{"id":62538,"date":"2024-07-06T10:32:33","date_gmt":"2024-07-06T06:02:33","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=62538"},"modified":"2024-07-06T10:32:38","modified_gmt":"2024-07-06T06:02:38","slug":"splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/","title":{"rendered":"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23"},"content":{"rendered":"\n

Learning About Threat Intelligence<\/p>\n","protected":false},"excerpt":{"rendered":"

Learning About Threat Intelligence<\/p>\n","protected":false},"author":1004068,"featured_media":62359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[],"cactus_badges":[],"video-series":[],"class_list":{"0":"post-62538","1":"post","2":"type-post","3":"status-publish","4":"format-video","5":"has-post-thumbnail","7":"category-security","8":"post_format-post-format-video"},"yoast_head":"\nSplunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23 - \u0648\u06cc\u062f\u06cc\u0648\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc | APK<\/title>\n<meta name=\"description\" content=\"Splunk Enterprise Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\" \/>\n<meta property=\"og:locale\" content=\"fa_IR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23\" \/>\n<meta property=\"og:description\" content=\"Splunk Enterprise Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\" \/>\n<meta property=\"og:site_name\" content=\"\u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u0646\u0634 \u062a\u0635\u0648\u06cc\u0631\u06cc \u0634\u0628\u06a9\u0647 | APK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apkco\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-06T06:02:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-06T06:02:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hadis Pooyafar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0646\u0648\u0634\u062a\u0647 \u0634\u062f\u0647 \u062a\u0648\u0633\u0637\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hadis Pooyafar\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0632\u0645\u0627\u0646 \u062a\u062e\u0645\u06cc\u0646\u06cc \u0645\u0637\u0627\u0644\u0639\u0647\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u062f\u0642\u06cc\u0642\u0647\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\"},\"author\":{\"name\":\"Hadis Pooyafar\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/#\/schema\/person\/0f141ffe0bf764c2c8f90416bd03941c\"},\"headline\":\"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23\",\"datePublished\":\"2024-07-06T06:02:33+00:00\",\"dateModified\":\"2024-07-06T06:02:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\"},\"wordCount\":14,\"publisher\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg\",\"articleSection\":[\"\u0627\u0645\u0646\u06cc\u062a\"],\"inLanguage\":\"fa-IR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\",\"url\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\",\"name\":\"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23 - \u0648\u06cc\u062f\u06cc\u0648\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc | APK\",\"isPartOf\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg\",\"datePublished\":\"2024-07-06T06:02:33+00:00\",\"dateModified\":\"2024-07-06T06:02:38+00:00\",\"description\":\"Splunk Enterprise Security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#breadcrumb\"},\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fa-IR\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage\",\"url\":\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg\",\"contentUrl\":\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u062e\u0627\u0646\u0647\",\"item\":\"https:\/\/www.apk.co.ir\/video\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/#website\",\"url\":\"https:\/\/www.apk.co.ir\/video\/\",\"name\":\"\u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u0646\u0634 \u062a\u0635\u0648\u06cc\u0631\u06cc \u0634\u0628\u06a9\u0647 | APK\",\"description\":\"\u0634\u0628\u06a9\u0647\u060c \u0627\u0645\u0646\u06cc\u062a\u060c \u0645\u062c\u0627\u0632\u06cc \u0633\u0627\u0632\u06cc\u060c \u062f\u06cc\u062a\u0627\u0633\u0646\u062a\u0631\",\"publisher\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.apk.co.ir\/video\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fa-IR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/#organization\",\"name\":\"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK\",\"url\":\"https:\/\/www.apk.co.ir\/video\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fa-IR\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2018\/08\/apk-logo-black.png\",\"contentUrl\":\"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2018\/08\/apk-logo-black.png\",\"width\":827,\"height\":173,\"caption\":\"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK\"},\"image\":{\"@id\":\"https:\/\/www.apk.co.ir\/video\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/apkco\/\",\"https:\/\/www.instagram.com\/apk.co\/\",\"https:\/\/www.linkedin.com\/company\/apkco\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/#\/schema\/person\/0f141ffe0bf764c2c8f90416bd03941c\",\"name\":\"Hadis Pooyafar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fa-IR\",\"@id\":\"https:\/\/www.apk.co.ir\/video\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0dcb4360c1530101bc9b840aa4905e7?s=96&d=mm&r=r\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0dcb4360c1530101bc9b840aa4905e7?s=96&d=mm&r=r\",\"caption\":\"Hadis Pooyafar\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23 - \u0648\u06cc\u062f\u06cc\u0648\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc | APK","description":"Splunk Enterprise Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/","og_locale":"fa_IR","og_type":"article","og_title":"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23","og_description":"Splunk