{"id":36638,"date":"2025-02-24T11:06:52","date_gmt":"2025-02-24T11:06:52","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=36638"},"modified":"2025-02-25T07:51:09","modified_gmt":"2025-02-25T07:51:09","slug":"azure-secops","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","title":{"rendered":"Azure-SecOps : Streamlining Security Operations In The Cloud"},"content":{"rendered":"\n<p><a href=\"https:\/\/kalilinuxtutorials.com\/tag\/azure-secops\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure-SecOps <\/a>is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation, and compliance in Microsoft&#8217;s Azure ecosystem. <\/p>\n\n\n\n<p>By leveraging a combination of advanced tools and automation, Azure-SecOps bridges the gap between security and operations, enabling organizations to maintain a secure and compliant cloud environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Core Functions Of Azure-SecOps<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Threat Detection and Response<\/strong><br>Azure Sentinel, Microsoft&#8217;s cloud-native SIEM and SOAR solution, plays a pivotal role in Azure-SecOps. It collects and analyzes security logs using AI and machine learning to detect anomalies and potential threats. \n<ul class=\"wp-block-list\">\n<li>Sentinel also enables automated incident response through <a href=\"https:\/\/github.com\/AttacktheSOC\/Azure-SecOps\/blob\/main\/Graph\/Users\/Get-UserObjectIds.ps1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">playbooks <\/a>based on Azure Logic Apps, ensuring rapid mitigation of security incidents.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Identity and Access Management (IAM)<\/strong><br>Managing access is central to Azure-SecOps. Tools like Conditional Access enforce granular policies based on user behavior, device type, location, and risk level. <\/li>\n\n\n\n<li>Privileged Identity Management (PIM) further enhances security by providing just-in-time access for privileged roles, reducing the risk of unauthorized access.<\/li>\n\n\n\n<li><strong>Compliance and Governance<\/strong><br>Azure Security Center offers a unified view of an organization&#8217;s security posture. \n<ul class=\"wp-block-list\">\n<li>It evaluates resources against industry standards, identifies misconfigurations, and provides actionable recommendations to align with regulatory requirements. This proactive approach ensures compliance while minimizing vulnerabilities.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Automation and Orchestration<\/strong><br>Automation is a cornerstone of Azure-SecOps. Tools like Azure Logic Apps streamline repetitive tasks such as log analysis, threat hunting, and remediation workflows. \n<ul class=\"wp-block-list\">\n<li>This reduces manual effort while improving response times.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Network Security<\/strong><br>Services like Azure Firewall and DDoS Protection safeguard resources from external threats. They enable organizations to define network security policies while ensuring uptime during attacks.<\/li>\n\n\n\n<li><strong>Secure Development Practices<\/strong><br>Integrating security into the development lifecycle is essential for Azure-SecOps. \n<ul class=\"wp-block-list\">\n<li>Tools like Azure DevOps provide secure CI\/CD pipelines with built-in code scanning and artifact management to prevent vulnerabilities from entering production environments.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Script Utility In SecOps<\/strong><\/h2>\n\n\n\n<p>The provided PowerShell script complements SecOps by automating user object ID retrieval from Azure Active Directory (AAD). <\/p>\n\n\n\n<p>It queries AAD for users based on email or UPN (User Principal Name) and exports results to a CSV file for streamlined auditing or integration into other workflows.