{"id":9112,"date":"2026-01-30T18:47:28","date_gmt":"2026-01-30T13:17:28","guid":{"rendered":"https:\/\/mitigata.com\/blog\/?p=9112"},"modified":"2026-01-30T18:57:48","modified_gmt":"2026-01-30T13:27:48","slug":"india-cyber-threat-report-2025","status":"publish","type":"post","link":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/","title":{"rendered":"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9112\" class=\"elementor elementor-9112\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2af1797 e-flex e-con-boxed e-con e-parent\" data-id=\"2af1797\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-693314b elementor-widget elementor-widget-text-editor\" data-id=\"693314b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In 2025, India emerged as one of the world&#8217;s most targeted nations for cyberattacks, with organisations facing an unprecedented wave of digital threats. According to industry reports, Indian enterprises faced an average of over <b>2,000+ attacks<\/b> per week, which is a <b>45% increase<\/b> year-on-year compared to global averages.<\/p><p>From AI-powered ransomware encrypting hospital systems to sophisticated phishing schemes draining bank accounts, the cyber threat landscape evolved faster than most security teams could respond.<\/p><p>This blog highlights the key cyber attacks in 2025 while providing actionable insights for strengthening your defences in 2026.<\/p><h2><b>Why Businesses Choose Mitigata For Cybersecurity\u00a0<\/b><\/h2><p>Before we dive into the data, here&#8217;s why over 800 companies across 25+ industries trust Mitigata to protect their digital assets:<\/p><p><b>Proactive Threat Detection<\/b> \u2013 We identify risks before they become breaches<br \/><b>24\/7 Monitoring<\/b> \u2013 Real-time surveillance of your attack surface to ensure zero dwell time for attackers.<br \/><b>Expert Response Teams<\/b> \u2013 Immediate action when threats emerge, minimising downtime and financial loss.<br \/><b>Compliance Support<\/b> \u2013 Stay ahead of <a href=\"https:\/\/mitigata.com\/blog\/what-is-dpdp-rules-2025\/\">DPDPA<\/a> and industry regulations with automated reporting tools.<br \/><b>Proven Track Record<\/b> \u2013 Zero successful breaches across our protected clients in 2025<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9115\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Blog-graphics-18-1-1.png\" alt=\"\" width=\"2200\" height=\"1300\" \/><\/p><h2><b>Executive Summary: India&#8217;s Cyber Crisis by the Numbers<\/b><\/h2><p>Record-breaking cyber threats hit India hard in 2025, exposing urgent gaps in defences.<\/p><table><thead><tr><th>Statistic<\/th><th>Value<\/th><th>Context<\/th><\/tr><\/thead><tbody><tr><td>Total Cyber Attacks<\/td><td>265.52 million<\/td><td>Across websites and endpoints nationwide<\/td><\/tr><tr><td>Malware Detections<\/td><td>369.01 million<\/td><td>Monitored across 8.44 million endpoints<\/td><\/tr><tr><td>Attacks per Org\/Week<\/td><td>2,000+<\/td><td>47% higher than the global average of 1,925<\/td><\/tr><tr><td>Financial Fraud Losses<\/td><td>\u20b936,450 crore<\/td><td>Reported through the National Cyber Crime Portal by Feb 2025<\/td><\/tr><\/tbody><\/table><blockquote><p>Cybersecurity automation sounds foolproof until you see what it misses. Here are <a href=\"https:\/\/mitigata.com\/blog\/6-cybersecurity-automation-tools\/\"><b><i>6 cybersecurity automation tools<\/i><\/b><\/a> and the blind spots that come with them.<\/p><\/blockquote><h2><b>What the Data Reveals About India&#8217;s Cyber Vulnerability<\/b><\/h2><p>In 2025, India experienced more malware attacks than almost any other nation worldwide. Here&#8217;s why Indian businesses were disproportionately targeted:<\/p><ul><li>Rapid digital adoption without security maturity \u2013 Organisations rushed to cloud platforms and digital services, but left security as an afterthought. This created a &#8220;security debt&#8221; that attackers eagerly exploited.<\/li><li>Endpoint explosion \u2013 With <b>8.44 million<\/b> monitored endpoints, each device became a potential entry point for attackers. The rise of IoT devices in <a href=\"https:\/\/mitigata.com\/blog\/cyber-insurance-for-manufacturing\/\">manufacturing<\/a> and logistics specifically widened this gap.<\/li><li>Legacy infrastructure \u2013 Outdated systems, unpatched software, and poor access controls created easy targets. Many SMEs were found running End-of-Life (EOL) operating systems, lacking critical security updates.<\/li><li>Valuable data concentration \u2013 Banking, healthcare, and government sectors hold treasure troves of personal and financial information.<\/li><\/ul><p><b>The average cost of a data breach in India reached an all-time high of \u20b922 Crore in 2025, a 13% increase from the previous year (2024).<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc0345e e-flex e-con-boxed e-con e-parent\" data-id=\"bc0345e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4c55cd5 e-con-full e-flex e-con e-child\" data-id=\"4c55cd5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d66917b elementor-widget elementor-widget-heading\" data-id=\"d66917b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Risk Insurance Policy Starting \n<span style=\"color:#04DB7F\">at Just \u20b995,000\/ Year*<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e49aff elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5e49aff\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56e179d elementor-widget elementor-widget-text-editor\" data-id=\"56e179d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With Mitigata, you get the best market pricing and fast claims\u2014plus proactive defence through our free cyber risk console.