Enterprise Security","og_url":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/","og_site_name":"\u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u0646\u0634 \u062a\u0635\u0648\u06cc\u0631\u06cc \u0634\u0628\u06a9\u0647 | APK","article_publisher":"https:\/\/www.facebook.com\/apkco\/","article_published_time":"2024-07-06T06:02:33+00:00","article_modified_time":"2024-07-06T06:02:38+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg","type":"image\/jpeg"}],"author":"Hadis Pooyafar","twitter_card":"summary_large_image","twitter_misc":{"\u0646\u0648\u0634\u062a\u0647 \u0634\u062f\u0647 \u062a\u0648\u0633\u0637":"Hadis Pooyafar","\u0632\u0645\u0627\u0646 \u062a\u062e\u0645\u06cc\u0646\u06cc \u0645\u0637\u0627\u0644\u0639\u0647":"1 \u062f\u0642\u06cc\u0642\u0647"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#article","isPartOf":{"@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/"},"author":{"name":"Hadis Pooyafar","@id":"https:\/\/www.apk.co.ir\/video\/#\/schema\/person\/0f141ffe0bf764c2c8f90416bd03941c"},"headline":"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23","datePublished":"2024-07-06T06:02:33+00:00","dateModified":"2024-07-06T06:02:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/"},"wordCount":14,"publisher":{"@id":"https:\/\/www.apk.co.ir\/video\/#organization"},"image":{"@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg","articleSection":["\u0627\u0645\u0646\u06cc\u062a"],"inLanguage":"fa-IR"},{"@type":"WebPage","@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/","url":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/","name":"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23 - \u0648\u06cc\u062f\u06cc\u0648\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc | APK","isPartOf":{"@id":"https:\/\/www.apk.co.ir\/video\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage"},"image":{"@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg","datePublished":"2024-07-06T06:02:33+00:00","dateModified":"2024-07-06T06:02:38+00:00","description":"Splunk Enterprise Security","breadcrumb":{"@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#breadcrumb"},"inLanguage":"fa-IR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/"]}]},{"@type":"ImageObject","inLanguage":"fa-IR","@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#primaryimage","url":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg","contentUrl":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2024\/05\/80-05-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-06-configuring-threat-intelligence-in-splunk-enterprise-security-section-23\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u062e\u0627\u0646\u0647","item":"https:\/\/www.apk.co.ir\/video\/"},{"@type":"ListItem","position":2,"name":"Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 23"}]},{"@type":"WebSite","@id":"https:\/\/www.apk.co.ir\/video\/#website","url":"https:\/\/www.apk.co.ir\/video\/","name":"\u067e\u0627\u06cc\u06af\u0627\u0647 \u062f\u0627\u0646\u0634 \u062a\u0635\u0648\u06cc\u0631\u06cc \u0634\u0628\u06a9\u0647 | APK","description":"\u0634\u0628\u06a9\u0647\u060c \u0627\u0645\u0646\u06cc\u062a\u060c \u0645\u062c\u0627\u0632\u06cc \u0633\u0627\u0632\u06cc\u060c \u062f\u06cc\u062a\u0627\u0633\u0646\u062a\u0631","publisher":{"@id":"https:\/\/www.apk.co.ir\/video\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apk.co.ir\/video\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fa-IR"},{"@type":"Organization","@id":"https:\/\/www.apk.co.ir\/video\/#organization","name":"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK","url":"https:\/\/www.apk.co.ir\/video\/","logo":{"@type":"ImageObject","inLanguage":"fa-IR","@id":"https:\/\/www.apk.co.ir\/video\/#\/schema\/logo\/image\/","url":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2018\/08\/apk-logo-black.png","contentUrl":"https:\/\/www.apk.co.ir\/video\/wp-content\/uploads\/sites\/20\/2018\/08\/apk-logo-black.png","width":827,"height":173,"caption":"\u0627\u0645\u0646 \u067e\u0627\u06cc\u0647 \u0631\u06cc\u0632\u0627\u0646 \u06a9\u0627\u0631\u0646 | APK"},"image":{"@id":"https:\/\/www.apk.co.ir\/video\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apkco\/","https:\/\/www.instagram.com\/apk.co\/","https:\/\/www.linkedin.com\/company\/apkco"]},{"@type":"Person","@id":"https:\/\/www.apk.co.ir\/video\/#\/schema\/person\/0f141ffe0bf764c2c8f90416bd03941c","name":"Hadis Pooyafar","image":{"@type":"ImageObject","inLanguage":"fa-IR","@id":"https:\/\/www.apk.co.ir\/video\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0dcb4360c1530101bc9b840aa4905e7?s=96&d=mm&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0dcb4360c1530101bc9b840aa4905e7?s=96&d=mm&r=r","caption":"Hadis Pooyafar"}}]}},"_links":{"self":[{"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/posts\/62538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/users\/1004068"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/comments?post=62538"}],"version-history":[{"count":2,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/posts\/62538\/revisions"}],"predecessor-version":[{"id":62572,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/posts\/62538\/revisions\/62572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/media\/62359"}],"wp:attachment":[{"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/media?parent=62538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/categories?post=62538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/tags?post=62538"},{"taxonomy":"cactus_badges","embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/cactus_badges?post=62538"},{"taxonomy":"video-series","embeddable":true,"href":"https:\/\/www.apk.co.ir\/video\/wp-json\/wp\/v2\/video-series?post=62538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}