{"id":2518,"date":"2026-02-12T13:23:38","date_gmt":"2026-02-12T16:23:38","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2518"},"modified":"2026-02-12T13:23:38","modified_gmt":"2026-02-12T16:23:38","slug":"prezando-pela-ciberseguranca-no-periodo-de-ferias","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/prezando-pela-ciberseguranca-no-periodo-de-ferias\/","title":{"rendered":"Seguran\u00e7a al\u00e9m do escrit\u00f3rio: prezando pela ciberseguran\u00e7a no per\u00edodo de f\u00e9rias"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As f\u00e9rias s\u00e3o um momento de relaxamento e descanso, n\u00e3o \u00e9 mesmo? Uma pausa bem-vinda da rotina agitada do trabalho!\u00a0<\/span><span style=\"font-weight: 400;\">No entanto, mesmo quando estamos longe do escrit\u00f3rio, \u00e9 importante lembrar de que os riscos em ciberseguran\u00e7a continuam a existir. O per\u00edodo de f\u00e9rias pode, inclusive, ser uma \u00e9poca especialmente vulner\u00e1vel para ataques digitais.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vamos entender os riscos ligados \u00e0 ciberseguran\u00e7a durante as f\u00e9rias? A seguir, voc\u00ea aprender\u00e1 algumas orienta\u00e7\u00f5es sobre como voc\u00ea pode se proteger enquanto curte um merecido descanso.<\/span><\/p>\n<h2><b>Quais riscos podem existir nas f\u00e9rias?<\/b><\/h2>\n<p><b>E-mails de phishing:<\/b><span style=\"font-weight: 400;\"> Durante as f\u00e9rias, voc\u00ea pode receber e-mails de phishing disfar\u00e7ados de reservas de hot\u00e9is, ofertas de passagens a\u00e9reas ou oportunidades de fechar pacotes incr\u00edveis. \u00c9 poss\u00edvel, at\u00e9 mesmo, que voc\u00ea se depare com supostas felicita\u00e7\u00f5es de colegas de trabalho ou e-mails de confirma\u00e7\u00e3o de datas do departamento de recursos humanos, que, na verdade, s\u00e3o cibercriminosos tentando obter informa\u00e7\u00f5es pessoais ou financeiras.\u00a0<\/span><\/p>\n<p><b>Redes Wi-Fi p\u00fablicas:<\/b><span style=\"font-weight: 400;\"> Muitas pessoas usam redes Wi-Fi p\u00fablicas em hot\u00e9is, caf\u00e9s e aeroportos enquanto viajamos. Essas redes s\u00e3o frequentemente menos seguras do que as redes privadas, tornando-se alvos ideais para ataques de invasores.\u00a0<\/span><\/p>\n<p><b>Excesso de compartilhamento nas redes sociais:<\/b><span style=\"font-weight: 400;\"> Compartilhar fotos e atualiza\u00e7\u00f5es sobre as suas f\u00e9rias pode ser divertido, mas tamb\u00e9m potencialmente perigoso. Os criminosos podem usar essas informa\u00e7\u00f5es para planejar ataques de phishing direcionados ou at\u00e9 mesmo para cometer outros tipos de crime, que extrapolam o \u00e2mbito digital.<\/span><\/p>\n<h2><b>Como se proteger durante as f\u00e9rias?<\/b><\/h2>\n<p><b>Aten\u00e7\u00e3o com os aparelhos corporativos: <\/b><span style=\"font-weight: 400;\">Se poss\u00edvel, durante o per\u00edodo de f\u00e9rias, deixe em casa tanto o computador como outros aparelhos usados para o trabalho. Encerre, tamb\u00e9m, a sess\u00e3o do e-mail corporativo no seu celular pessoal. Se voc\u00ea precisar levar o laptop por alguma raz\u00e3o, sempre o carregue na bagagem de m\u00e3o.\u00a0<\/span><\/p>\n<p><b>N\u00e3o se conecte a redes p\u00fablicas:<\/b><span style=\"font-weight: 400;\"> Prefira sempre usar o seu plano de dados m\u00f3vel para navegar pela internet durante as suas viagens. Caso seja necess\u00e1rio se conectar a uma rede p\u00fablica em algum momento, lembre-se de usar uma rede virtual privada (VPN) para criptografar a sua conex\u00e3o com a internet.<\/span><\/p>\n<p><b>Evite portas USB desconhecidas: <\/b><span style=\"font-weight: 400;\">Embora pare\u00e7am convenientes, <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/scams\/juice-jacking-the-dangers-behind-public-usb-ports\/\">portas USB p\u00fablicas<\/a> presentes em aeroportos, \u00f4nibus e quartos de hotel acarretam riscos para a seguran\u00e7a das suas informa\u00e7\u00f5es. Elas podem ter sido alteradas por algu\u00e9m malicioso para extrair dados ou instalar um malware no seu aparelho.\u00a0<\/span><\/p>\n<p><b>Cuidado com e-mails suspeitos:<\/b><span style=\"font-weight: 400;\"> Desconfie de e-mails que solicitem informa\u00e7\u00f5es pessoais ou financeiras. Verifique sempre a legitimidade do remetente e n\u00e3o clique em links suspeitos.<\/span><\/p>\n<p><b>Cuidado com o que voc\u00ea posta nas redes sociais:<\/b><span style=\"font-weight: 400;\"> Evite compartilhar detalhes espec\u00edficos sobre as suas f\u00e9rias, como fotos de passagens, datas espec\u00edficas e localiza\u00e7\u00f5es exatas.<\/span><\/p>\n<p><b>Crie c\u00f3pias de seguran\u00e7a:<\/b><span style=\"font-weight: 400;\"> Fa\u00e7a backup dos dados importantes armazenados em dispositivos m\u00f3veis e computadores. Desse modo, voc\u00ea poder\u00e1 recuper\u00e1-los em caso de perda ou roubo.<\/span><\/p>\n<p><b>Ative as op\u00e7\u00f5es de localiza\u00e7\u00e3o remota do celular: <\/b><span style=\"font-weight: 400;\">Verifique se as op\u00e7\u00f5es de localiza\u00e7\u00e3o remota do seu dispositivo m\u00f3vel est\u00e3o ativadas. Elas podem te ajudar a excluir todas as informa\u00e7\u00f5es do aparelho em caso de perda ou roubo \u2014 e por isso o backup \u00e9 importante!