<\/p>\n\n\n\n<p>By combining these tools with automation scripts, Azure-SecOps empowers organizations to enhance their cloud security posture while maintaining operational efficiency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation, and compliance in Microsoft&#8217;s Azure ecosystem. By leveraging a combination of advanced tools and automation, Azure-SecOps bridges the gap between security and operations, enabling organizations to maintain a secure and compliant cloud environment. Core Functions Of Azure-SecOps [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":36642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,5840],"tags":[7178,737,6321,6052,6325],"class_list":["post-36638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-penetration-testing-tools","tag-azure-secops","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure-SecOps : Streamlining Security Operations In The Cloud<\/title>\n<meta name=\"description\" content=\"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure-SecOps : Streamlining Security Operations In The Cloud\" \/>\n<meta property=\"og:description\" content=\"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T11:06:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-25T07:51:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Azure-SecOps : Streamlining Security Operations In The Cloud\",\"datePublished\":\"2025-02-24T11:06:52+00:00\",\"dateModified\":\"2025-02-25T07:51:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\"},\"wordCount\":373,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp\",\"keywords\":[\"Azure-SecOps\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\",\"Pentesting Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/azure-secops\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\",\"name\":\"Azure-SecOps : Streamlining Security Operations In The Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp\",\"datePublished\":\"2025-02-24T11:06:52+00:00\",\"dateModified\":\"2025-02-25T07:51:09+00:00\",\"description\":\"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation,\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/azure-secops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure-SecOps : Streamlining Security Operations In The Cloud","description":"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","og_locale":"en_US","og_type":"article","og_title":"Azure-SecOps : Streamlining Security Operations In The Cloud","og_description":"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation,","og_url":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-02-24T11:06:52+00:00","article_modified_time":"2025-02-25T07:51:09+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Azure-SecOps : Streamlining Security Operations In The Cloud","datePublished":"2025-02-24T11:06:52+00:00","dateModified":"2025-02-25T07:51:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/"},"wordCount":373,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp","keywords":["Azure-SecOps","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security","Pentesting Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/azure-secops\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","url":"https:\/\/kalilinuxtutorials.com\/azure-secops\/","name":"Azure-SecOps : Streamlining Security Operations In The Cloud","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp","datePublished":"2025-02-24T11:06:52+00:00","dateModified":"2025-02-25T07:51:09+00:00","description":"Azure-SecOps is a critical framework that integrates security tools and operational processes to ensure robust threat detection, mitigation,","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/azure-secops\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/azure-secops\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Azure-SecOps.