{"id":253747,"date":"2025-08-07T14:37:03","date_gmt":"2025-08-07T12:37:03","guid":{"rendered":"https:\/\/cyberforces.com\/?p=253747"},"modified":"2025-08-07T14:37:03","modified_gmt":"2025-08-07T12:37:03","slug":"external-penetration-testing","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/external-penetration-testing","title":{"rendered":"External Penetration Testing &#8211; Protection Against Cyberattacks"},"content":{"rendered":"<p><strong>External penetration testing<\/strong> is one of the most effective tools to assess the security of an organization\u2019s IT infrastructure. It helps determine whether systems exposed to the internet &#8211; such as web applications, VPNs, and APIs &#8211; can withstand real-world cyberattacks. In this article, you&#8217;ll learn how external pentests are conducted, what threats they can uncover, and how they support compliance with regulations like GDPR, NIS2, and DORA.<\/p>\n<p>&nbsp;<\/p>\n<h2>What You&#8217;ll Learn:<\/h2>\n<ul>\n<li>What external penetration tests are and how they work<\/li>\n<li>Which vulnerabilities they reveal and what benefits they bring<\/li>\n<li>How often they should be performed<\/li>\n<li>How they support compliance with GDPR, ISO 27001, NIS2, and DORA<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What Are External Penetration Tests?<\/h2>\n<p>External penetration tests are simulated cyberattacks conducted by ethical hackers against a company\u2019s publicly accessible infrastructure. Their goal is to identify vulnerabilities before real threat actors exploit them.<\/p>\n<h2>What is typically tested:<\/h2>\n<ul>\n<li>Public IP addresses and domain services<\/li>\n<li>Web applications and external servers<\/li>\n<li>Exposed services (FTP, SSH, VPN, SMTP)<\/li>\n<li>Firewall and perimeter configurations<\/li>\n<\/ul>\n<h2>Testing phases:<\/h2>\n<ol>\n<li><strong>Reconnaissance<\/strong> &#8211; collecting information about the organization (e.g., using OSINT)<\/li>\n<li><strong>Scanning<\/strong> &#8211; identifying open ports, services, and exposed systems<\/li>\n<li><strong>Exploitation<\/strong> &#8211; attempting to exploit discovered vulnerabilities<\/li>\n<li><strong>Reporting<\/strong> &#8211; delivering findings, risk assessments, and remediation guidance<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2>Why Perform External Penetration Tests?<\/h2>\n<p>External penetration testing helps you:<\/p>\n<ul>\n<li>Evaluate the resilience of IT infrastructure against real-world cyber threats<\/li>\n<li>Detect misconfigurations and weaknesses before attackers do<\/li>\n<li>Provide executives with real, evidence-based risk assessments<\/li>\n<li>Strengthen operational resilience in hybrid or remote environments<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What Do External Penetration Tests Check?<\/h2>\n<p>Pentesters perform a full analysis of:<\/p>\n<ul>\n<li>Internet-facing systems and entry points<\/li>\n<li>Web applications (client portals, e-commerce platforms, APIs)<\/li>\n<li>Server misconfigurations (OS, databases, cloud services)<\/li>\n<li>Unpatched vulnerabilities (CVEs, known exploits)<\/li>\n<\/ul>\n<h2>Common techniques used:<\/h2>\n<p>&nbsp;<\/p>\n<h3>Brute Force &amp; Credential Stuffing<\/h3>\n<p>Automated attempts to guess passwords or reuse leaked credentials. These attacks are effective when users use weak or repeated passwords.<\/p>\n<h3>Vulnerability Scanning (e.g., CVE)<\/h3>\n<p>Automated tools scan systems and software for known vulnerabilities (each with a CVE ID). Results are prioritized by risk.<\/p>\n<h3>Application Layer Exploits (SQLi, XSS, RCE)<\/h3>\n<p>Exploits targeting insecure web applications:<\/p>\n<ul>\n<li><strong>SQL Injection (SQLi):<\/strong> modifies database queries<\/li>\n<li><strong>Cross-Site Scripting (XSS):<\/strong> injects malicious code into browsers<\/li>\n<li><strong>Remote Code Execution (RCE):<\/strong> allows execution of code on the target server<\/li>\n<\/ul>\n<h3>Attacks on Insecure APIs<\/h3>\n<p>APIs are often underprotected. Risks include:<\/p>\n<ul>\n<li>Missing authentication or authorization<\/li>\n<li>No rate limiting<\/li>\n<li>Exposure of sensitive data<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Regulatory Compliance: GDPR, ISO 27001, NIS2, DORA<\/h2>\n<table style=\"border-style: solid;\" border=\"tak\">\n<tbody>\n<tr>\n<td style=\"width: 136px;\"><strong>Regulation<\/strong><\/td>\n<td style=\"width: 358px;\"><strong>Requirement<\/strong><\/td>\n<td style=\"width: 292px;\"><strong>How Testing Helps<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px;\">GDPR (Art. 32)<\/td>\n<td style=\"width: 358px;\">Ensure data confidentiality, integrity, and resilience<\/td>\n<td