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d138b1 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"8d138b1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mitigata.com\/bookDemo\" id=\"pop_up_form_blog_cta\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Our Expert Today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d2288cb e-con-full e-flex e-con e-child\" data-id=\"d2288cb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e66a66 elementor-widget elementor-widget-image\" data-id=\"8e66a66\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata.png\" class=\"attachment-medium size-medium wp-image-5332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e4340b e-flex e-con-boxed e-con e-parent\" data-id=\"4e4340b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9d6981 elementor-widget elementor-widget-text-editor\" data-id=\"a9d6981\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Most Targeted Sectors:<\/b><\/p><ul><li>Financial services managing billions in daily transactions<\/li><li>Healthcare providers storing sensitive medical records<\/li><li>Government agencies with citizen databases<\/li><li>Telecommunications companies controlling critical infrastructure<\/li><li>Educational institutions with valuable research data<\/li><\/ul><h3><b>AI-Powered Cybercrime: The Game Changer<\/b><\/h3><p>Artificial intelligence fundamentally transformed the cybercrime landscape in 2025. What used to take attackers weeks now takes minutes, and what used to require expert skills can now be automated.<br \/><b>Automated phishing generation<\/b> \u2013 AI creates convincing, personalised emails at a massive scale<\/p><p><b>Behaviour analysis<\/b> \u2013 Malware learns user patterns to avoid detection<\/p><p><b>Rapid ransomware deployment<\/b> \u2013 Systems encrypted in minutes instead of hours<\/p><p><b>Adaptive malware<\/b> \u2013 Threats that evolve to bypass security measures in real-time<\/p><p><b>Deepfake impersonation<\/b> \u2013 Fake videos and voices tricking employees into transferring funds.<\/p><p>In one notable case, a Mumbai-based firm lost <b>\u20b92 Crore<\/b> when an employee was duped by a deepfake video call of their CFO.<\/p><blockquote><p>Choosing the right DLP tool is critical to preventing data leaks. This guide explains how to <a href=\"https:\/\/mitigata.com\/blog\/how-to-choose-dlp-tool\/\"><b><i>choose a DLP tool<\/i><\/b><\/a> based on real security and compliance needs.<\/p><\/blockquote><h3><b>Digital Expansion Creates New Vulnerabilities<\/b><\/h3><p>The rapid adoption of cloud platforms, SaaS tools, mobile access, and third-party integrations drove <a href=\"https:\/\/mitigata.com\/blog\/latest-cyber-attacks\/\">cyber attacks<\/a> to record levels in 2025. Organisations rushed toward digital transformation but left security gaps wide open.<\/p><p><a href=\"https:\/\/mitigata.com\/blog\/best-casb-companies-india\/\">Cloud security<\/a> emerged as a critical risk area, with one breach exposing nearly 500GB of sensitive personal and biometric data due to an unsecured cloud storage environment. Misconfigured S3 buckets and poor IAM (<a href=\"https:\/\/mitigata.com\/blog\/best-iam-tools\/\">Identity and Access Management<\/a>) policies were the leading causes of these leaks.<\/p><h3><b>The Expanding Attack Surface Problem<\/b><\/h3><p>Endpoint proliferation \u2013 Every device, from laptops to IoT sensors, is a potential entry point<\/p><p>Third-party integrations \u2013 Vendors and partners create additional attack vectors<\/p><p>Remote access requirements \u2013 VPNs and remote desktop protocols are often poorly secured<\/p><p>API vulnerabilities \u2013 Application programming interfaces expose backend systems<\/p><p>Mobile device risks \u2013 BYOD policies without proper security controls<\/p><p><b>Pro Tip:<\/b> Do not rely solely on traditional antivirus software. Implement <a href=\"https:\/\/mitigata.com\/blog\/best-practices-of-asm\/\">Attack Surface Management<\/a> (ASM) to continuously discover and map your digital assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b71df4 e-flex e-con-boxed e-con e-parent\" data-id=\"2b71df4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0e54a43 e-con-full e-flex e-con e-child\" data-id=\"0e54a43\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-272a157 elementor-widget elementor-widget-heading\" data-id=\"272a157\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why overpay for features <span style=\"color:#04DB7F\">you\u2019ll never use?