encrypted format; it also syncs them across all your devices. To decrypt your vault, you only need to remember one main password that no one knows but you \u2014 our <a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">guide on mnemonic passwords<\/a> can help you with that.<\/p>\n<h3>Don\u2019t store passwords as plain text<\/h3>\n<p>Whatever you do, never write down passwords in files, messages, or documents. They lack the robust encryption provided by a password manager. Furthermore, these kinds of notes fall into the hands of attackers instantly if you happen to pick up a Trojan or an infostealer.<\/p>\n<h3>Don\u2019t store passwords in your browser<\/h3>\n<p>Many users save their passwords in their browsers \u2014 especially since they conveniently offer to do it automatically. Unfortunately, research shows that malware has evolved to <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-store-passwords-securely\/48784\/\" target=\"_blank\" rel=\"noopener nofollow\">extract these passwords<\/a> from all popular browsers almost instantly. <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0can help you import saved passwords from your favorite browser \u2014 just follow our <a href=\"https:\/\/www.kaspersky.com\/blog\/switch-to-kaspersky\/50885\/#:~:text=Importing%20passwords%20from%20browsers\" target=\"_blank\" rel=\"noopener nofollow\">simple, three-step guide<\/a>. Most importantly, don\u2019t forget to clear the browser\u2019s password storage once the import is complete.<\/p>\n<h3>Switch to passkeys<\/h3>\n<p>Wherever possible, use <a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-1\/53688\/\" target=\"_blank\" rel=\"noopener nofollow\">passkeys<\/a> \u2014 a cryptographic replacement for passwords. In this setup, the service stores a public key, while the private key remains on your device and is never transmitted. During login, the device simply signs a one-time request. Additionally, passkeys are tied to a specific domain, meaning phishing attacks using spoofed addresses won\u2019t work. <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0allows you to store both passwords and passkeys, solving the problem of syncing them across different ecosystems, including Windows, Android, macOS, and iOS.<\/p>\n<h3>Set up two-factor authentication<\/h3>\n<p>Enable <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/3906\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> wherever possible. Even if your password is compromised, a properly configured 2FA setup makes it extremely difficult for the attacker to access your account. For maximum security, skip the one-time codes sent via SMS and use authenticator apps instead \u2014 and yes, <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0comes in handy here, too.<\/p>\n<h3>Practice good digital hygiene<\/h3>\n<p>Remember, storing your passwords correctly is only half the battle. It\u2019s crucial to follow the rules of digital hygiene: avoid downloading unverified files, pirated software, cheats, or cracks, and don\u2019t click on random links. The number of infostealer attacks has been steadily rising in recent years, which means you need a robust security solution for full protection. We recommend <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> \u2014 it protects all your devices from Trojans, phishing, and other threats. Besides, the subscription includes <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">our password manager<\/a>.<\/p>\n<blockquote><p>For those serious about account security, check out our collection of posts on passwords, passkeys, and two-factor authentication:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-1\/53688\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Passkeys in 2025: your complete guide to passwordless sign-in<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-2\/53724\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Passkeys in 2025: tips for power users<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Creating an unforgettable password<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-international-password-day-2024\/51095\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>How to create strong passwords and where to store them<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/switch-to-kaspersky\/50885\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Switching to Kaspersky: a step-by-step migration guide<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve revisited our study on the crackability of real-world passwords leaked on the dark web \u2014 originally conducted two years ago. The findings are sobering: nearly every other password can be cracked in under a minute, and three out of five take less than an hour. How can we move away from insecure passwords?<\/p>\n","protected":false},"author":2761,"featured_media":25757,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,1486,9],"tags":[1047,106,519,1021,2601,1183,2707,405,187,43,499,192,805,2151,131,2794],"class_list":{"0":"post-25754","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"category-tips","10":"tag-2fa","11":"tag-applications","12":"tag-hacks","13":"tag-kaspersky-password-manager","14":"tag-kaspersky-premium","15":"tag-leaks","16":"tag-passkeys","17":"tag-password-manager","18":"tag-passwords","19":"tag-privacy","20":"tag-products-2","21":"tag-protection","22":"tag-settings","23":"tag-stealers","24":"tag-tips","25":"tag-two-factor-authentication"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/passwords-hacking-research-2026\/25754\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/passwords-hacking-research-2026\/30702\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/passwords-hacking-research-2026\/30552\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/passwords-hacking-research-2026\/41817\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/passwords-hacking-research-2026\/55743\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/passwords-hacking-research-2026\/30647\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/passwords-hacking-research-2026\/36211\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/passwords-hacking-research-2026\/36104\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2761"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25754"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25754\/revisions"}],"predecessor-version":[{"id":25763,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25754\/revisions\/25763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25757"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}