style=\"width: 292px;\">Validates protection of personal data<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px;\">ISO 27001 (A.12.6.1)<\/td>\n<td style=\"width: 358px;\">Vulnerability management<\/td>\n<td style=\"width: 292px;\">Demonstrates active risk monitoring<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px;\">NIS2<\/td>\n<td style=\"width: 358px;\">Operational resilience for essential service providers<\/td>\n<td style=\"width: 292px;\">Confirms proactive risk mitigation<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 136px;\">DORA<\/td>\n<td style=\"width: 358px;\">Mandatory testing for financial entities (e.g., TIBER-EU)<\/td>\n<td style=\"width: 292px;\">Aligns with EU cybersecurity testing frameworks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Explore more on <strong>NIS2<\/strong> <a href=\"https:\/\/cyberforces.com\/en\/nis2-new-cybersecurity-standards-for-key-sectors-in-the-eu\">(here)<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>How Often Should You Run External Pentests?<\/h2>\n<p>Penetration tests should not be a one-time activity. Your IT environment evolves constantly.<\/p>\n<p><strong>Best practice:<\/strong><\/p>\n<ul>\n<li><strong>Annually<\/strong> &#8211; minimum standard across industries<\/li>\n<li><strong>After major changes<\/strong> &#8211; such as cloud migration or launching new systems<\/li>\n<li><strong>After security incidents<\/strong> &#8211; to verify remediation effectiveness<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What Does the Final Report Contain?<\/h2>\n<p>A good penetration test report includes:<\/p>\n<ul>\n<li>Description of each vulnerability (CVSS score, impact, attack vector)<\/li>\n<li>Risk classification (low \/ medium \/ high \/ critical)<\/li>\n<li>Technical and executive-level recommendations<\/li>\n<li>Attachments (evidence, logs, screenshots, exploit samples)<\/li>\n<\/ul>\n<p>This report becomes both an improvement roadmap and an audit trail for compliance.<\/p>\n<p>&nbsp;<\/p>\n<h2>FAQ: External Penetration Testing<\/h2>\n<h3>Are penetration tests safe for our systems?<\/h3>\n<p>Yes. They are performed in a controlled manner to avoid disruption or damage.<\/p>\n<h3>Will testing impact our operations?<\/h3>\n<p>Typically not. Scope and test windows are agreed upon in advance.<\/p>\n<h3>Is one test enough?<\/h3>\n<p>No. Regular testing is necessary due to ongoing infrastructure and threat landscape changes.<\/p>\n<h3>Who should request a pentest &#8211; IT or leadership?<\/h3>\n<p>Ideally, both. Security is a shared responsibility between IT and the business.<\/p>\n<h3>How long does an external penetration test take?<\/h3>\n<p>Between 2 and 10 business days, depending on scope.<\/p>\n<p>&nbsp;<\/p>\n<h2>Conclusion<\/h2>\n<p>External penetration testing is not just a technical exercise. It is a strategic tool for identifying real-world vulnerabilities, meeting regulatory requirements, and building trust among stakeholders.<\/p>\n<p>Well-executed tests improve security posture, demonstrate compliance, and support business continuity in a constantly evolving threat landscape.<\/p>\n<h3><\/h3>\n<h3>Want to assess your external infrastructure&#8217;s resilience?<br \/>\nContact our cybersecurity experts for a <a href=\"https:\/\/cyberforces.com\/en\/contact-2\">free consultation.<\/a><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>External penetration testing is one of the most effective tools to assess the security of an organization\u2019s IT infrastructure. It helps determine whether systems exposed to the internet &#8211; such as web applications, VPNs, and APIs &#8211; can withstand real-world cyberattacks. In this article, you&#8217;ll learn how external pentests are conducted, what threats they can [&hellip;]<\/p>\n","protected":false},"author":25,"featured_media":253748,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29],"tags":[],"class_list":["post-253747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>External Penetration Testing - Protection Against Cyberattacks - CyberForces<\/title>\n<meta name=\"description\" content=\"Learn how external penetration tests identify vulnerabilities, support GDPR, NIS2 &amp; DORA compliance, and strengthen your cyber resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/external-penetration-testing\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"External Penetration Testing - Protection Against Cyberattacks - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Learn how external penetration tests identify vulnerabilities, support GDPR, NIS2 &amp; DORA compliance, and strengthen your cyber resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/external-penetration-testing\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-07T12:37:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Diana Ma\u0142yszko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diana Ma\u0142yszko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing\"},\"author\":{\"name\":\"Diana Ma\u0142yszko\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\"},\"headline\":\"External Penetration Testing &#8211; Protection Against Cyberattacks\",\"datePublished\":\"2025-08-07T12:37:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing\",\"url\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing\",\"name\":\"External Penetration Testing - Protection Against Cyberattacks - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr\",\"datePublished\":\"2025-08-07T12:37:03+00:00\",\"description\":\"Learn how external penetration tests identify vulnerabilities, support GDPR, NIS2 & DORA compliance, and strengthen your cyber resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/external-penetration-testing\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr\",\"width\":1200,\"height\":675,\"caption\":\"external penetration testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/external-penetration-testing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"External Penetration Testing &#8211; Protection Against Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb\",\"name\":\"Diana Ma\u0142yszko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g\",\"caption\":\"Diana Ma\u0142yszko\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/diana-malyszko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"External Penetration Testing - Protection Against Cyberattacks - CyberForces","description":"Learn how external penetration tests identify vulnerabilities, support GDPR, NIS2 & DORA compliance, and strengthen your cyber resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/external-penetration-testing","og_locale":"en_US","og_type":"article","og_title":"External Penetration Testing - Protection Against Cyberattacks - CyberForces","og_description":"Learn how external penetration tests identify vulnerabilities, support GDPR, NIS2 & DORA compliance, and strengthen your cyber resilience.","og_url":"https:\/\/cyberforces.com\/en\/external-penetration-testing","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2025-08-07T12:37:03+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr","type":"image\/png"}],"author":"Diana Ma\u0142yszko","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Diana Ma\u0142yszko","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing"},"author":{"name":"Diana Ma\u0142yszko","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb"},"headline":"External Penetration Testing &#8211; Protection Against Cyberattacks","datePublished":"2025-08-07T12:37:03+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing"},"wordCount":725,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing","url":"https:\/\/cyberforces.com\/en\/external-penetration-testing","name":"External Penetration Testing - Protection Against Cyberattacks - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr","datePublished":"2025-08-07T12:37:03+00:00","description":"Learn how external penetration tests identify vulnerabilities, support GDPR, NIS2 & DORA compliance, and strengthen your cyber resilience.","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/external-penetration-testing"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/blog-CF-External-penetration-testing_1200x675_2.png?wsr","width":1200,"height":675,"caption":"external penetration testing"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/external-penetration-testing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"External Penetration Testing &#8211; Protection Against Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41a2e2c70189cbde875f296e8e6b10cb","name":"Diana Ma\u0142yszko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a45228b41c038f164a2d19818ea469b0d8a86c0e743bde1de6d9e589f53837f?s=96&d=mm&r=g","caption":"Diana Ma\u0142yszko"},"url":"https:\/\/cyberforces.com\/en\/author\/diana-malyszko"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=253747"}],"version-history":[{"count":4,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253747\/revisions"}],"predecessor-version":[{"id":253754,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/253747\/revisions\/253754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/253748"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=253747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=253747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=253747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}