{"id":21184,"date":"2024-05-16T05:11:36","date_gmt":"2024-05-16T05:11:36","guid":{"rendered":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/?p=21184"},"modified":"2024-05-16T05:11:40","modified_gmt":"2024-05-16T05:11:40","slug":"cyber-security-ai-sydelabs","status":"publish","type":"post","link":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/","title":{"rendered":"AI startups emerge to plug security holes in GenAI apps"},"content":{"rendered":"\n<p>Every upside in tech has a downside too. We\u2019re seeing this in cybersecurity, where AI is helping detect and thwart attacks. But cybercriminals are also using advancements in AI to launch more sophisticated attacks that are harder to detect and more dangerous.<\/p>\n\n\n\n<p>The rise of generative AI in 2023 coincided with a whopping 78% increase in data breaches reported by organizations, according to the US non-profit Identity Theft Resource Center (ITRC). The ITRC\u2019s annual report said that nearly 11% of publicly traded companies were compromised last year. Nearly half of all companies did not report their data breaches at all. Another report by IBM said the global average cost of a data breach in 2023 was $4.45 million.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>GenAI has broadened the attack surface for applications. It has opened up new kinds of attacks which just did not exist before the GenAI era.<\/p>\n<\/blockquote>\n\n\n\n<p>\u201cGenAI has broadened the attack surface for applications. It has opened up new kinds of attacks which just did not exist before the GenAI era,\u201d says Ankita Kumari, co-founder of<a href=\"https:\/\/www.sydelabs.ai\/\" target=\"_blank\" rel=\"noreferrer noopener\"> SydeLabs<\/a>, which recently raised $2.5 million funding for products to help enterprises secure their AI applications against the new wave of cyber attacks.\u00a0<\/p>\n\n\n\n<p>GenAI-enabled deep fakes and phishing are a buzz in the media. But cybersecurity professionals are more concerned about hackers who know how to extract data by exploiting vulnerabilities in the foundational design of GenAI applications.&nbsp;<\/p>\n\n\n\n<p>One of the scariest new threats is prompt injection. It\u2019s a malicious form of prompt engineering where the hacker can keep tweaking the prompt until the GenAI application lets out vital information.&nbsp;<\/p>\n\n\n\n<p>By their very nature, large language models (LLMs) that power GenAI apps cannot distinguish between system prompts and user inputs that get tagged on to them. Both rely on tokenization of natural language instructions and queries. And the malicious prompt can be injected after or within harmless ones.<\/p>\n\n\n\n<p>Typically, a malicious user can ask the LLM to ignore previous instructions and take harmful action. A cleverly crafted user prompt can also get the LLM to reveal system prompts which can then be overridden or manipulated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Magnitude of threat<\/strong><\/h2>\n\n\n\n<p>During a demo, SydeLabs showed a large enterprise customer just how bad prompt injection could be. \u201cWe were able to extract their system prompt and entire training data, which was actually the IP of the company valued in hundreds of millions of dollars. That was a very scary moment for them,\u201d recounts Ankita. \u201cThey had built an AI application which was trained on users&#8217; financial data. This is PII (personally identifiable information). Imagine that data going out.\u201d<\/p>\n\n\n\n<p>It has opened up a new field of AI cybersecurity where agile startups move nimbly to build defences even as cyber criminals find chinks in the LLMs at the core of GenAI applications. \u201cThis kind of attack, which happens in plain vanilla English, is very different from the earlier era of cyber attacks which could be blocked with firewalls,\u201d points out Ankita.<\/p>\n\n\n\n<p>Emerging AI cybersecurity companies are tackling prompt injection in multiple ways. User inputs can be screened to spot malicious intent. Outputs can also be screened to prevent leakage of sensitive information. But it\u2019s a constantly shifting battlefield as companies&nbsp; are building their GenAI applications on top of foundation models which are probabilistic and non-deterministic in how they work.&nbsp;<\/p>\n\n\n\n<p>This means GenAI applications don\u2019t have fixed responses. The same question can be framed in different ways to produce different answers and actions, and attackers have the whole gamut of natural language to play with. It exposes applications to risks that cannot all be predicted and firewalled. Even if a tiny window is left open, AI ninjas will find it.<\/p>\n\n\n\n<p>SydeLabs co-founder and CEO Ruchir Patwa, who was earlier a founding member of Google\u2019s insider threat team, likens it to social engineering where people are fooled into giving up information. An LLM can be similarly fooled with prompt engineering. The potential consequences are huge.<\/p>\n\n\n\n<p>\u201cAn AI system sitting inside your network is highly privileged with access to almost all your data. And these systems can talk to a million different resources over the internet (through plugins). We expect security to get really bad very quickly,\u201d says Patwa.&nbsp;<\/p>\n\n\n\n<p>How do you defend enterprises against this? The first thing SydeLabs does is automated AI red teaming. Its product SydeBox acts as the enemy to attack an enterprise\u2019s GenAI applications and expose vulnerabilities. This is not a one-time effort because new forms of attack keep coming. \u201cYou have to continuously test your models,\u201d says Ankita.<\/p>\n\n\n\n<p>Besides, any tweak in the foundation model creates new holes. \u201cThey (the foundation model providers like OpenAI and Meta) are fine-tuning those models, right? Now, what is happening with every fine-tuning is that the security and safety alignment of the entire model goes for a toss,\u201d points out Ankita. Hence, along with continuous automated red teaming, SydeLabs has to constantly update its own \u201cthreat intelligence\u201d database.