{"id":10529,"date":"2026-03-12T10:35:10","date_gmt":"2026-03-12T08:35:10","guid":{"rendered":"https:\/\/the-s-unit.nl\/?p=10529"},"modified":"2026-03-12T10:35:11","modified_gmt":"2026-03-12T08:35:11","slug":"dit-zijn-de-verwachte-cyberdreigingen-in-2026","status":"publish","type":"post","link":"https:\/\/the-s-unit.nl\/en\/dit-zijn-de-verwachte-cyberdreigingen-in-2026\/","title":{"rendered":"These are the expected cyber threats in 2026\u00a0"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"10529\" class=\"elementor elementor-10529\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5965255 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5965255\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b0d935\" data-id=\"3b0d935\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4704a9 elementor-widget elementor-widget-heading\" data-id=\"c4704a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/the-s-unit.nl\/en\/consultancy\/trends-nieuws-inzicht\/\">Threats &amp; Insights<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1efc667 elementor-widget elementor-widget-heading\" data-id=\"1efc667\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">These are the expected cyber threats in 2026 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3ab7c3 elementor-widget elementor-widget-image\" data-id=\"b3ab7c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"420\" src=\"https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026-1024x538.jpg\" class=\"attachment-large size-large wp-image-10537\" alt=\"Dit zijn de verwachte cyberdreigingen van 2026\" srcset=\"https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026-1024x538.jpg 1024w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026-300x158.jpg 300w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026-768x403.jpg 768w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026-18x9.jpg 18w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026-600x315.jpg 600w, https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cbedaf elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7cbedaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">The cyber threat landscape is changing rapidly. New technologies such as AI, dependencies in software supply chains, and geopolitical tensions are increasing its complexity. At the same time, phishing remains an effective attack technique and the threat of ransomware attacks continues to grow. Which threats will play a major role in 2026, and how can organizations prepare for them?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bdbac21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bdbac21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8fc30ef\" data-id=\"8fc30ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-405b401 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"405b401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. AI versus AI security <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35f3efb elementor-widget elementor-widget-spacer\" data-id=\"35f3efb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e418df elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5e418df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Artificial Intelligence is evolving rapidly and creating new opportunities for software development and security analysis. Developers are already using AI to identify vulnerabilities more quickly, analyze code, and automatically generate new code. In some cases, AI can even suggest ways to fix security issues.<\/p><p><span class=\"TextRun SCXW158811624 BCX8\" lang=\"NL-NL\" xml:lang=\"NL-NL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW158811624 BCX8\">The rapid development of AI also introduces new risks. Automatically generated code can contain errors, and attackers are using AI to carry out attacks faster and on a larger scale. As a result, the likelihood of new, unknown vulnerabilities (0-days) is increasing.\u00a0<\/span><\/span><span class=\"EOP SCXW158811624 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><p>The use of autonomous AI systems raises an important question: can an AI fix a vulnerability without unintentionally creating a new one? Therefore, the use of AI requires active monitoring and clear governance within your organization\u2019s security strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f206463 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f206463\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b71385\" data-id=\"8b71385\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c569f1d elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"c569f1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Supply chain attacks are increasing <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1603f02 elementor-widget elementor-widget-spacer\" data-id=\"1603f02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-852bb26 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"852bb26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More and more software relies on external components, such as NPM packages and PyPI libraries, which are automatically updated. This speeds up development but also increases the attack surface.<\/p><p><span class=\"TextRun SCXW195493524 BCX8\" lang=\"NL-NL\" xml:lang=\"NL-NL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW195493524 BCX8\">Attackers are therefore increasingly targeting the source: the developers of these packages or the update mechanisms through which they are distributed. By embedding themselves in external components, they can secretly introduce malicious code.\u00a0<\/span><\/span><span class=\"EOP SCXW195493524 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><p>Supply chain attacks are therefore difficult to detect. Effective patch management, insight into the software components in use (SBOM), and the ability to respond quickly when a component is compromised help organizations identify these attacks earlier.