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":28186,"url":"https:\/\/kalilinuxtutorials.com\/protecting-kubernetes-deployments-with-azure-sentinel\/","url_meta":{"origin":36638,"position":0},"title":"Protecting Kubernetes Deployments with Azure Sentinel","author":"Kaladmin","date":"January 12, 2023","format":false,"excerpt":"What Is Azure Sentinel? Microsoft Sentinel is a cloud native security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution. It provides security analytics, threat intelligence, threat visibility, attack detection, proactive hunting, and threat response. It builds on Azure services, natively incorporating proven foundations, such as\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdSNFAnnxu4Q6wdfF_Mr8CBu8eVXAROtDhU7ytKKehZGK0MPVqxEZ2dwa-gvEYffFZHprazVrQ_TI4hlh2fMCnzO9nQJQVMJyRaFWNFI-1PGaZMbXfVrQOS4ly7JcnrJO8_7jhy4FGfdbFQY1it8mvQgBsNJvl-0F8JKAS7TeRAjOXTIVLl_oFLDTGGQ\/s16000\/KUBERNETES.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdSNFAnnxu4Q6wdfF_Mr8CBu8eVXAROtDhU7ytKKehZGK0MPVqxEZ2dwa-gvEYffFZHprazVrQ_TI4hlh2fMCnzO9nQJQVMJyRaFWNFI-1PGaZMbXfVrQOS4ly7JcnrJO8_7jhy4FGfdbFQY1it8mvQgBsNJvl-0F8JKAS7TeRAjOXTIVLl_oFLDTGGQ\/s16000\/KUBERNETES.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdSNFAnnxu4Q6wdfF_Mr8CBu8eVXAROtDhU7ytKKehZGK0MPVqxEZ2dwa-gvEYffFZHprazVrQ_TI4hlh2fMCnzO9nQJQVMJyRaFWNFI-1PGaZMbXfVrQOS4ly7JcnrJO8_7jhy4FGfdbFQY1it8mvQgBsNJvl-0F8JKAS7TeRAjOXTIVLl_oFLDTGGQ\/s16000\/KUBERNETES.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdSNFAnnxu4Q6wdfF_Mr8CBu8eVXAROtDhU7ytKKehZGK0MPVqxEZ2dwa-gvEYffFZHprazVrQ_TI4hlh2fMCnzO9nQJQVMJyRaFWNFI-1PGaZMbXfVrQOS4ly7JcnrJO8_7jhy4FGfdbFQY1it8mvQgBsNJvl-0F8JKAS7TeRAjOXTIVLl_oFLDTGGQ\/s16000\/KUBERNETES.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdSNFAnnxu4Q6wdfF_Mr8CBu8eVXAROtDhU7ytKKehZGK0MPVqxEZ2dwa-gvEYffFZHprazVrQ_TI4hlh2fMCnzO9nQJQVMJyRaFWNFI-1PGaZMbXfVrQOS4ly7JcnrJO8_7jhy4FGfdbFQY1it8mvQgBsNJvl-0F8JKAS7TeRAjOXTIVLl_oFLDTGGQ\/s16000\/KUBERNETES.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdSNFAnnxu4Q6wdfF_Mr8CBu8eVXAROtDhU7ytKKehZGK0MPVqxEZ2dwa-gvEYffFZHprazVrQ_TI4hlh2fMCnzO9nQJQVMJyRaFWNFI-1PGaZMbXfVrQOS4ly7JcnrJO8_7jhy4FGfdbFQY1it8mvQgBsNJvl-0F8JKAS7TeRAjOXTIVLl_oFLDTGGQ\/s16000\/KUBERNETES.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31276,"url":"https:\/\/kalilinuxtutorials.com\/awesome-bec\/","url_meta":{"origin":36638,"position":1},"title":"Awesome-BEC &#8211; Unveiling A Comprehensive Resource For Business Email Compromise Investigations","author":"Varshini","date":"November 14, 2023","format":false,"excerpt":"A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains a persistent and costly threat. This article explores Awesome-BEC, a curated repository of invaluable attack and defensive information, tools, and research dedicated to combating BEC attacks. Discover the wealth of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":34439,"url":"https:\/\/kalilinuxtutorials.com\/maestro\/","url_meta":{"origin":36638,"position":2},"title":"Maestro &#8211; Revolutionizing Remote Operations With Seamless Azure Integratio","author":"Varshini","date":"August 14, 2024","format":false,"excerpt":"In the evolving landscape of cybersecurity, the ability to conduct sophisticated post-exploitation operations discretely and efficiently is paramount. Enter Maestro, a cutting-edge tool designed to