{"id":21,"date":"2022-10-08T23:55:08","date_gmt":"2022-10-09T02:55:08","guid":{"rendered":"https:\/\/securitybsides.com.br\/2022\/?page_id=21"},"modified":"2025-04-10T13:40:29","modified_gmt":"2025-04-10T16:40:29","slug":"agenda","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2025\/agenda\/","title":{"rendered":"Palestras"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"21\" class=\"elementor elementor-21\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dd12a9b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dd12a9b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-31a62ca\" data-id=\"31a62ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a540241 elementor-widget elementor-widget-heading\" data-id=\"a540241\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\">Clique aqui e confira os detalhes das apresenta\u00e7\u00f5es e palestrantes<\/a><\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e83bb95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e83bb95\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43a5c20\" data-id=\"43a5c20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d3d8a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d3d8a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11d5150\" data-id=\"11d5150\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-744d730 elementor-widget elementor-widget-text-editor\" data-id=\"744d730\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 style=\"text-align: center;\"><strong>Atividades do dia 17\/05\/2025 (S\u00e1bado)<\/strong><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e35176c elementor-widget elementor-widget-shortcode\" data-id=\"e35176c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<table id=\"tablepress-11\" class=\"tablepress tablepress-id-11\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>In\u00edcio<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Fim<\/center><\/strong><\/th><th class=\"column-3\"><center><strong>Sala<\/center><\/strong><\/th><th class=\"column-4\"><center><strong>Atividade<\/center><\/strong><\/th><th class=\"column-5\"><center><strong>Instrutor<\/center><\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center>15:00<\/center><\/td><td class=\"column-2\"><center>18:00<\/center><\/td><td class=\"column-3\">A definir<\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/mini-treinamentos-e-workshops\/\">Ciberintelig\u00eancia em Darknets com LLMs Locais e Multimodais Open Source: Investiga\u00e7\u00e3o e Automa\u00e7\u00e3o na Pr\u00e1tica<\/a><\/td><td class=\"column-5\">Francisco J. Rodr\u00edguez Montero \/ Pollyne<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center>15:00<\/center><\/td><td class=\"column-2\"><center>18:00<\/center><\/td><td class=\"column-3\">A definir<\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/mini-treinamentos-e-workshops\/\">Modelagem de amea\u00e7as para prioriza\u00e7\u00e3o de vulnerabilidades<\/a><\/td><td class=\"column-5\">Osmany Arruda<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center>15:00<\/center><\/td><td class=\"column-2\"><center>18:00<\/center><\/td><td class=\"column-3\">A definir<\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/mini-treinamentos-e-workshops\/\">Crossing the Line: XSS Unleashed<\/a><\/td><td class=\"column-5\">Leonardo Toledo<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center>15:00<\/center><\/td><td class=\"column-2\"><center>18:00<\/center><\/td><td class=\"column-3\">A definir<\/td><td class=\"column-4\">Write-ups de desafios ao vivo<\/td><td class=\"column-5\">Hack In Cariri<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center>15:00<\/center><\/td><td class=\"column-2\"><center>18:00<\/center><\/td><td class=\"column-3\">A definir<\/td><td class=\"column-4\">Competi\u00e7\u00e3o de Masters of Pwnage<\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-11 from cache --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30a59a8 elementor-widget elementor-widget-text-editor\" data-id=\"30a59a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 style=\"text-align: center;\"><b>Atividades do dia 18\/05\/2025 (Domingo)<\/b><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-250adb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"250adb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61045b6\" data-id=\"61045b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d5c914 elementor-widget elementor-widget-shortcode\" data-id=\"3d5c914\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Sala<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>Teatro Jaragu\u00e1<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Tom Jobim e Ataulfo Alves<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Adoniram Barbosa<\/strong><\/center><\/th><th class=\"column-5\"><center><strong>Cartola<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>Andar<\/strong><\/center><\/td><td class=\"column-2\"><center><strong>Piso eventos I<\/strong><\/center><\/td><td class=\"column-3\"><center><strong>Piso eventos II<\/strong><\/center><\/td><td class=\"column-4\"><center><strong>Piso eventos II<\/strong><\/center><\/td><td class=\"column-5\"><center><strong>Piso eventos II<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>10:00<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Recep\u00e7\u00e3o e credenciamento<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>10:45<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Abertura<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Keynote - Nelson Novaes Neto - Executive Guide to Secure-by-Design AI<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Automatiza\u00e7\u00e3o de Ataques XSS para Infec\u00e7\u00e3o e Propaga\u00e7\u00e3o Massiva de Worms em Redes Sociais - Fernando Henrique Mengali de Souza<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Vulnerabilidades de