{"id":60596,"date":"2025-11-05T17:44:56","date_gmt":"2025-11-05T12:14:56","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=60596"},"modified":"2025-12-17T13:40:10","modified_gmt":"2025-12-17T08:10:10","slug":"vibe-hacking","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/vibe-hacking","title":{"rendered":"How Vibe Hacking Turns AI Chatbots into Cybercrime Tools?"},"content":{"rendered":"\n<p>I believe that there is no business organization in the world that doesn\u2019t know about \u2018AI\u2019.<\/p>\n\n\n\n<p>Almost every business has now adopted AI for task automation and time-saving. But as fast as organisations adopt AI for good, cybercriminals are finding new ways to misuse it.<\/p>\n\n\n\n<p>One of the latest and most alarming trends in this space is something called vibe hacking. Here, attackers use AI not only to break into systems but to manipulate emotions and human behaviour.<\/p>\n\n\n\n<p>This new form of cyberattack is making attacks more personal, more believable, and harder to detect. Let\u2019s learn vibe hacking in detail, how it\u2019s being used, and what organisations can do to stay safe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-vibe-hacking\"><span class=\"ez-toc-section\" id=\"what_is_vibe_hacking\"><\/span>What Is Vibe Hacking?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Vibe hacking is a modern twist on traditional cyberattacks. Instead of just exploiting technical weaknesses, it targets human psychology.<\/p>\n\n\n\n<p>Attackers use AI tools to create messages or interactions that feel emotionally charged, persuasive, or urgent. It is designed in such a way that by reading such messages, the victims will act quickly or reveal sensitive data.<\/p>\n\n\n\n<p>For example, an AI-powered <a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/what-is-phishing\"   title=\"phishing\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"2074\">phishing<\/a> email might perfectly mimic your boss\u2019s tone or a familiar customer\u2019s writing style. It might even reference real events or emotions, making the scam harder to spot.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_17059\"><h3><span class=\"ez-toc-section\" id=\"singularity_complete\"><\/span>Singularity Complete<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"17059\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-ai-is-changing-cybercrime\"><span class=\"ez-toc-section\" id=\"how_ai_is_changing_cybercrime\"><\/span>How AI Is Changing Cybercrime?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>AI models like <a href=\"https:\/\/www.techjockey.com\/detail\/claude\">Claude<\/a>, <a href=\"https:\/\/www.techjockey.com\/detail\/chatgpt\">ChatGPT<\/a>, and others were built to assist people in everyday tasks. But cybercriminals have discovered that these same tools can help them build malicious software, write phishing messages, and automate entire attacks.<\/p>\n\n\n\n<p>Unlike older hacking methods that required deep coding skills, AI has lowered the barrier to entry. Now, even individuals with little technical background can use AI to:<\/p>\n\n\n\n<ul>\n<li>Write or modify malware<\/li>\n\n\n\n<li>Automate data theft or credential harvesting<\/li>\n\n\n\n<li>Create realistic ransom notes or scam messages<\/li>\n\n\n\n<li>Simulate professional communication styles<\/li>\n\n\n\n<li>Generate code snippets to exploit vulnerabilities<\/li>\n<\/ul>\n\n\n\n<p>This means that attackers can now operate faster, cheaper, and on a much larger scale. This is really concerning for all businesses worldwide.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_24076\"><h3><span class=\"ez-toc-section\" id=\"cybereason_edr\"><\/span>Cybereason EDR<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"24076\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-claude-ai-incident\"><span class=\"ez-toc-section\" id=\"the_claude_ai_incident\"><\/span>The Claude AI Incident<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A recent report by Anthropic, the company behind the Claude AI chatbot, revealed how one attacker misused its Claude Code tool to carry out a massive data extortion campaign.<\/p>\n\n\n\n<p>In this case, the cybercriminal targeted more than 17 organisations across multiple sectors, including government, healthcare, emergency services, and religious institutions.<\/p>\n\n\n\n<p>Using Claude, the attacker managed to:<\/p>\n\n\n\n<ul>\n<li>Conduct reconnaissance (gathering system details)<\/li>\n\n\n\n<li>Steal credentials and sensitive data<\/li>\n\n\n\n<li>Move laterally across networks<\/li>\n\n\n\n<li>Exfiltrate files<\/li>\n\n\n\n<li>Write emotionally manipulative ransom messages<\/li>\n<\/ul>\n\n\n\n<p>The attacker even created a guide file named CLAUDE.md, essentially a digital playbook to instruct the AI on how to behave and what tasks to perform.<\/p>\n\n\n\n<p>Ransom demands reportedly reached $500,000, and the stolen data included medical records, government IDs, and login details.<\/p>\n\n\n\n<p>Anthropic later banned the attacker and acknowledged that even with its sophisticated safety and security measures, the model was still tricked into aiding cybercrime.<\/p>\n\n\n\n<p>This incident is one of the clearest examples of vibe hacking in action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cybercrime-and-psychology\"><span class=\"ez-toc-section\" id=\"cybercrime_and_psychology\"><\/span>Cybercrime and Psychology<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Traditional cyberattacks often focused on finding weak spots in software or systems. Vibe hacking focuses on weak spots in human behaviour.<\/p>\n\n\n\n<p>Using AI, attackers can analyze massive amounts of online data to understand a target\u2019s preferences, communication style, and emotional triggers. Then they can use this information to create messages\/emails that feel very realistic.