{"id":1613,"date":"2025-08-06T20:08:59","date_gmt":"2025-08-06T20:08:59","guid":{"rendered":"https:\/\/texc.net\/?p=1613"},"modified":"2025-08-06T20:09:03","modified_gmt":"2025-08-06T20:09:03","slug":"hackers-breach-salesforce-database-steal-google-customer-info","status":"publish","type":"post","link":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/","title":{"rendered":"Hackers Breach Salesforce Database, Steal Google Customer Info"},"content":{"rendered":"\n<p><strong>A serious security breach involving two tech giants has put customer data at risk.<\/strong><\/p>\n\n\n\n<p>Google has confirmed that a group of hackers successfully accessed sensitive customer information by breaching a third-party system \u2014 Salesforce, a widely used customer relationship management (CRM) platform. The incident raises new concerns about the security of integrated cloud services and the ripple effects of third-party vulnerabilities.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Happened?<\/h2>\n\n\n\n<p>In a public disclosure, Google revealed that an unauthorized group gained access to some of its customers\u2019 personal data by exploiting a breach in its <strong>Salesforce database environment<\/strong>.<\/p>\n\n\n\n<p>This wasn\u2019t a direct attack on Google\u2019s infrastructure. Instead, it was a <strong>supply chain-style attack<\/strong>, where the attackers infiltrated Salesforce accounts used by Google to manage customer support, marketing, or sales communications. From there, they exfiltrated customer details, though the exact scope of the stolen data is still under investigation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Data Was Accessed?<\/h2>\n\n\n\n<p>According to Google, the compromised data may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Customer names<\/strong><\/li>\n\n\n\n<li><strong>Email addresses<\/strong><\/li>\n\n\n\n<li><strong>Business contact information<\/strong><\/li>\n\n\n\n<li><strong>Service usage details<\/strong><\/li>\n<\/ul>\n\n\n\n<p>However, Google emphasized that no passwords, payment information, or core Google account data were involved in the breach. While this provides some relief, the exposed data could still be used in phishing or social engineering attacks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How the Hackers Got In<\/h2>\n\n\n\n<p>Although details are still emerging, cybersecurity researchers believe the breach was made possible through:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing attacks on Salesforce users<\/strong><\/li>\n\n\n\n<li><strong>Misconfigured third-party plugins<\/strong><\/li>\n\n\n\n<li><strong>Poor API access controls<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Salesforce has not publicly confirmed the incident on their end, but is believed to be working closely with Google to assess the situation and bolster security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why This Matters<\/h2>\n\n\n\n<p>This breach underscores a growing concern in enterprise tech: <strong>your data is only as secure as the weakest link in your software supply chain<\/strong>.<\/p>\n\n\n\n<p>Many companies rely on external platforms like Salesforce, Zendesk, or HubSpot to manage customer interactions. These platforms often have access to highly sensitive information \u2014 and if not properly secured, they become prime targets for attackers.<\/p>\n\n\n\n<p>The incident also highlights how major tech firms, despite having world-class security, remain vulnerable through their vendors and partners.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Google\u2019s Response<\/h2>\n\n\n\n<p>Google says it has taken the following actions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Revoked compromised Salesforce credentials<\/strong><\/li>\n\n\n\n<li><strong>Notified affected customers<\/strong><\/li>\n\n\n\n<li><strong>Launched an internal review of all third-party data access policies<\/strong><\/li>\n\n\n\n<li><strong>Working with law enforcement and Salesforce to investigate further<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The company is urging all enterprise customers to remain vigilant and review their own third-party integrations.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Can Customers Do?<\/h2>\n\n\n\n<p>If you\u2019re a Google business customer, here are some steps you can take:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Check for communication from Google<\/strong> regarding possible data exposure.<\/li>\n\n\n\n<li><strong>Be cautious of phishing emails<\/strong> that use accurate personal or business info.<\/li>\n\n\n\n<li><strong>Review your CRM and third-party access policies<\/strong> \u2014 not just for Google, but for all vendors.<\/li>\n\n\n\n<li><strong>Enable two-factor authentication (2FA)<\/strong> wherever possible.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>This breach is a reminder that cybersecurity isn&#8217;t just about firewalls and passwords. It&#8217;s about trust, transparency, and understanding how deeply connected today&#8217;s systems really are.<\/p>\n\n\n\n<p>Google\u2019s quick disclosure and investigation are important steps, but it\u2019s clear that <strong>more scrutiny is needed for third-party data relationships<\/strong>. Whether you&#8217;re a startup or a tech giant, your data is only as secure as the platforms you rely on.<\/p>\n\n\n\n<p>The future of data security may depend not just on securing your systems \u2014 but on securing your ecosystem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A serious security breach involving two tech giants has put customer data at risk. Google has confirmed that a group of hackers successfully accessed sensitive customer information by breaching a third-party system \u2014 Salesforce, a widely used customer relationship management (CRM) platform. The incident raises new concerns about the security of integrated cloud services and&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1614,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[93,90],"tags":[264,265,104],"class_list":["post-1613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tech","tag-cybersecurity","tag-databreach","tag-google"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Breach Salesforce Database, Steal Google Customer Info<\/title>\n<meta name=\"description\" content=\"Google confirms that hackers accessed customer data by breaching its Salesforce systems. The incident highlights the growing risks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Breach Salesforce Database, Steal Google Customer Info\" \/>\n<meta property=\"og:description\" content=\"Google confirms that hackers accessed customer data by breaching its Salesforce systems. The incident highlights the growing risks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\" \/>\n<meta property=\"og:site_name\" content=\"Texc\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Texc.