{"id":5928,"date":"2025-10-17T08:14:23","date_gmt":"2025-10-17T08:14:23","guid":{"rendered":"https:\/\/www.intnews.it\/?p=5928"},"modified":"2025-10-17T08:14:59","modified_gmt":"2025-10-17T08:14:59","slug":"apple-bug-bounty-reward-up-to-2-million","status":"publish","type":"post","link":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/","title":{"rendered":"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain"},"content":{"rendered":"\n<p>Apple has given its Security Bounty program a momentous twist, introducing the biggest overhaul since its public launch in 2020. The main innovation is a dramatic increase in rewards: the company now offers up to 2 million dollars for the discovery of complex exploit chains, with a specific focus on attacks attributable to mercenary spyware. With the addition of new bonuses, the total compensation for a single vulnerability report can exceed $5 million, positioning Apple&#8217;s program as the highest-paying in the industry.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>From Single Vulnerabilities to Exploit Chains: Apple&#8217;s New Security Strategy<\/strong><\/h3>\n\n\n\n<p>The most strategic change in the Apple Security Bounty program is the shift in focus. If previously isolated bugs were also rewarded, now the company favors reporting the full attack chain &#8211; which includes:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<ul class=\"wp-block-list\">\n<li>Remote Code Execution<\/li>\n\n\n\n<li>Sandbox escape<\/li>\n\n\n\n<li>Privilege escalation<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p>This new direction is not accidental &#8211; it reflects the nature of modern cyberattacks, which are rarely based on a single flaw, but are rather an orchestrated sequence of vulnerabilities. The goal is clear: to prod security researchers to think like attackers by reconstructing the entire path of an end-to-end attack.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Target Flags: Faster Payments for Security Researchers<\/strong><\/h3>\n\n\n\n<p>To make the process more efficient and attractive to ethical hackers, Apple introduces Target Flags. Inspired by &#8220;Capture The Flag&#8221; (CTF) competitions, these digital &#8220;flags&#8221; function as an objective certification of the level of access achieved through an exploit.<\/p>\n\n\n\n<p>The benefits for researchers are enormous:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Immediate Bounty Confirmation:<\/strong> Once the flag is validated by Apple, the reward is confirmed, without having to wait for the release of the corrective patch.<\/li>\n\n\n\n<li><strong>Quick Payments:<\/strong> The compensation is paid in the next payment cycle, eliminating the long waits (often months) of the old system.<\/li>\n<\/ol>\n\n\n\n<p>This innovation reduces bureaucracy and offers greater economic certainty to teams that practice responsible disclosure.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Details on New Rewards: Figures and Key Objectives<\/strong><\/h3>\n\n\n\n<p>The new rewards scheme of the Apple Security Bounty program highlights the areas considered most critical for ecosystem security. Among the main echelons, the following stand out:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Up to $300,000 for a one-click exploit on WebKit with sandbox escape, proving that browser security remains a top priority.<\/li>\n\n\n\n<li>Up to $1 million for zero-click wireless proximity exploits, targeting radios like Wi-Fi and Bluetooth, a highly coveted attack vector.<\/li>\n\n\n\n<li>$100,000 for a full Gatekeeper bypass on macOS, underlining the importance of security on desktop too.<\/li>\n<\/ul>\n\n\n\n<p>There are also specific bonuses for those who manage to bypass Lockdown Mode or discover critical vulnerabilities in the beta versions of the software. Since 2020, Apple has already distributed over $35 million to more than 800 researchers, and with these new rules, the figure is expected to grow exponentially.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-small-font-size\">source: <a href=\"https:\/\/www.iphoneitalia.com\/842271\/apple-raddoppia-il-bug-bounty-fino-a-2-milioni-di-dollari-per-chi-scopre-exploit?ref=morningtech.it\" target=\"_blank\" rel=\"noreferrer noopener\">IphoneItalia <\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Other articles like this:<a href=\"https:\/\/www.intnews.it\/en\/category\/economy\/\"> intnews-economia <\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how &#8220;Target Flags&#8221; speed up payments for security researchers.<\/p>\n","protected":false},"author":6,"featured_media":6128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[148,84],"tags":[],"class_list":{"0":"post-5928","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-economy","8":"category-technologies"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain - INT News<\/title>\n<meta name=\"description\" content=\"Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how &quot;Target Flags&quot; speed up payments for security researchers. Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how &quot;Target Flags&quot; speed up payments for security researchers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain - INT News\" \/>\n<meta property=\"og:description\" content=\"Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how &quot;Target Flags&quot; speed up payments for security researchers. Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how &quot;Target Flags&quot; speed up payments for security researchers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/\" \/>\n<meta property=\"og:site_name\" content=\"INT News\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-17T08:14:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T08:14:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intnews.it\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Redazione\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redazione\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/\"},\"author\":{\"name\":\"Redazione\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/person\\\/348bf8ca8793a1fff502097a042cb621\"},\"headline\":\"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain\",\"datePublished\":\"2025-10-17T08:14:23+00:00\",\"dateModified\":\"2025-10-17T08:14:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/\"},\"wordCount\":450,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png\",\"articleSection\":[\"Economy\",\"Technologies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/\",\"name\":\"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain - INT News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png\",\"datePublished\":\"2025-10-17T08:14:23+00:00\",\"dateModified\":\"2025-10-17T08:14:59+00:00\",\"description\":\"Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \\\"Target Flags\\\" speed up payments for security researchers. Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \\\"Target Flags\\\" speed up payments for security researchers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#primaryimage\",\"url\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png\",\"contentUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png\",\"width\":1344,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/apple-bug-bounty-reward-up-to-2-million\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/intnews.it\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/\",\"name\":\"INT News\",\"description\":\"innovation tomorrow\",\"publisher\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\"},\"alternateName\":\"Innovation Tomorrow\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/intnews.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\",\"name\":\"INT News\",\"alternateName\":\"Innovation Tomorrow\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/int-logo2.webp\",\"contentUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/int-logo2.webp\",\"width\":538,\"height\":232,\"caption\":\"INT News\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/person\\\/348bf8ca8793a1fff502097a042cb621\",\"name\":\"Redazione\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"caption\":\"Redazione\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain - INT News","description":"Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \"Target Flags\" speed up payments for security researchers. Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \"Target Flags\" speed up payments for security researchers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/","og_locale":"en_US","og_type":"article","og_title":"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain - INT News","og_description":"Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \"Target Flags\" speed up payments for security researchers. Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \"Target Flags\" speed up payments for security researchers.","og_url":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/","og_site_name":"INT News","article_published_time":"2025-10-17T08:14:23+00:00","article_modified_time":"2025-10-17T08:14:59+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png","type":"image\/png"}],"author":"Redazione","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Redazione","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#article","isPartOf":{"@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/"},"author":{"name":"Redazione","@id":"https:\/\/intnews.it\/en\/#\/schema\/person\/348bf8ca8793a1fff502097a042cb621"},"headline":"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain","datePublished":"2025-10-17T08:14:23+00:00","dateModified":"2025-10-17T08:14:59+00:00","mainEntityOfPage":{"@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/"},"wordCount":450,"commentCount":0,"publisher":{"@id":"https:\/\/intnews.it\/en\/#organization"},"image":{"@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#primaryimage"},"thumbnailUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png","articleSection":["Economy","Technologies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/","url":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/","name":"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain - INT News","isPartOf":{"@id":"https:\/\/intnews.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#primaryimage"},"image":{"@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#primaryimage"},"thumbnailUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png","datePublished":"2025-10-17T08:14:23+00:00","dateModified":"2025-10-17T08:14:59+00:00","description":"Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \"Target Flags\" speed up payments for security researchers. Apple revolutionizes its Security Bounty program, offering up to $2 million for exploit chain discovery. Learn about new rules, rewards, and how \"Target Flags\" speed up payments for security researchers.","breadcrumb":{"@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#primaryimage","url":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png","contentUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2025\/10\/Gemini_Generated_Image_sxl9tasxl9tasxl9.png","width":1344,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/intnews.it\/en\/apple-bug-bounty-reward-up-to-2-million\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intnews.it\/en\/"},{"@type":"ListItem","position":2,"name":"Apple Bug Bounty: Reward up to $2 Million for Vulnerability and Exploit Chain"}]},{"@type":"WebSite","@id":"https:\/\/intnews.it\/en\/#website","url":"https:\/\/intnews.it\/en\/","name":"INT News","description":"innovation tomorrow","publisher":{"@id":"https:\/\/intnews.it\/en\/#organization"},"alternateName":"Innovation Tomorrow","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intnews.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intnews.it\/en\/#organization","name":"INT News","alternateName":"Innovation Tomorrow","url":"https:\/\/intnews.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intnews.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/10\/int-logo2.webp","contentUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/10\/int-logo2.webp","width":538,"height":232,"caption":"INT News"},"image":{"@id":"https:\/\/intnews.it\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/intnews.it\/en\/#\/schema\/person\/348bf8ca8793a1fff502097a042cb621","name":"Redazione","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","caption":"Redazione"}}]}},"_links":{"self":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/5928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/comments?post=5928"}],"version-history":[{"count":3,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/5928\/revisions"}],"predecessor-version":[{"id":5932,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/5928\/revisions\/5932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/media\/6128"}],"wp:attachment":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/media?parent=5928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/categories?post=5928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/tags?post=5928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}