seamlessly interact with Microsoft's Intune and EntraID, enabling operators to execute remote actions without the cumbersome steps typically associated with Azure services. Maestro bypasses traditional\u2026","rel":"","context":"In &quot;Post Exploitation&quot;","block_context":{"text":"Post Exploitation","link":"https:\/\/kalilinuxtutorials.com\/category\/pe\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHiP_sqzbTnU6dPxgsL7YFTfNQzksqqM85bi6qQwzftumaZAkZWABU3Q0Yigf357IuC6OvciPRdCOnTmg-QrncdLVzcdzDZ7KZRafXyaV2lcaYXSPMU4h-oyoNMnwjb9FEtG63AkJGC24l7MeyMyzpXfuDVgCCYAaHShBaSXana3i2eeRoegQTwWEu5pd\/s16000\/Maestro%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHiP_sqzbTnU6dPxgsL7YFTfNQzksqqM85bi6qQwzftumaZAkZWABU3Q0Yigf357IuC6OvciPRdCOnTmg-QrncdLVzcdzDZ7KZRafXyaV2lcaYXSPMU4h-oyoNMnwjb9FEtG63AkJGC24l7MeyMyzpXfuDVgCCYAaHShBaSXana3i2eeRoegQTwWEu5pd\/s16000\/Maestro%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHiP_sqzbTnU6dPxgsL7YFTfNQzksqqM85bi6qQwzftumaZAkZWABU3Q0Yigf357IuC6OvciPRdCOnTmg-QrncdLVzcdzDZ7KZRafXyaV2lcaYXSPMU4h-oyoNMnwjb9FEtG63AkJGC24l7MeyMyzpXfuDVgCCYAaHShBaSXana3i2eeRoegQTwWEu5pd\/s16000\/Maestro%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHiP_sqzbTnU6dPxgsL7YFTfNQzksqqM85bi6qQwzftumaZAkZWABU3Q0Yigf357IuC6OvciPRdCOnTmg-QrncdLVzcdzDZ7KZRafXyaV2lcaYXSPMU4h-oyoNMnwjb9FEtG63AkJGC24l7MeyMyzpXfuDVgCCYAaHShBaSXana3i2eeRoegQTwWEu5pd\/s16000\/Maestro%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHiP_sqzbTnU6dPxgsL7YFTfNQzksqqM85bi6qQwzftumaZAkZWABU3Q0Yigf357IuC6OvciPRdCOnTmg-QrncdLVzcdzDZ7KZRafXyaV2lcaYXSPMU4h-oyoNMnwjb9FEtG63AkJGC24l7MeyMyzpXfuDVgCCYAaHShBaSXana3i2eeRoegQTwWEu5pd\/s16000\/Maestro%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhkHiP_sqzbTnU6dPxgsL7YFTfNQzksqqM85bi6qQwzftumaZAkZWABU3Q0Yigf357IuC6OvciPRdCOnTmg-QrncdLVzcdzDZ7KZRafXyaV2lcaYXSPMU4h-oyoNMnwjb9FEtG63AkJGC24l7MeyMyzpXfuDVgCCYAaHShBaSXana3i2eeRoegQTwWEu5pd\/s16000\/Maestro%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30488,"url":"https:\/\/kalilinuxtutorials.com\/azure-ad\/","url_meta":{"origin":36638,"position":3},"title":"Azure AD Attack &amp; Defense Playbook","author":"Varshini","date":"September 27, 2023","format":false,"excerpt":"This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. All of the included scenarios, insights and comments are based on experiences from the contributors during their attack simulations, hands-on or real-world scenarios. It should be considered a\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-_IHloZaGWdVyQ06LPnofGF_AUyKDPeyxb4E_D2c1r1Jps2Qpwa5EaRBSK0V7G5khxLzwXtzt8bSkSXmy2aNH1ga4V4-9MYERgb-yHKwcpFF_jW9eid1I7w4dg0U1mTVqkW8hR1DxJoUDLmgEbvx0TA1wymxYzBX1vmPQyjki0hb91F_YCcMlLWNxkA\/s16000\/AzureAD.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20874,"url":"https:\/\/kalilinuxtutorials.com\/azurehunter\/","url_meta":{"origin":36638,"position":4},"title":"AzureHunter : A Cloud Forensics Powershell Module To Run Threat Hunting Playbooks On Data From Azure And O365","author":"R K","date":"December 23, 2021","format":false,"excerpt":"AzureHunter is a Powershell module to run threat hunting playbooks on data from Azure and O365 for Cloud Forensics purposes Getting Started Check that you have the right O365 Permissions The following roles are required in Exchange Online, in order to be able to have\u00a0read only\u00a0access to the UnifiedAuditLog:\u00a0View-Only