<\/span><\/p>\n<h2><b>Conclus\u00e3o<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A ciberseguran\u00e7a \u00e9 uma responsabilidade que deve ser praticada em todos os momentos. Ao adotar essas pr\u00e1ticas simples, voc\u00ea pode proteger as suas informa\u00e7\u00f5es pessoais e corporativas \u2014 e, assim, curtir suas f\u00e9rias tranquilamente!<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Vacations are a time for relaxation and rest, aren&#8217;t they? They\u2019re a welcome break from the hectic routine of work!\u00a0However, even when we&#8217;re away from the office, it&#8217;s important to remember that cybersecurity risks continue to exist. The vacation period can even be a particularly vulnerable time for digital attacks.\u00a0 Let&#8217;s take a look at [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2520,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[76,64,141],"class_list":["post-2518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-best-practices","tag-cybersecurity","tag-vacation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security beyond the office: ensuring cybersecurity while on vacation | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Stay cyber-safe on vacation. Learn how to avoid phishing, public Wi-Fi risks, and social media threats while protecting your data.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security beyond the office: ensuring cybersecurity while on vacation | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Stay cyber-safe on vacation. Learn how to avoid phishing, public Wi-Fi risks, and social media threats while protecting your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/prezando-pela-ciberseguranca-no-periodo-de-ferias\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-12T16:23:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Security beyond the office: ensuring cybersecurity while on vacation\",\"datePublished\":\"2026-02-12T16:23:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/\"},\"wordCount\":527,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png\",\"keywords\":[\"best practices\",\"cybersecurity\",\"vacation\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/\",\"name\":\"Security beyond the office: ensuring cybersecurity while on vacation | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png\",\"datePublished\":\"2026-02-12T16:23:38+00:00\",\"description\":\"Stay cyber-safe on vacation. Learn how to avoid phishing, public Wi-Fi risks, and social media threats while protecting your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png\",\"width\":1500,\"height\":1000,\"caption\":\"vacation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security beyond the office: ensuring cybersecurity while on vacation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security beyond the office: ensuring cybersecurity while on vacation | Hacker Rangers","description":"Stay cyber-safe on vacation. Learn how to avoid phishing, public Wi-Fi risks, and social media threats while protecting your data.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Security beyond the office: ensuring cybersecurity while on vacation | Hacker Rangers","og_description":"Stay cyber-safe on vacation. Learn how to avoid phishing, public Wi-Fi risks, and social media threats while protecting your data.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/prezando-pela-ciberseguranca-no-periodo-de-ferias\/","og_site_name":"Hacker Rangers","article_published_time":"2026-02-12T16:23:38+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Security beyond the office: ensuring cybersecurity while on vacation","datePublished":"2026-02-12T16:23:38+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/"},"wordCount":527,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png","keywords":["best practices","cybersecurity","vacation"],"articleSection":["Awareness"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/","name":"Security beyond the office: ensuring cybersecurity while on vacation | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png","datePublished":"2026-02-12T16:23:38+00:00","description":"Stay cyber-safe on vacation. Learn how to avoid phishing, public Wi-Fi risks, and social media threats while protecting your data.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2026\/02\/vacation.png","width":1500,"height":1000,"caption":"vacation"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/security-beyond-the-office-ensuring-cybersecurity-while-on-vacation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Security beyond the office: ensuring cybersecurity while on vacation"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2518"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2518\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2520"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}