{"id":34185,"date":"2023-12-14T09:30:00","date_gmt":"2023-12-14T16:30:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=34185"},"modified":"2025-12-10T05:52:04","modified_gmt":"2025-12-10T12:52:04","slug":"die-grosten-verstose-des-jahres-2023","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/","title":{"rendered":"Die gr\u00f6\u00dften Datenpannen des Jahres 2023: Alles, was Sie wissen m\u00fcssen"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Red network nodes over dark landscape representing cyber threat activity, attack surface visibility and security monitoring.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/DATA_BREACHES_2023_Masthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/DATA_BREACHES_2023_Masthead-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/DATA_BREACHES_2023_Masthead-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/DATA_BREACHES_2023_Masthead-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-12-14T09:30:00-07:00\">Dez. 14, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Top Breaches of 2023: All You Need to Know<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Top%20Breaches%20of%202023%3A%20All%20You%20Need%20to%20Know').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fthe-top-breaches-of-2023%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Top%20Breaches%20of%202023%3A%20All%20You%20Need%20to%20Know&url=https%3A%2F%2Fswimlane.com%2Fde%2Fthe-top-breaches-of-2023%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fthe-top-breaches-of-2023%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fthe-top-breaches-of-2023%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p><span style=\"font-weight: 400;\">Organizations are more vulnerable than ever. With the ever-evolving cyber threat landscape and the evolution of emerging technologies, like artificial intelligence (AI), threat actors are becoming more sophisticated. The surge in cybersecurity breaches is a growing concern for companies of all sizes. It\u2019s clear, no industry is safe with the notable attacks across many different industries, it\u2019s clear that threat actors have no bounds.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercrime is anticipated to inflict a <\/span><a href=\"https:\/\/www.globenewswire.com\/news-release\/2020\/11\/18\/2129432\/0\/en\/Cybercrime-To-Cost-The-World-10-5-Trillion-Annually-By-2025.html#:~:text=Every%20U.S.%20business%20is%20under%20cyberattack&amp;text=18%2C%202020%20(GLOBE%20NEWSWIRE),%243%20trillion%20USD%20in%202015.\"><span style=\"font-weight: 400;\">$10.5 trillion<\/span><\/a><span style=\"font-weight: 400;\"> hit on the global economy by 2025.\u00a0 Even with robust cybersecurity defenses, organizations of all sizes remain vulnerable and continue to fall victim to costly breaches. According to <\/span><a href=\"https:\/\/omdia.tech.informa.com\/about\/about-us\"><span style=\"font-weight: 400;\">Omdia Research<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/swimlane.com\/resources\/reports\/state-of-cyber-security-for-financial-services\/\"><span style=\"font-weight: 400;\">The State of Security for Finance<\/span><\/a><span style=\"font-weight: 400;\">, 42% of respondents reported having at least one breach with a total cost of $1 million, and 20% of respondents reported having one breach with a total cost of $5 million.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now more than ever, it\u2019s extremely important to choose security technologies that can proactively mitigate and respond to attacks before it\u2019s too late. Unfortunately, this year has been another year of successful cybersecurity attacks, leaks, and breaches. Let\u2019s dive into <\/span><i><span style=\"font-weight: 400;\">some<\/span><\/i><span style=\"font-weight: 400;\"> of the breaches that occurred this year so far.\u00a0<\/span><\/p>\n<h2><b>February 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">U.S. Marshals Service\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On February 17, 2023, the U.S. Marshals Service faced a significant breach, with hackers infiltrating data from a computer system. The information included a wealth of personal details about both investigative targets and agency employees, raising concerns about the extent and implications of the breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Government agencies and the federal justice system continue to be prime targets for cybercriminals. This vulnerability stems from the sensitive nature of information stored on their systems and the severe consequences associated with cyberattacks and data breaches. To prevent these risks, it\u2019s crucial for organizations to maintain a vigilant stance in refining and implementing robust cybersecurity strategies.<\/span><\/p>\n<p><a href=\"https:\/\/www.msspalert.com\/news\/us-marshals-services-suffers-ransomware-attack-data-breach\"><span style=\"font-weight: 400;\">Learn more<\/span><\/a><span style=\"font-weight: 400;\"> from Nick Tausek, Swimlane\u2019s Lead Security Automation Architect.\u00a0<\/span><\/p>\n<h2><b>March 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">DC Health\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On March 6, 2023, a data breach at DC Health Link, the health insurance marketplace based in Washington, D.C., raised major concerns for the company and security issues for those who were impacted. Allegedly, the breach has affected members and staff of the US House of Representatives. Although it\u2019s unclear, IntelBroker claimed to have data on 170,000 individuals, and was reportedly selling it on a cybercriminal forum.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.spiceworks.com\/it-security\/data-security\/news\/dc-health-link-data-breach\/\"><span style=\"font-weight: 400;\">Learn more<\/span><\/a><span style=\"font-weight: 400;\"> from Nick Tausek, Swimlane\u2019s Lead Security Automation Architect.\u00a0<\/span><\/p>\n<h2><b>June 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">MOVEit\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As of May 31, 2023, the State of Maine discovered a software vulnerability in MOVEit, a third-party file transfer tool owned by Progress Software and utilized globally by numerous entities for data exchange. Exploited by hackers, this vulnerability enabled unauthorized access and file downloads from specific agencies in the State of Maine. The Russian ransomware group Clop claimed responsibility for the attack on June 6th.