Audit\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh8lv83GiUncdS-5en6kr5_cfJrpYQ8VCiOLH-fllAqWcv0_fAfbwxoFQR9LahFXHCNNToJ70zi2GY_brsOk1Cg4ndO4jTltsfjIoTmYGwtd2jQWKP_W--pGmSJw-yNdSk3o_sib2xEX2DFF6DHyPTbjtWQr5wCTFofWNtvvkBx0UUwMrKtFvWpjZpX=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh8lv83GiUncdS-5en6kr5_cfJrpYQ8VCiOLH-fllAqWcv0_fAfbwxoFQR9LahFXHCNNToJ70zi2GY_brsOk1Cg4ndO4jTltsfjIoTmYGwtd2jQWKP_W--pGmSJw-yNdSk3o_sib2xEX2DFF6DHyPTbjtWQr5wCTFofWNtvvkBx0UUwMrKtFvWpjZpX=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh8lv83GiUncdS-5en6kr5_cfJrpYQ8VCiOLH-fllAqWcv0_fAfbwxoFQR9LahFXHCNNToJ70zi2GY_brsOk1Cg4ndO4jTltsfjIoTmYGwtd2jQWKP_W--pGmSJw-yNdSk3o_sib2xEX2DFF6DHyPTbjtWQr5wCTFofWNtvvkBx0UUwMrKtFvWpjZpX=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh8lv83GiUncdS-5en6kr5_cfJrpYQ8VCiOLH-fllAqWcv0_fAfbwxoFQR9LahFXHCNNToJ70zi2GY_brsOk1Cg4ndO4jTltsfjIoTmYGwtd2jQWKP_W--pGmSJw-yNdSk3o_sib2xEX2DFF6DHyPTbjtWQr5wCTFofWNtvvkBx0UUwMrKtFvWpjZpX=s728 2x"},"classes":[]},{"id":33635,"url":"https:\/\/kalilinuxtutorials.com\/microsoft-azure-cloud-computing-services\/","url_meta":{"origin":36638,"position":5},"title":"Microsoft Azure &#8211; Cloud Computing Services","author":"Varshini","date":"July 3, 2024","format":false,"excerpt":"Azure Kubernetes Services (AKS)\u00a0is Microsoft's managed kubernetes offering running on Azure. Explore the robust capabilities of Microsoft Azure in our comprehensive guide to cloud computing services. This article delves into Azure Kubernetes Services (AKS), Microsoft's managed Kubernetes offering that enhances the scalability and efficiency of your applications. Get started with\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAPtMnYAf09ZlxNaEtsYURgT2zAoWi3C7qYxlDuQQbJ92c0QVPE3jQQsIr3H-flZ7XC1xLJ97nWIVvH8VBAso7Bw6VYUjHZ5_D0peEbqbU5bcZvx1Wwm2MTwuxrT11skCgG9VGJJUFx0R-QYOtifIuG6UAQwViATc9T8OPBykpvcwIEURZBnZiuZG-Qea6\/s16000\/Microsoft%20Azure%20-%20Cloud%20Computing%20Services.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAPtMnYAf09ZlxNaEtsYURgT2zAoWi3C7qYxlDuQQbJ92c0QVPE3jQQsIr3H-flZ7XC1xLJ97nWIVvH8VBAso7Bw6VYUjHZ5_D0peEbqbU5bcZvx1Wwm2MTwuxrT11skCgG9VGJJUFx0R-QYOtifIuG6UAQwViATc9T8OPBykpvcwIEURZBnZiuZG-Qea6\/s16000\/Microsoft%20Azure%20-%20Cloud%20Computing%20Services.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAPtMnYAf09ZlxNaEtsYURgT2zAoWi3C7qYxlDuQQbJ92c0QVPE3jQQsIr3H-flZ7XC1xLJ97nWIVvH8VBAso7Bw6VYUjHZ5_D0peEbqbU5bcZvx1Wwm2MTwuxrT11skCgG9VGJJUFx0R-QYOtifIuG6UAQwViATc9T8OPBykpvcwIEURZBnZiuZG-Qea6\/s16000\/Microsoft%20Azure%20-%20Cloud%20Computing%20Services.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAPtMnYAf09ZlxNaEtsYURgT2zAoWi3C7qYxlDuQQbJ92c0QVPE3jQQsIr3H-flZ7XC1xLJ97nWIVvH8VBAso7Bw6VYUjHZ5_D0peEbqbU5bcZvx1Wwm2MTwuxrT11skCgG9VGJJUFx0R-QYOtifIuG6UAQwViATc9T8OPBykpvcwIEURZBnZiuZG-Qea6\/s16000\/Microsoft%20Azure%20-%20Cloud%20Computing%20Services.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAPtMnYAf09ZlxNaEtsYURgT2zAoWi3C7qYxlDuQQbJ92c0QVPE3jQQsIr3H-flZ7XC1xLJ97nWIVvH8VBAso7Bw6VYUjHZ5_D0peEbqbU5bcZvx1Wwm2MTwuxrT11skCgG9VGJJUFx0R-QYOtifIuG6UAQwViATc9T8OPBykpvcwIEURZBnZiuZG-Qea6\/s16000\/Microsoft%20Azure%20-%20Cloud%20Computing%20Services.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAPtMnYAf09ZlxNaEtsYURgT2zAoWi3C7qYxlDuQQbJ92c0QVPE3jQQsIr3H-flZ7XC1xLJ97nWIVvH8VBAso7Bw6VYUjHZ5_D0peEbqbU5bcZvx1Wwm2MTwuxrT11skCgG9VGJJUFx0R-QYOtifIuG6UAQwViATc9T8OPBykpvcwIEURZBnZiuZG-Qea6\/s16000\/Microsoft%20Azure%20-%20Cloud%20Computing%20Services.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=36638"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36638\/revisions"}],"predecessor-version":[{"id":36645,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36638\/revisions\/36645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/36642"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=36638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=36638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=36638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}