{"id":22366,"date":"2025-05-29T10:10:00","date_gmt":"2025-05-29T08:10:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=22366"},"modified":"2025-08-08T13:58:09","modified_gmt":"2025-08-08T11:58:09","slug":"windows-leak","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/windows-luecke\/","title":{"rendered":"Critical security vulnerability in Windows Server 2025"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"22366\" class=\"elementor elementor-22366\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcd3eed e-con-full e-flex e-con e-parent\" data-id=\"bcd3eed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63b289cc elementor-widget elementor-widget-text-editor\" data-id=\"63b289cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>dMSA function opens the door to the Active Directory for attackers!<\/h2>\n<p style=\"font-weight: 400;\">Researchers from the security company Akamai have discovered a serious security vulnerability in Windows Server 2025 that potentially affects every company that relies on Active Directory (AD). The risk: Attackers can use the new function for delegated Managed Service Accounts (dMSA) to gain increased authorizations in the network undetected - and thus compromise sensitive areas.<\/p>\n<h2>Our recommendation at DEFENDERBOX:<\/h2>\n<p style=\"font-weight: 400;\">We help to identify exploitable security gaps! How? Find out how secure your company is with a test installation! Now to the <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Familiarization price<\/a> test!<\/p>\n<h2>What is behind the Windows security vulnerability?<strong><br \/><\/strong><\/h2>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph --><!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p data-start=\"803\" data-end=\"1040\">Windows Server 2025 introduced the dMSA feature, which is intended to replace classic service accounts with managed, delegable accounts. The idea: more automation, less administration effort.<\/p>\n<p data-start=\"803\" data-end=\"1040\">But this is precisely where the danger lies. An attacker only needs minimal permissions in any organizational unit (OU) of the Active Directory - a constellation that is completely inconspicuous in most corporate networks. Even if the dMSA feature is not actively used, the attack surface remains as soon as a Windows Server 2025 Domain Controller is integrated.<\/p>\n<h2>Who is affected?<\/h2>\n<p style=\"font-weight: 400;\">According to Akamai, 91 % of the AD environments tested are potentially vulnerable. In many cases, normal users - without administrator rights - have sufficient authorizations to create dMSAs and thus gain access to privileged accounts. This is a dangerous gap that companies carry unnoticed in their systems.<\/p>\n<h2>What can companies do now?<\/h2>\n<p data-start=\"2341\" data-end=\"2440\">Until Microsoft provides an official security update, companies should take urgent action:<\/p>\n<ul data-start=\"2442\" data-end=\"3085\">\n<li data-start=\"2442\" data-end=\"2569\">\n<p data-start=\"2444\" data-end=\"2569\"><strong data-start=\"2444\" data-end=\"2489\">Check who is authorized to create dMSAs.<\/strong><br data-start=\"2489\" data-end=\"2492\" \/>Restrict this right to explicitly trusted admin accounts.<\/p>\n<\/li>\n<li data-start=\"2571\" data-end=\"2754\">\n<p data-start=\"2573\" data-end=\"2754\"><strong data-start=\"2573\" data-end=\"2620\">Use the PowerShell script from Akamai<\/strong>to generate a list of all users with dMSA creation rights. This allows potential risks to be specifically identified.<\/p>\n<\/li>\n<li data-start=\"2756\" data-end=\"2881\">\n<p data-start=\"2758\" data-end=\"2881\"><strong data-start=\"2758\" data-end=\"2823\">Document and check authorizations regularly<\/strong>especially in hybrid or complex AD structures.<\/p>\n<\/li>\n<li data-start=\"2883\" data-end=\"3085\">\n<p data-start=\"2885\" data-end=\"3085\"><strong data-start=\"2885\" data-end=\"2940\">Rely on continuous security analyses.<\/strong> The DEFENDERBOX identifies precisely such potential security gaps - automatically, audit-proof and without interrupting your systems.<\/p>\n<\/li>\n<\/ul>\n<h2>Conclusion: Passive security is no longer enough<\/h2>\n<p data-start=\"3144\" data-end=\"3496\">The dMSA gap shows once again how important it is to integrate active security monitoring and early detection of potential threats into everyday IT operations. What at first glance appears to be a convenient feature can turn out to be a massive risk for your infrastructure. Companies should act now - <strong data-start=\"3469\" data-end=\"3495\">before attackers do<\/strong>.<\/p>\n<p data-start=\"3503\" data-end=\"3721\"><strong data-start=\"3503\" data-end=\"3512\">Tip:<\/strong> With DEFENDERBOX, you can detect security vulnerabilities before they become public knowledge - and before they can be exploited. Now <a href=\"https:\/\/defenderbox.de\/en\/product\/\" target=\"_blank\" rel=\"noopener\">here<\/a> find out more!