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f662b1b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f662b1b\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-026403d elementor-widget elementor-widget-text-editor\" data-id=\"026403d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mitigata helps SMBs secure systems instantly with zero training, smooth setup, and the industry\u2019s most affordable pricing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d87ff45 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"d87ff45\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mitigata.com\/bookDemo\" id=\"pop_up_form_blog_cta\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Our Expert Today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d4d68b e-con-full e-flex e-con e-child\" data-id=\"0d4d68b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82ffe19 elementor-widget elementor-widget-image\" data-id=\"82ffe19\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata.png\" class=\"attachment-medium size-medium wp-image-5332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dec1f1f e-flex e-con-boxed e-con e-parent\" data-id=\"dec1f1f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b9d3bf elementor-widget elementor-widget-text-editor\" data-id=\"8b9d3bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Business Impact of Cyber Attacks in India 2025<\/b><\/h3><p>Attackers targeted vulnerable areas like payment systems, customer data, and unmonitored internal platforms.<\/p><p>The impact went beyond money; businesses faced:<\/p><ul><li>lost customers<\/li><li>disrupted services<\/li><li>reputational damage<\/li><li>regulatory scrutiny<\/li><li>lawsuits, and higher cybersecurity costs, which hurt growth.<\/li><\/ul><p><b>Real-World Example: The SME Ransomware Crisis<\/b><\/p><p>A mid-sized logistics firm in Pune faced a lock-bit ransomware attack in mid-2025. Without cyber insurance or offline backups, they were forced to halt operations for two weeks, resulting in a \u20b93.5 Crore loss and the cancellation of two major client contracts.<\/p><p><img decoding=\"async\" class=\"alignnone size-full wp-image-9120\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Blog-graphics-29.png\" alt=\"\" width=\"1100\" height=\"650\" \/><\/p><h3><b>Regulatory Focus and National Cybersecurity Efforts<\/b><\/h3><p>The Indian government introduced tougher rules requiring companies to report security breaches and follow stricter safety standards.<\/p><p>However, these new rules affected companies differently:<\/p><ul><li>On the one hand, organisations became more transparent and accountable for protecting data.<\/li><li>On the other hand, many struggled to keep up, especially smaller companies that lacked strong security systems or couldn&#8217;t find enough trained cybersecurity professionals.<\/li><\/ul><p><b>Key Compliance Mandates:<\/b><\/p><ul><li>Mandatory breach notification within statutory timelines (often <b>6 hours<\/b> for CERT-In and <b>72 hours<\/b> for the Data Protection Board).<\/li><li>Regular security audits and<a href=\"https:\/\/mitigata.com\/blog\/vulnerability-assessment-vs-penetration-testing\/\"> vulnerability assessments<\/a><\/li><li>Data protection impact assessments for high-risk processing<\/li><li>Appointment of data protection officers<\/li><li>Incident response and business continuity planning<\/li><li>Enhanced access controls and encryption requirements<\/li><\/ul><blockquote><p>Looking for the <a href=\"https:\/\/mitigata.com\/blog\/best-network-security-tools-complete-guide\/\"><b><i>best network security tools<\/i><\/b><\/a>? This complete guide breaks down top solutions, use cases, and how to choose the right one.<\/p><\/blockquote><p><b>Consequences of Non-Compliance:<\/b><\/p><p>Organisations that failed to meet requirements faced:<\/p><ul><li><b>Financial penalties<\/b> \u2013 Hefty fines based on revenue or severity, reaching up to \u20b9250 Crore under the DPDPA.<\/li><li><b>Operational restrictions<\/b> \u2013 Temporary business suspensions<\/li><li><b>Surprise audits<\/b> \u2013 Disruptive regulatory inspections<\/li><li><b>Public disclosure<\/b> \u2013 Reputational damage from published violations<\/li><li><b>Criminal liability<\/b> \u2013 Personal accountability for executives<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff477f7 e-flex e-con-boxed e-con e-parent\" data-id=\"ff477f7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c904832 e-con-full e-flex e-con e-child\" data-id=\"c904832\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01b35c7 elementor-widget elementor-widget-heading\" data-id=\"01b35c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybercriminals can\u2019t hide when Mitigata monitors\n<span style=\"color:#04DB7F\">dark web threats<\/span>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bed09f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3bed09f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04e9839 elementor-widget elementor-widget-text-editor\" data-id=\"04e9839\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigata delivers real-time detection, expert-led response, and market-best pricing.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-453f152 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"453f152\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mitigata.com\/bookDemo\" id=\"pop_up_form_blog_cta\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Our Expert Today!