&nbsp;<\/p>\n\n\n\n<p>Then its next product SydeGuard kicks in with detection of threats based on the intent of users. For both products, SydeLabs is attempting to differentiate from others in the market by the manner in which the defences are designed.<\/p>\n\n\n\n<p>Several startups have come up to protect enterprises from wide-ranging new threats as they bring LLMs into their tech stacks through GenAI apps. Lakera, CalypsoAI, and Protect AI are some of them. Reken, a startup in stealth mode founded in January, whose product will only become public later in the year, raised a $10 million seed round.<\/p>\n\n\n\n<p>It\u2019s a fast-evolving field with no foolproof technology for protection out there. Agility is paramount, which brings startups into play alongside established cybersecurity companies.&nbsp;<\/p>\n\n\n\n<p>\u201cWe have a team of security researchers whose day-in-day-out job is to study the different kinds of attacks happening and keep updating our intelligence data every single day,\u201d says Ankita. \u201cThat&#8217;s the kind of agility we need because what is changing every day is the technique of attack.\u201d The bulk of the startup\u2019s funding is to build this capability and the research team.<\/p>\n\n\n\n<p>While the threat intelligence database helps SydeBox discover vulnerabilities through red teaming, the SydeGuard product is designed to look beyond prompts to entire user sessions. It\u2019s a more holistic approach to uncover malicious behavior than simply screening inputs. This is the startup\u2019s USP.<\/p>\n\n\n\n<p>A third product on the anvil aims to help enterprises comply with emerging regulations around GenAI, which varies from country to country. It\u2019s another form of risk because non-compliance with AI regulations may prove very costly in the future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Seasoned cybersecurity experts<\/strong><\/h2>\n\n\n\n<p>Ankita was a McKinsey associate before joining gaming company Mobile Premier League (MPL). That is where she met Patwa as they both tackled large-scale fraud. They gained confidence in building security products and finally took a \u201cleap of faith\u201d to become entrepreneurs.<\/p>\n\n\n\n<p>Patwa has been steeped in security right from his undergraduate computer science days. \u201cI always felt I wanted to break the software rather than build it.\u201d<\/p>\n\n\n\n<p>He went to Carnegie Mellon University for a master\u2019s degree in security, followed by a six-year stint with Google security. \u201cI\u2019ve only done security, nothing else.\u201d<\/p>\n\n\n\n<p>One of the challenges he\u2019s grappling with currently is to build an AI security model that works across use cases. \u201cWith so many foundation models coming up, so many ways of deploying them, and so many different use cases, how do you build something generic enough so that you don\u2019t have to come up with a new solution for every customer? So we\u2019re building one model that solves the bulk of the problem. Then we add custom layers on top based on verticals and use cases,\u201d says Patwa.<\/p>\n\n\n\n<p>With AI advancing so fast, current threats are only the tip of the iceberg. Defenders like SydeLabs and AI cyber criminals are in a dance of staying a step ahead.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every upside in tech has a downside too. We\u2019re seeing this in cybersecurity, where AI is helping detect and thwart attacks. But cybercriminals are also using advancements in AI to launch more sophisticated attacks that are harder to detect and more dangerous. The rise of generative AI in 2023 coincided with a whopping 78% increase [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":21185,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[38],"tags":[105,138],"chapters":[],"class_list":["post-21184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product","tag-ai","tag-gen-ai"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI startups emerge to plug security holes in GenAI apps - BoomiAI<\/title>\n<meta name=\"description\" content=\"The rise of GenAI has coincided with a whopping increase in data breaches as it has opened up new vulnerabilities, which in turn has created a new space for AI cybersecurity startups.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI startups emerge to plug security holes in GenAI apps - BoomiAI\" \/>\n<meta property=\"og:description\" content=\"The rise of GenAI has coincided with a whopping increase in data breaches as it has opened up new vulnerabilities, which in turn has created a new space for AI cybersecurity startups.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/\" \/>\n<meta property=\"og:site_name\" content=\"BoomiAI\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T05:11:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T05:11:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stg-saasboomiorg-staging.kinsta.cloud\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"880\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Malavika Velayanikal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@vmalu\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/\",\"url\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/\",\"name\":\"AI startups emerge to plug security holes in GenAI apps - BoomiAI\",\"isPartOf\":{\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png\",\"datePublished\":\"2024-05-16T05:11:36+00:00\",\"dateModified\":\"2024-05-16T05:11:40+00:00\",\"author\":{\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#\/schema\/person\/70e33a0f4c6a3726216d72b42f7fb715\"},\"description\":\"The rise of GenAI has coincided with a whopping increase in data breaches as it has opened up new vulnerabilities, which in turn has created a new space for AI cybersecurity startups.