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-06T20:08:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T20:09:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5\"},\"headline\":\"Hackers Breach Salesforce Database, Steal Google Customer Info\",\"datePublished\":\"2025-08-06T20:08:59+00:00\",\"dateModified\":\"2025-08-06T20:09:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\"},\"wordCount\":551,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/texc.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp\",\"keywords\":[\"CyberSecurity\",\"DataBreach\",\"Google\"],\"articleSection\":[\"Security\",\"Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\",\"url\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\",\"name\":\"Hackers Breach Salesforce Database, Steal Google Customer Info\",\"isPartOf\":{\"@id\":\"https:\/\/texc.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp\",\"datePublished\":\"2025-08-06T20:08:59+00:00\",\"dateModified\":\"2025-08-06T20:09:03+00:00\",\"description\":\"Google confirms that hackers accessed customer data by breaching its Salesforce systems. The incident highlights the growing risks\",\"breadcrumb\":{\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage\",\"url\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp\",\"contentUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp\",\"width\":1024,\"height\":1024,\"caption\":\"Hackers Breach Salesforce Database, Steal Google Customer Info\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texc.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Breach Salesforce Database, Steal Google Customer Info\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texc.net\/#website\",\"url\":\"https:\/\/texc.net\/\",\"name\":\"Texc\",\"description\":\"Decode the Future, One Byte at a Time\",\"publisher\":{\"@id\":\"https:\/\/texc.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texc.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texc.net\/#organization\",\"name\":\"Texc\",\"url\":\"https:\/\/texc.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texc.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png\",\"contentUrl\":\"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png\",\"width\":512,\"height\":512,\"caption\":\"Texc\"},\"image\":{\"@id\":\"https:\/\/texc.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Texc.net\/\",\"https:\/\/www.instagram.com\/texcstore\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texc.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/texc.net\"],\"url\":\"https:\/\/texc.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Breach Salesforce Database, Steal Google Customer Info","description":"Google confirms that hackers accessed customer data by breaching its Salesforce systems. The incident highlights the growing risks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Breach Salesforce Database, Steal Google Customer Info","og_description":"Google confirms that hackers accessed customer data by breaching its Salesforce systems. The incident highlights the growing risks","og_url":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/","og_site_name":"Texc","article_publisher":"https:\/\/www.facebook.com\/Texc.net\/","article_published_time":"2025-08-06T20:08:59+00:00","article_modified_time":"2025-08-06T20:09:03+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#article","isPartOf":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/"},"author":{"name":"admin","@id":"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5"},"headline":"Hackers Breach Salesforce Database, Steal Google Customer Info","datePublished":"2025-08-06T20:08:59+00:00","dateModified":"2025-08-06T20:09:03+00:00","mainEntityOfPage":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/"},"wordCount":551,"commentCount":0,"publisher":{"@id":"https:\/\/texc.net\/#organization"},"image":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage"},"thumbnailUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp","keywords":["CyberSecurity","DataBreach","Google"],"articleSection":["Security","Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/","url":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/","name":"Hackers Breach Salesforce Database, Steal Google Customer Info","isPartOf":{"@id":"https:\/\/texc.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage"},"image":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage"},"thumbnailUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp","datePublished":"2025-08-06T20:08:59+00:00","dateModified":"2025-08-06T20:09:03+00:00","description":"Google confirms that hackers accessed customer data by breaching its Salesforce systems. The incident highlights the growing risks","breadcrumb":{"@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#primaryimage","url":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp","contentUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-7-2025-01_07_32-AM.webp","width":1024,"height":1024,"caption":"Hackers Breach Salesforce Database, Steal Google Customer Info"},{"@type":"BreadcrumbList","@id":"https:\/\/texc.net\/index.php\/2025\/08\/06\/hackers-breach-salesforce-database-steal-google-customer-info\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texc.net\/"},{"@type":"ListItem","position":2,"name":"Hackers Breach Salesforce Database, Steal Google Customer Info"}]},{"@type":"WebSite","@id":"https:\/\/texc.net\/#website","url":"https:\/\/texc.net\/","name":"Texc","description":"Decode the Future, One Byte at a Time","publisher":{"@id":"https:\/\/texc.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texc.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texc.net\/#organization","name":"Texc","url":"https:\/\/texc.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texc.net\/#\/schema\/logo\/image\/","url":"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png","contentUrl":"https:\/\/texc.net\/wp-content\/uploads\/2025\/07\/Texc-Logo1.png","width":512,"height":512,"caption":"Texc"},"image":{"@id":"https:\/\/texc.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Texc.net\/","https:\/\/www.instagram.com\/texcstore\/"]},{"@type":"Person","@id":"https:\/\/texc.net\/#\/schema\/person\/65cbf58e9abe44b0b5697bf7bb277bf5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texc.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e59a53082d69ffbb8b881e5ad70f9d2c943f93d0d54af869ce575f9c1b55402?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/texc.net"],"url":"https:\/\/texc.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts\/1613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/comments?post=1613"}],"version-history":[{"count":1,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts\/1613\/revisions"}],"predecessor-version":[{"id":1615,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/posts\/1613\/revisions\/1615"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/media\/1614"}],"wp:attachment":[{"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/media?parent=1613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/categories?post=1613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/texc.net\/index.php\/wp-json\/wp\/v2\/tags?post=1613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}