{"id":1,"name":"recon","url":"https:\/\/reconcybersecurity.com\/blogs","description":"","link":"https:\/\/reconcybersecurity.com\/blogs\/author\/recon\/","slug":"recon","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/b6502407b9144dbe51330c776e5ebabb?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/b6502407b9144dbe51330c776e5ebabb?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/b6502407b9144dbe51330c776e5ebabb?s=96&d=mm&r=g"},"meta":{"web_stories_tracking_optin":true,"web_stories_media_optimization":true,"web_stories_onboarding":{"addBackgroundMedia":true,"addLinks":true,"cropElementsWithShapes":true,"cropSelectedElements":true,"embedWebStories":true,"enableSwipe":true,"previewStory":true,"safeZone":true}},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users"}]}}