\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#primaryimage\",\"url\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png\",\"contentUrl\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png\",\"width\":1920,\"height\":880},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI startups emerge to plug security holes in GenAI apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#website\",\"url\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/\",\"name\":\"SaaSBoomi\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#\/schema\/person\/70e33a0f4c6a3726216d72b42f7fb715\",\"name\":\"Malavika Velayanikal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4984f5361df463fa65bc94d3d10c58e659071c4d05e9243256d033a189460c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4984f5361df463fa65bc94d3d10c58e659071c4d05e9243256d033a189460c5?s=96&d=mm&r=g\",\"caption\":\"Malavika Velayanikal\"},\"description\":\"Malavika Velayanikal drives initiatives and events at SaaSBoomi, India's pay-it-forward community for SaaS startup founders. With 17 years of journalism behind her, half of which was in covering the protean world of startups, she now focuses on helping entrepreneurs in making connections, learning from experts and peers, growing, and telling their stories.\",\"sameAs\":[\"https:\/\/dev.matsio.com\/matsio\/saasboomi\",\"https:\/\/www.linkedin.com\/in\/malavikavelayanikal\/\",\"https:\/\/x.com\/vmalu\"],\"url\":\"https:\/\/dev.matsio.com\/matsio\/saasboomi\/author\/malavika\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI startups emerge to plug security holes in GenAI apps - BoomiAI","description":"The rise of GenAI has coincided with a whopping increase in data breaches as it has opened up new vulnerabilities, which in turn has created a new space for AI cybersecurity startups.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"AI startups emerge to plug security holes in GenAI apps - BoomiAI","og_description":"The rise of GenAI has coincided with a whopping increase in data breaches as it has opened up new vulnerabilities, which in turn has created a new space for AI cybersecurity startups.","og_url":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/","og_site_name":"BoomiAI","article_published_time":"2024-05-16T05:11:36+00:00","article_modified_time":"2024-05-16T05:11:40+00:00","og_image":[{"width":1920,"height":880,"url":"https:\/\/stg-saasboomiorg-staging.kinsta.cloud\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png","type":"image\/png"}],"author":"Malavika Velayanikal","twitter_card":"summary_large_image","twitter_creator":"@vmalu","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/","url":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/","name":"AI startups emerge to plug security holes in GenAI apps - BoomiAI","isPartOf":{"@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#primaryimage"},"image":{"@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png","datePublished":"2024-05-16T05:11:36+00:00","dateModified":"2024-05-16T05:11:40+00:00","author":{"@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#\/schema\/person\/70e33a0f4c6a3726216d72b42f7fb715"},"description":"The rise of GenAI has coincided with a whopping increase in data breaches as it has opened up new vulnerabilities, which in turn has created a new space for AI cybersecurity startups.","breadcrumb":{"@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#primaryimage","url":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png","contentUrl":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-content\/uploads\/2024\/05\/AiOpener_Sydelabs.png","width":1920,"height":880},{"@type":"BreadcrumbList","@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/saas\/product\/cyber-security-ai-sydelabs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/"},{"@type":"ListItem","position":2,"name":"AI startups emerge to plug security holes in GenAI apps"}]},{"@type":"WebSite","@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#website","url":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/","name":"SaaSBoomi","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#\/schema\/person\/70e33a0f4c6a3726216d72b42f7fb715","name":"Malavika Velayanikal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4984f5361df463fa65bc94d3d10c58e659071c4d05e9243256d033a189460c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4984f5361df463fa65bc94d3d10c58e659071c4d05e9243256d033a189460c5?s=96&d=mm&r=g","caption":"Malavika Velayanikal"},"description":"Malavika Velayanikal drives initiatives and events at SaaSBoomi, India's pay-it-forward community for SaaS startup founders. With 17 years of journalism behind her, half of which was in covering the protean world of startups, she now focuses on helping entrepreneurs in making connections, learning from experts and peers, growing, and telling their stories.","sameAs":["https:\/\/dev.matsio.com\/matsio\/saasboomi","https:\/\/www.linkedin.com\/in\/malavikavelayanikal\/","https:\/\/x.com\/vmalu"],"url":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/author\/malavika\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/posts\/21184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/comments?post=21184"}],"version-history":[{"count":3,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/posts\/21184\/revisions"}],"predecessor-version":[{"id":21188,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/posts\/21184\/revisions\/21188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/media\/21185"}],"wp:attachment":[{"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/media?parent=21184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/categories?post=21184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/tags?post=21184"},{"taxonomy":"chapters","embeddable":true,"href":"https:\/\/dev.matsio.com\/matsio\/saasboomi\/wp-json\/wp\/v2\/chapters?post=21184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}