Seguran\u00e7a Cibern\u00e9tica em Dispositivos de Medi\u00e7\u00e3o Avan\u00e7ada de Energia El\u00e9trica - Wesley Leite<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Ransomware BSide Freakshow (Reloaded): One More Encryption - Cybelle<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>11:40<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">macOS Bypass TCC Reloaded - Ricardo L0gan<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">One XOR to rule them all: a evolu\u00e7\u00e3o criptogr\u00e1fica do malware brasileiro - Italo Lima<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Exerc\u00edcios de Red Team - N\u00e3o simule a amea\u00e7a, seja a amea\u00e7a! - Oliveira Lima<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Atacando IA generativa com Filosofia e Sociologia - Pedro Bezerra<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>12:20<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Dogmas de seguran\u00e7a - Nelson Murilo<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">PWAs: The Undetectable Credential Stealer Weapon - Alcyon Junior<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\"> Simula\u00e7\u00f5es de Phishing: como elas podem estar comprometendo a cultura de seguran\u00e7a<br \/>\ncibern\u00e9tica na sua empresa? - Vin\u00edcius Perallis<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">De Dados a Decis\u00f5es: O Papel da CTI na Mitiga\u00e7\u00e3o de Riscos de Vulnerabilidades - \u00c1lvaro Farias Jr<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>14:20<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Keynote - Alexandro Silva (Alex0s) - Automatizando a Prote\u00e7\u00e3o de Aplica\u00e7\u00f5es Web: Da Pequena Empresa \u00e0 Alta Disponibilidade<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Desvendando a Execu\u00e7\u00e3o Remota de C\u00f3digo em PDFs: Uma Amea\u00e7a Oculta - Marcos Rodrigues de Carvalho (oday)<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">AMSI: O c\u00e3o de guarda que late mas n\u00e3o morde? - Mario Lobo Romero<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Hunting from APT to *QL Queries: From approach to tool - Eddy Mota e Edu Vivi<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>15:00<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">O payload da ressurrei\u00e7\u00e3o: um panorama sobre as TTPs de APTs norte-coreanos - Carlos Cabral<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">SELECT * FROM code WHERE input != 'sanitized' - Jardel Matias<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Voc\u00ea sabe de onde veio sua IA? - Larissa Fabi\u00e3o da Fonseca<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Ca\u00e7a automatizada de vulnerabilidades: do fuzzing \u00e0 descoberta escal\u00e1vel e cont\u00ednua. - Javan Lacerda e Vinicius da Costa<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>15:40<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>16:20<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Keynote - Fernando Merc\u00eas - Como a computa\u00e7\u00e3o b\u00e1sica te ajuda a analisar APTs<a\/><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\"> Automatizando coletas de CTI e potencializando com IA - Andrey Andrey <\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Ciberintelig\u00eancia com LLMs - Pollyne e Francisco J. Rodr\u00edguez Montero<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Quando o Simples Vence: Anatomia Real dos Ataques que Continuam Funcionando \/ Ricardo Tavares<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>17:00<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\"> Antecipando a Resposta a incidente com Hip\u00f3teses de Hunting - Let\u00edcia Pereira<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\"> Ransomware vs EDR: Inside the Mind of Attackers - Zoziel Pinto Freire<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Atacando Redes LoRaWAN - Victor Pasknel<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">WiFi Recon: Espionagem Corporativa com Evil Twin - Amilton Justino<\/a><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><center><strong>17:40<\/strong><\/center><\/td><td class=\"column-2\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\"> Liderando o Cyber Fusion Center da Interpol em Singapura. - Ivo Carvalho Peixinho<\/a><\/td><td class=\"column-3\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">An\u00e1lise de Vulnerabilidades na Distribui\u00e7\u00e3o de Jogos via Steam: Um Vetor de Ataque para a Dissemina\u00e7\u00e3o de C\u00f3digo Malicioso - Luiz Henrique<\/a><\/td><td class=\"column-4\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Como Hackear um Banco sem Sair do seu Quarto? - Arthur Aires<\/a><\/td><td class=\"column-5\"><a href=\"https:\/\/securitybsides.com.br\/2025\/descricao-das-palestras-e-palestrantes\/\" target=\"_blank\">Do Crime ao C\u00f3digo: O Papel da Per\u00edcia Forense Computacional e da Intelig\u00eancia Artificial na An\u00e1lise de Provas Eletr\u00f4nicas - Ricardo Caposi<\/a><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><center><strong>18:20<\/strong><\/center><\/td><td colspan=\"4\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-1 from cache --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Clique aqui e confira os detalhes das apresenta\u00e7\u00f5es e palestrantes Atividades do dia 17\/05\/2025 (S\u00e1bado) Atividades do dia 18\/05\/2025 (Domingo)<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-pagebuilder-full-width.php","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/comments?post=21"}],"version-history":[{"count":57,"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":1690,"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/pages\/21\/revisions\/1690"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2025\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}