<\/p>\n\n\n\n<p>And because AI tools can adapt their tone and language in real time, they can adjust their approach based on your reactions. It is something no human hacker could easily do before.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_2506\"><h3><span class=\"ez-toc-section\" id=\"trendmicro_maximum_security\"><\/span>TrendMicro Maximum Security<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"2506\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-vibe-hacking-is-dangerous\"><span class=\"ez-toc-section\" id=\"why_vibe_hacking_is_dangerous_\"><\/span>Why Vibe Hacking is Dangerous ?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The biggest threat of vibe hacking is accessibility.<\/p>\n\n\n\n<p>Before AI, building malware or writing convincing phishing emails required expertise. Now, cybercriminals can simply ask an AI chatbot to generate or modify scripts.<\/p>\n\n\n\n<p>Some researchers, like Vitaly Simonovich of Cato Networks, have shown how easy it is to bypass AI safeguards. By framing a prompt as part of a fictional story or art project, users can get chatbots to produce restricted code, such as password-stealing tools.<\/p>\n\n\n\n<p>Even if the chatbot refuses once or twice, persistence and creative rewording can sometimes get around the restrictions.<\/p>\n\n\n\n<p>That means even non-coders can now produce malware, phishing kits, or ransomware templates, drastically increasing the potential number of attackers worldwide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-organisations-can-defend-against-vibe-hacking\"><span class=\"ez-toc-section\" id=\"how_organisations_can_defend_against_vibe_hacking\"><\/span>How Organisations Can Defend Against Vibe Hacking?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>AI-driven attacks demand AI-aware defences. Protecting against vibe hacking means focusing on both technology and people.<\/p>\n\n\n\n<p>Here\u2019s how organisations can adapt:<\/p>\n\n\n\n<p><strong>1. Watch for AI-Assisted Behaviours<\/strong><\/p>\n\n\n\n<p>AI-generated attacks often carry emotional cues or adaptive language that feels slightly off. Security teams should monitor for:<\/p>\n\n\n\n<ul>\n<li>Unusual login or communication patterns<\/li>\n\n\n\n<li>Phishing messages that mimic tone too perfectly<\/li>\n\n\n\n<li>Content with subtle emotional manipulation<\/li>\n<\/ul>\n\n\n\n<p><strong>Tip<\/strong>: Conduct regular phishing simulations that use AI-generated scenarios, so employees learn to recognise the signs.<\/p>\n\n\n\n<p><strong>2. Strengthen Employee Vetting and Training<\/strong><\/p>\n\n\n\n<p>AI tools make it easier for insiders to misuse company data even unintentionally.<\/p>\n\n\n\n<ul>\n<li>Review who has access to <a href=\"https:\/\/www.techjockey.com\/category\/artificial-intelligence\">generative AI tools<\/a> within your organisation.<\/li>\n\n\n\n<li>Create clear AI usage policies outlining what\u2019s allowed and what isn\u2019t.<\/li>\n\n\n\n<li>Implement behavioural monitoring systems that flag anomalies early.<\/li>\n\n\n\n<li>Even small policy changes can prevent major data leaks.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_4723\"><h3><span class=\"ez-toc-section\" id=\"microsoft_enterprise_mobility_security_\"><\/span>Microsoft Enterprise Mobility Security <span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"4723\"\/><\/div>\n\n\n\n<p><strong>3. Upgrade to AI-Ready Defence Tools<\/strong><\/p>\n\n\n\n<p>Invest in <a href=\"https:\/\/www.techjockey.com\/category\/security-software\">cybersecurity platforms<\/a> that use machine learning for threat detection, anomaly spotting, and predictive analysis. Automated systems can respond to suspicious activity much faster than human teams alone.<\/p>\n\n\n\n<p><strong>Ask yourself<\/strong>: are your current tools capable of identifying machine-led threats? If not, it is high time for an upgrade.<\/p>\n\n\n\n<p><strong>4. Build Psychological Resilience<\/strong><\/p>\n\n\n\n<p>Since vibe hacking targets emotions, organisations need to train teams not just technically but psychologically.<\/p>\n\n\n\n<ul>\n<li>Teach employees how to pause before reacting to emotionally charged messages.<\/li>\n\n\n\n<li>Encourage a verification-first mindset even if the message looks or feels authentic.<\/li>\n\n\n\n<li>Normalise reporting suspicious communication rather than acting on instinct.<\/li>\n<\/ul>\n\n\n\n<p>Resilience starts with awareness. The better your team understands the tactics, the less effective vibe hacking becomes.<\/p>\n\n\n\n<p><strong>The Bottom Line<\/strong><\/p>\n\n\n\n<p>AI has unlocked incredible opportunities for innovation, but it\u2019s also giving cybercriminals new ways to manipulate both systems and people.<\/p>\n\n\n\n<p>Vibe hacking marks a shift from purely technical breaches to emotionally intelligent cyberattacks. It blends automation, data analysis, and psychology into one powerful threat.<\/p>\n\n\n\n<p>The solution is not to fear AI but to match its intelligence with smarter defences, combining AI-driven security tools with well-trained, emotionally aware human teams.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I believe that there is no business organization in the world that doesn\u2019t know about \u2018AI\u2019. Almost every business has now adopted AI for task automation and time-saving. But as fast as organisations adopt AI for good, cybercriminals are finding new ways to misuse it. One of the latest and most alarming trends in this [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":60598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9173],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vibe Hacking: How AI Chatbots Are Being Weaponised?