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/maine-state-governments-moveit-data-breach-basically-impacted-all-1-3-million-residents\/\"><span style=\"font-weight: 400;\">Learn more<\/span><\/a><span style=\"font-weight: 400;\"> about this from Nick Tausek, Swimlane\u2019s Lead Security Automation Architect.\u00a0<\/span><\/p>\n<h2><b>September 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">MGM Grand<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In September of 2023, MGM Resorts International fell victim to a cyberattack, prompting a shutdown of all of its systems. This projected to result in a $100 million impact on their third-quarter results. MGM Resorts anticipated incurring less than $10 million as a one-time cost related to the incident in the quarter ending on September 30.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even with their substantial investments in technologies, adherence to regulatory frameworks, and robust cybersecurity protections, the MGM Resorts cyber attack serves as a prime example that vulnerability persists across all industries and organizations of any size.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/thecyberwire.com\/stories\/d9d50346c345472c943ffedd9e203bd6\/ransomware-in-the-casinos\"><span style=\"font-weight: 400;\">Learn more<\/span><\/a><span style=\"font-weight: 400;\"> from Nick Tausek, Swimlane\u2019s Lead Security Automation Architect.\u00a0<\/span><\/p>\n<h2><b>October 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">23andMe Data Breach<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Biotech firm 23andMe experienced a data breach involving a credential-stuffing attack, compromising customer accounts and exposing genetic data. Stolen information included names, emails, birth dates, and details related to users&#8217; genetic ancestry. Hackers reportedly targeted data specifically linked to individuals of Ashkenazi Jewish and Chinese descent. Even more, the same hacker who leaked one million genetic profiles from 23andMe in early October returned and recently dumped over four million files, including the DNA Relatives feature that allows for connections between relations to be made.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/second-leak-from-23andme-data-breach-includes-4-million-more-genetic-profiles\/\"><span style=\"font-weight: 400;\">Learn more<\/span><\/a><span style=\"font-weight: 400;\"> from Nick Tausek, Swimlane\u2019s Lead Security Automation Architect.\u00a0<\/span><\/p>\n<h2><b>November 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">Boeing\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On November 1, 2023, Boeing reported a cyber incident affecting various parts of their operations. The LockBit ransomware group initially claimed responsibility, stating they had stolen a significant amount of sensitive data. This particular hacking group, typically deploys ransomware on a victim organization&#8217;s system to lock it up, as well as steal sensitive data for extortion.<\/span><\/p>\n<h2><b>December 2023<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">Norton Healthcare<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Norton Healthcare, a non-profit healthcare system based in Kentucky, confirmed this month that it experienced a data breach earlier this year. During a ransomware attack in May, hackers gained unauthorized access to the personal data of millions. Norton Healthcare shared that around 2.5 million people, including patients, employees, and dependents, were impacted. This compromised sensitive information including Social Security numbers, health and insurance details, medical IDs, financial account numbers, driver&#8217;s licenses, government IDs, and digital signatures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The broader conversation surrounding this highlights a concerning trend: healthcare organizations are increasingly becoming primary targets and experiencing breaches at an unprecedented rate.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Kyivstar<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On December 12, 2023, Kyivstar, the largest mobile network operator in Ukraine, suffered a significant cyberattack causing disruptions in over 25 million mobile subscribers and over 1 million home internet customers. The CEO of Kyivstar said he believes the incident was caused by the ongoing conflict with Russia. This detrimental attack is one of the most significant cyber events in Ukraine to date.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/cyberattack-cripples-ukraines-largest-telcom-operator\/\"><span style=\"font-weight: 400;\">Learn more<\/span><\/a><span style=\"font-weight: 400;\"> from Nick Tausek, Swimlane\u2019s Lead Security Automation Architect.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Prevent Breaches with AI Enabled Low-Code Automation<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In many cases, the vulnerability that hackers and threat actors exploit, stems from a lack of automation. To fortify defenses against cyber breaches, leaks, or attacks, organizations must prioritize investing in cutting-edge security technologies. Automation plays a crucial role in enhancing data protection and safeguarding the overall integrity of the organization.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The global spending on security breaches has become outrageous. Today, the average cost of a data breach has surged nearly 30% to $4.45 million per breach. And companies in the U.S. spend an average of $9.48 million per breach, according to a <\/span><a href=\"https:\/\/www.ibm.com\/reports\/data-breach\"><span style=\"font-weight: 400;\">2023 report.\u00a0<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Security automation platforms, like <\/span><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\"><span style=\"font-weight: 400;\">Swimlane Turbine<\/span><\/a><span style=\"font-weight: 400;\">, serve as a vital piece to the puzzle. Low-code automation can enhance your operational flexibility and help identify cracks within your systems before hackers do. Although it&#8217;s undeniable that preventing all data breaches is a challenging task, companies can substantially mitigate their risk by incorporating AI enabled low-code security automation into their security systems.