{"id":15265,"date":"2021-04-27T14:24:45","date_gmt":"2021-04-27T12:24:45","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-analysis-pentests\/"},"modified":"2026-01-08T11:02:32","modified_gmt":"2026-01-08T10:02:32","slug":"security-analysis-pentests","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-analysis-pentests\/","title":{"rendered":"Security Analysis &amp; Pentests"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-analysis-header.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|20px|62px|20px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Security Analysis &amp; Pentests<\/h1>\n<p style=\"text-align: center\">We support businesses with technical security analysis<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Our services for businesses and manufacturers<\/h2>\n<p>Whether you want to use applications and systems more securely as a company or, as a product manufacturer, want to offer demonstrably more security to your customers: With<span>\u00a0<\/span><a href=\"https:\/\/herolab.usd.de\/en\/\" target=\"_blank\" rel=\"noopener\">usd HeroLab<\/a>, you have one of the leading security partners at your side.<\/p>\n<p>The goal of our security analyses is to identify vulnerabilities, point out associated risks and determine ways to raise your security level. We will discuss your goals, environments and potential risks and work together to find the solution that is right for you. Our promise of performance is more security!<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest.jpeg\" title_text=\"usd-herolab-pentest\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" hover_transition_duration=\"0ms\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Pentest<\/h3>\n<p><span>Can hackers penetrate your IT systems?<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/\" button_text=\"Learn more\" _builder_version=\"4.21.0\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-code-review.jpeg\" title_text=\"usd-herolab-code-review\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" hover_transition_duration=\"0ms\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Code Review<\/h3>\n<p>How secure is your application?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/code-review\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-kachel-security-scans.jpg\" title_text=\"usd-herolab-kachel-security-scans\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Security Scan<\/h3>\n<p><span>Are you looking to get started with assessing your security?<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/security-scan\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-red-teaming.jpg\" title_text=\"usd-herolab-pentest-kachel-red-teaming\" _builder_version=\"4.18.1\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Red Teaming<\/h3>\n<p>We find the vulnerabilities<br \/>that help hackers achieve their goal.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming\/\" button_text=\"Learn more\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-incident-response-forensik.jpeg\" title_text=\"usd-incident-response-forensik\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Incident Response &amp; Forensics<\/h3>\n<p>Are you prepared for the worst case scenario?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/incident-response-forensik\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-forensik-1-1.jpeg\" title_text=\"usd-herolab-forensik (1)\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Digital Forensics<\/h3>\n<p>Were you the victim of a cyber attack or do you suspect that you were?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/digitale-forensik\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-vulnerability-management-kachel.jpeg\" title_text=\"usd-vulnerability-management-kachel\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Vulnerability Management<\/h3>\n<p>Would you like to identify vulnerabilities permanently and on time and eliminate them systematically?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/vulnerability-management\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-HeroLab-Kachel-Mngt.jpeg\" title_text=\"usd-HeroLab-Kachel-Mngt\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Management &amp; Organisation<\/h3>\n<p>Would you like assistance with planning and performing your security analyses?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/management-organisation\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-live-hacking.jpeg\" title_text=\"usd-herolab-live-hacking\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Live Hacking<\/h3>\n<p>How easily can attackers gain access to third-party data or spy on others?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/live-hacking\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-secure-app.jpeg\" title_text=\"usd-herolab-secure-app\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-25px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Secure App<\/h3>\n<p>How trustworthy is your app?<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/pentest\/pentest-mobile-applications\/\" button_text=\"Learn more\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.19.4\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" border_width_all=\"0px\" box_shadow_style=\"none\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.19.4\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" border_width_all=\"0px\" box_shadow_style=\"none\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"28px|0px|28px|0px|true|true\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h2>What matters most to us at usd AG<\/h2>\n<p>[\/et_pb_text][et_pb_tabs _builder_version=\"4.16\" _module_preset=\"default\" body_font=\"|300|||||||\" body_text_align=\"left\" body_text_color=\"#2E353D\" body_font_size=\"16px\" tab_font=\"|300|||||||\" tab_font_size=\"18px\" body_link_font=\"|300|||||||\" body_link_text_color=\"#F07F1D\" custom_margin=\"35px|0px|35px|0px|true|true\" border_radii=\"on|5px|5px|5px|5px\" box_shadow_style=\"preset1\" box_shadow_spread=\"-8px\" box_shadow_color=\"rgba(0,0,0,0.23)\" global_colors_info=\"{}\" active_tab_text_color__hover_enabled=\"on|desktop\" active_tab_text_color__hover=\"#F07F1D\" tab_text_color__hover_enabled=\"on|hover\" tab_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\"][et_pb_tab title=\"Approach\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Our approach is based on international standards and many years of experience, guaranteeing efficiency and quality. We take the requirements of the NIST SP800-115, the PCI DSS and action recommendations provided by the German Federal Office for Information Security (BSI) and the Open Web Application Security Project (OWASP) into account.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_tab][et_pb_tab title=\"Responsibility\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Handling the results of our work in a responsible way is our highest priority. We\u2019ve taken a long, hard look at what this means for our behaviour. Below, you\u2019ll find our guiding principles for responsible disclosure of security vulnerabilities.<\/p>\n<p><a class=\"x-btn ghost-orange x-btn-usd-button-s x-btn-global-setting x-btn-global setting\" href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\" data-options=\"thumbnail: &#039;&#039;\" target=\"_blank\" rel=\"noopener\">Responsible Disclosure<\/a><\/p>\n<p>[\/et_pb_tab][et_pb_tab title=\"Commitment\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>IT security research is just as important to our work as the exchange of knowledge with the security community. After all, more security can only be achieved if many people take on the task. We bear responsibility. We share the knowledge we gain in our practical work and through our research with the security community in public events held in the\u00a0<\/span><a href=\"\/en\/cst-academy\/\">CST Academy<\/a><span>,\u00a0\u00a0<\/span><a href=\"\/en\/cst-academy\/events\/\">training courses<\/a><span>\u00a0and\u00a0<\/span><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/\" target=\"_blank\" rel=\"noopener\">publications<\/a><span>.<\/span><\/p>\n<p><a class=\"x-btn ghost-orange x-btn-usd-button-s x-btn-global-setting x-btn-global setting\" href=\"https:\/\/herolab.usd.de\/en\/security-research\/\" data-options=\"thumbnail: &#039;&#039;\" target=\"_blank\" rel=\"noopener\">Read more<\/a><\/p>\n<p><a class=\"x-btn ghost-orange x-btn-usd-button-s x-btn-global-setting x-btn-global setting\" href=\"https:\/\/herolab.usd.de\/en\/security-research\/\" data-options=\"thumbnail: &#039;&#039;\" target=\"_blank\" rel=\"noopener\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Analysis &amp; Pentests We support businesses with technical security analysisOur services for businesses and manufacturers Whether you want to use applications and systems more securely as a company or, as a product manufacturer, want to offer demonstrably more security to your customers: With\u00a0usd HeroLab, you have one of the leading security partners at your [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-15265","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=15265"}],"version-history":[{"count":8,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265\/revisions"}],"predecessor-version":[{"id":63226,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265\/revisions\/63226"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=15265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}