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-353cd74 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"353cd74\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ceb6835\" data-id=\"ceb6835\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0caed3 elementor-widget elementor-widget-heading\" data-id=\"a0caed3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Geopolitical tensions as a cyber risk <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c675405 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c675405\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Many business processes run on cloud platforms operated by foreign organizations. In a geopolitical conflict, a country may decide to restrict or even block access to these systems. This can directly impact business continuity, access to data, and the availability of applications.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">A well-considered cloud strategy helps organizations be better prepared. Organizations can think in advance about possible risk profiles and alternatives for critical business processes. This reduces the risk of business operations being disrupted for an extended period.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f6c20c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f6c20c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d067269\" data-id=\"d067269\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f252696 elementor-widget elementor-widget-heading\" data-id=\"f252696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. The further evolution of Ransomware-as-a-Service <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6c6923 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c6c6923\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The continued evolution of Ransomware-as-a-Service (RaaS) has significantly lowered the barrier for cybercriminals. As a result, the number of ransomware attacks is rising sharply. Malware, infrastructure, and support are now offered as complete services on the dark web.<\/p><p><span data-contrast=\"auto\">In addition, attackers\u2019 messages are becoming more direct: pay up, or we will publish your stolen data. In doing so, attackers skip steps in the process, such as first encrypting systems. This makes the situation even more complex and requires a rapid response.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p>A well-prepared Incident Response Plan (IRP) helps organizations respond more quickly. By making clear agreements in advance about decision-making, communication, and the impact of a data breach, organizations can limit damage and reputational risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20521e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20521e3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-754c1ef\" data-id=\"754c1ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-876ce78 elementor-widget elementor-widget-heading\" data-id=\"876ce78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Phishing remains an effective attack technique  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b74f2eb elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b74f2eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"translation-block\">Despite all technological developments, phishing remains one of the most successful attack techniques. Attackers exploit human factors such as time pressure, authority, curiosity, and confusion. With the help of AI, phishing attacks are also becoming more realistic, more personalized, and easier to execute at scale.<\/p><p class=\"translation-block\">A recent development is the so-called ClickFix attack, in which users are guided step by step through an error message to unintentionally grant access to their system. This is why security awareness remains an important layer of defense.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bcf2afe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bcf2afe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1837fe4\" data-id=\"1837fe4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b63d1d4 elementor-widget elementor-widget-heading\" data-id=\"b63d1d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Stay informed about cyber threats <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05de8cd elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"05de8cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our Threats, News &amp; Insights (TNI) service continuously monitors the most important developments in cybersecurity. We translate these trends into concrete risks and insights that are relevant to your organization.<\/p><p class=\"translation-block\"><strong> Curious which threats are relevant to your specific organization and industry?\nRead more about <a href=\"https:\/\/the-s-unit.nl\/en\/consultancy\/trends-nieuws-inzicht\/\" target=\"_self\">Threats, News &amp; Insights<\/a>, or contact one of our <a href=\"https:\/\/the-s-unit.nl\/en\/contact\/\" target=\"_self\">consultants<\/a>.\u00a0<\/span><\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50d4d15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50d4d15\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8dc170a\" data-id=\"8dc170a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28a8e99 elementor-widget elementor-widget-spacer\" data-id=\"28a8e99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Mendix is a leading low-code platform that enables organizations to rapidly develop, integrate, and scale applications efficiently.<\/p>","protected":false},"author":17,"featured_media":10537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[],"class_list":["post-10529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats-insights"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/the-s-unit.nl\/wp-content\/uploads\/2026\/03\/Banner-glowing-futuristic-numbers-2026.jpg","_links":{"self":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/posts\/10529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/comments?post=10529"}],"version-history":[{"count":10,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/posts\/10529\/revisions"}],"predecessor-version":[{"id":10540,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/posts\/10529\/revisions\/10540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/media\/10537"}],"wp:attachment":[{"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/media?parent=10529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/categories?post=10529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/the-s-unit.nl\/en\/wp-json\/wp\/v2\/tags?post=10529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}