<\/span><\/p>\n\n\n\n<div class=\"bs-div bs-div-a3056f5ac5016f9339da99762b43ce386c620c65 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-a3056f5ac5016f9339da99762b43ce386c620c65 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Buyers-Guide-Featured-Image-1.jpg' class='img-fluid'   alt='Cover of a buyer\u2019s guide titled \u201cA Buyer\u2019s Guide for Modern Security Automation,\u201d featuring a dark blue, abstract digital background with glowing data points, conveying a serious, high-tech cybersecurity theme.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-get-your-buyer-s-guide-for-security-automation\">Get Your Buyer&#8217;s Guide for Security Automation<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Cut through the complexity and frustration of SOAR and security automation solutions. This guide analyzes the wide range of security automation platforms available today, so you can find the best solution for your team.<br>\n<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-73521c3a8cc46b0b1d063fed1b8bcb9aad391ae2\"><style>.bs-pro-button-p-btn-73521c3a8cc46b0b1d063fed1b8bcb9aad391ae2 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/security-automation-buyers-guide\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Get Your Copy<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/de\/tag\/research\/'><span class='tag-content'>Research<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e5b8f951e24 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/top-data-breaches-2022\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Nov. 3, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Top Data Breaches of 2022 so far<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e5b8f953177 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/the-state-of-security-for-finance\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Okt. 26, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The State of Security for Finance: What You Need to Know<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e5b8f954309 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/low-code-security-automation-simplicity\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mai 10, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Low-Code Security Automation: Everything You Need to Know<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":34186,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-34185","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Top Breaches of 2023 | Swimlane<\/title>\n<meta name=\"description\" content=\"Learn more about the biggest data breaches from 2023. The surge in cybersecurity breaches is a growing concern for companies of all sizes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/die-grosten-verstose-des-jahres-2023\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top Breaches of 2023: All You Need to Know\" \/>\n<meta property=\"og:description\" content=\"Learn more about the biggest data breaches from 2023. The surge in cybersecurity breaches is a growing concern for companies of all sizes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/die-grosten-verstose-des-jahres-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T12:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Learn more about the biggest data breaches from 2023. The surge in cybersecurity breaches is a growing concern for companies of all sizes.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/\",\"url\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/\",\"name\":\"The Top Breaches of 2023 | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png\",\"datePublished\":\"2023-12-14T16:30:00+00:00\",\"dateModified\":\"2025-12-10T12:52:04+00:00\",\"description\":\"Learn more about the biggest data breaches from 2023. The surge in cybersecurity breaches is a growing concern for companies of all sizes.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png\",\"width\":1120,\"height\":666,\"caption\":\"Red network nodes over dark landscape representing cyber threat activity, attack surface visibility and security monitoring.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Top Breaches of 2023: All You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Die gr\u00f6\u00dften Verst\u00f6\u00dfe des Jahres 2023 | Swimlane","description":"Erfahren Sie mehr \u00fcber die gr\u00f6\u00dften Datenpannen aus dem Jahr 2023. Der Anstieg von Cybersicherheitsvorf\u00e4llen ist eine wachsende Sorge f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/die-grosten-verstose-des-jahres-2023\/","og_locale":"de_DE","og_type":"article","og_title":"The Top Breaches of 2023: All You Need to Know","og_description":"Learn more about the biggest data breaches from 2023. The surge in cybersecurity breaches is a growing concern for companies of all sizes.","og_url":"https:\/\/swimlane.com\/de\/die-grosten-verstose-des-jahres-2023\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-10T12:52:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Learn more about the biggest data breaches from 2023. The surge in cybersecurity breaches is a growing concern for companies of all sizes.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/","url":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/","name":"Die gr\u00f6\u00dften Verst\u00f6\u00dfe des Jahres 2023 | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png","datePublished":"2023-12-14T16:30:00+00:00","dateModified":"2025-12-10T12:52:04+00:00","description":"Erfahren Sie mehr \u00fcber die gr\u00f6\u00dften Datenpannen aus dem Jahr 2023. Der Anstieg von Cybersicherheitsvorf\u00e4llen ist eine wachsende Sorge f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/DATA_BREACHES_2023_Masthead.png","width":1120,"height":666,"caption":"Red network nodes over dark landscape representing cyber threat activity, attack surface visibility and security monitoring."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/the-top-breaches-of-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Top Breaches of 2023: All You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/34185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/34185\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/34186"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=34185"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=34185"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=34185"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=34185"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=34185"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=34185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}