<\/p>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph --><!-- \/wp:paragraph -->\n\n<!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:column --><!-- \/wp:columns -->\n<p>&nbsp;<\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The dMSA vulnerability shows once again how important it is to integrate active security monitoring and early detection of potential threats into everyday IT operations.<\/p>","protected":false},"author":3,"featured_media":22370,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,42,37,36],"class_list":["post-22366","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-ihk-siegen","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kritische Sicherheitsl\u00fccke in Windows Server 2025 - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/windows-leak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kritische Sicherheitsl\u00fccke in Windows Server 2025 - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/windows-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-29T08:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T11:58:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Windows-Sicherhei.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Kritische Sicherheitsl\u00fccke in Windows Server 2025\",\"datePublished\":\"2025-05-29T08:10:00+00:00\",\"dateModified\":\"2025-08-08T11:58:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/\"},\"wordCount\":397,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Windows-Sicherhei.jpg\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"IHK Siegen\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/\",\"name\":\"Kritische Sicherheitsl\u00fccke in Windows Server 2025 - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Windows-Sicherhei.jpg\",\"datePublished\":\"2025-05-29T08:10:00+00:00\",\"dateModified\":\"2025-08-08T11:58:09+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Windows-Sicherhei.jpg\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ki-bild-erstellen.de-Windows-Sicherhei.jpg\",\"width\":1344,\"height\":768,\"caption\":\"DEFENDERBOX hilft gegen Sicherheitsl\u00fccken jeder Art\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/windows-luecke\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kritische Sicherheitsl\u00fccke in Windows Server 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical security vulnerability in Windows Server 2025 - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/windows-leak\/","og_locale":"en_US","og_type":"article","og_title":"Kritische Sicherheitsl\u00fccke in Windows Server 2025 - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/windows-leak\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2025-05-29T08:10:00+00:00","article_modified_time":"2025-08-08T11:58:09+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Windows-Sicherhei.jpg","type":"image\/jpeg"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/windows-luecke\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/windows-luecke\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Kritische Sicherheitsl\u00fccke in Windows Server 2025","datePublished":"2025-05-29T08:10:00+00:00","dateModified":"2025-08-08T11:58:09+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/windows-luecke\/"},"wordCount":397,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/windows-luecke\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Windows-Sicherhei.jpg","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","IHK Siegen","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/windows-luecke\/","url":"https:\/\/defenderbox.de\/windows-luecke\/","name":"Critical security vulnerability in Windows Server 2025 - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/windows-luecke\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/windows-luecke\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Windows-Sicherhei.jpg","datePublished":"2025-05-29T08:10:00+00:00","dateModified":"2025-08-08T11:58:09+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/windows-luecke\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/windows-luecke\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/windows-luecke\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Windows-Sicherhei.jpg","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2025\/05\/ki-bild-erstellen.de-Windows-Sicherhei.jpg","width":1344,"height":768,"caption":"DEFENDERBOX hilft gegen Sicherheitsl\u00fccken jeder Art"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/windows-luecke\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Kritische Sicherheitsl\u00fccke in Windows Server 2025"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=22366"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/22366\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/22370"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=22366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=22366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=22366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}