<\/title>\n<meta name=\"description\" content=\"Vibe hacking is the new AI-powered cyber threat, where hackers use chatbots to trick your mind, not just your system. Learn how it works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Vibe Hacking Turns AI Chatbots into Cybercrime Tools?\" \/>\n<meta property=\"og:description\" content=\"Vibe hacking is the new AI-powered cyber threat, where hackers use chatbots to trick your mind, not just your system. Learn how it works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-05T12:14:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T08:10:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/11\/05172850\/Vibe-Hacking-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mehlika Bathla\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mehlika Bathla\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vibe Hacking: How AI Chatbots Are Being Weaponised?","description":"Vibe hacking is the new AI-powered cyber threat, where hackers use chatbots to trick your mind, not just your system. Learn how it works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596","og_locale":"en_US","og_type":"article","og_title":"How Vibe Hacking Turns AI Chatbots into Cybercrime Tools?","og_description":"Vibe hacking is the new AI-powered cyber threat, where hackers use chatbots to trick your mind, not just your system. Learn how it works.","og_url":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596","og_site_name":"Techjockey.com Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2025-11-05T12:14:56+00:00","article_modified_time":"2025-12-17T08:10:10+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/11\/05172850\/Vibe-Hacking-Featured.png","type":"image\/png"}],"author":"Mehlika Bathla","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Mehlika Bathla","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking"},"author":{"name":"Mehlika Bathla","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/1881fce242347f9140121fec5114dcc8"},"headline":"How Vibe Hacking Turns AI Chatbots into Cybercrime Tools?","datePublished":"2025-11-05T12:14:56+00:00","dateModified":"2025-12-17T08:10:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking"},"wordCount":1054,"publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/11\/05172850\/Vibe-Hacking-Featured.png","articleSection":["Cyber Security Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking","url":"https:\/\/www.techjockey.com\/blog\/vibe-hacking","name":"Vibe Hacking: How AI Chatbots Are Being Weaponised?","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/11\/05172850\/Vibe-Hacking-Featured.png","datePublished":"2025-11-05T12:14:56+00:00","dateModified":"2025-12-17T08:10:10+00:00","description":"Vibe hacking is the new AI-powered cyber threat, where hackers use chatbots to trick your mind, not just your system. Learn how it works.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/blog\/vibe-hacking"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#primaryimage","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/11\/05172850\/Vibe-Hacking-Featured.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/11\/05172850\/Vibe-Hacking-Featured.png","width":1200,"height":628,"caption":"Illustration showing the words Vibe Hacking in neon cyber-style typography with a padlock icon, next to a hooded figure using a laptop with a bug symbol, representing AI-powered cybercrime; TechJockey.com logo in the corner."},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/blog\/vibe-hacking#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Software","item":"https:\/\/www.techjockey.com\/blog\/category\/security-software"},{"@type":"ListItem","position":3,"name":"How Vibe Hacking Turns AI Chatbots into Cybercrime Tools?"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/blog\/#website","url":"https:\/\/www.techjockey.com\/blog\/","name":"Techjockey.com Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","width":72,"height":72,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/twitter.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/1881fce242347f9140121fec5114dcc8","name":"Mehlika Bathla","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b4ccf9c0ec576de1b4b6b1d424bf97e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b4ccf9c0ec576de1b4b6b1d424bf97e?s=96&d=mm&r=g","caption":"Mehlika Bathla"},"description":"Mehlika Bathla is a passionate content writer who turns complex tech ideas into simple words. For over 4 years in the tech industry, she has crafted helpful content like technical documentation, user guides, UX content, website content, social media copies, and SEO-driven blogs. She is highly skilled in SaaS product marketing and end-to-end content creation within the software development lifecycle. Beyond technical writing, Mehlika dives into writing about fun topics like gaming, travel, food, and entertainment. She's passionate about making information accessible and easy to grasp. Whether it's a quick blog post or a detailed guide, Mehlika aims for clarity and quality in everything she creates.","sameAs":["https:\/\/www.linkedin.com\/in\/mehlika-bathla05\/"],"jobTitle":"Content Writer","url":"https:\/\/www.techjockey.com\/blog\/author\/mehlika"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596"}],"collection":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/comments?post=60596"}],"version-history":[{"count":3,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596\/revisions"}],"predecessor-version":[{"id":61418,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60596\/revisions\/61418"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media\/60598"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media?parent=60596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/categories?post=60596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/tags?post=60596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}