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04a74b8 e-con-full e-flex e-con e-child\" data-id=\"04a74b8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f88a4f8 elementor-widget elementor-widget-image\" data-id=\"f88a4f8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata.png\" class=\"attachment-medium size-medium wp-image-5332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14b9035 e-flex e-con-boxed e-con e-parent\" data-id=\"14b9035\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbef1f5 elementor-widget elementor-widget-text-editor\" data-id=\"fbef1f5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><b>Essential Security Steps for 2026<\/b><\/h2><p><b>Immediate Actions<\/b><\/p><ul><li>Conduct comprehensive security assessments to identify vulnerabilities<\/li><li>Implement multi-factor authentication across all systems<\/li><li>Deploy <a href=\"https:\/\/mitigata.com\/blog\/edr-tools-in-india\/\">endpoint detection and respons<\/a>e (EDR) solutions<\/li><li>Establish regular backup and recovery procedures<\/li><li>Create an <a href=\"https:\/\/mitigata.com\/blog\/incident-response-plan\/\">incident response plan<\/a> and test it<\/li><\/ul><p><b>Strategic Initiatives:<\/b><\/p><ul><li>Adopt <a href=\"https:\/\/mitigata.com\/blog\/smarter-alternative-to-vpns\/\">zero-trust<\/a> architecture principles<\/li><li>Implement advanced threat detection using AI\/ML<\/li><li>Establish a security operations centre or partner with an MSSP<\/li><li>Develop a comprehensive vendor risk management program<\/li><li>Invest in <a href=\"https:\/\/mitigata.com\/blog\/cyber-security-training-for-employees\/\">security awareness training<\/a> for all employees<\/li><\/ul><blockquote><p>From phishing to password hygiene, this guide outlines core <a href=\"https:\/\/mitigata.com\/blog\/cybersecurity-awareness-training-topics\/\"><b><i>cybersecurity awareness training topics<\/i><\/b><\/a> that actually reduce risk.<\/p><\/blockquote><h3><b>Conclusion<\/b><\/h3><p>Smart organisations are leveraging threat intelligence and optimising their security monitoring to detect threats early. Don&#8217;t wait for a breach to prioritise cybersecurity.<\/p><p><a href=\"https:\/\/mitigata.com\/bookDemo\">Contact Mitigata<\/a> today to strengthen your defences for 2026 and build complete cyber resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43d8578 e-flex e-con-boxed e-con e-parent\" data-id=\"43d8578\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcc63b3 elementor-widget elementor-widget-html\" data-id=\"bcc63b3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"application\/ld+json\">\r\n{\r\n  \"@context\": \"https:\/\/schema.org\/\", \r\n  \"@type\": \"Product\", \r\n  \"name\": \"India Cyber Threat Report 2025 | Year of Digital Attacks\",\r\n  \"image\": \"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png\",\r\n  \"description\": \"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.\",\r\n  \"aggregateRating\": {\r\n    \"@type\": \"AggregateRating\",\r\n    \"ratingValue\": \"4.3\",\r\n    \"bestRating\": \"4.5\",\r\n    \"worstRating\": \"3.8\",\r\n    \"ratingCount\": \"709\"\r\n  }\r\n}\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In 2025, India emerged as one of the world&#8217;s most targeted nations for cyberattacks, with organisations facing an unprecedented wave&hellip;<\/p>\n","protected":false},"author":16,"featured_media":9113,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-9112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>India Cyber Threat Report 2025 | Year of Digital Attacks<\/title>\n<meta name=\"description\" content=\"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks\" \/>\n<meta property=\"og:description\" content=\"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Mitigata Cyber insurance &amp; security blogs\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-30T13:17:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-30T13:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1101\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"areena g\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mitigata\" \/>\n<meta name=\"twitter:site\" content=\"@mitigata\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"areena g\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\"},\"author\":{\"name\":\"areena g\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba\"},\"headline\":\"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks\",\"datePublished\":\"2026-01-30T13:17:28+00:00\",\"dateModified\":\"2026-01-30T13:27:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\"},\"wordCount\":1250,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\",\"url\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\",\"name\":\"India Cyber Threat Report 2025 | Year of Digital Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png\",\"datePublished\":\"2026-01-30T13:17:28+00:00\",\"dateModified\":\"2026-01-30T13:27:48+00:00\",\"description\":\"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.\",\"breadcrumb\":{\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage\",\"url\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png\",\"contentUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png\",\"width\":1101,\"height\":400,\"caption\":\"india cyber threat report 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mitigata.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mitigata.com\/blog\/#website\",\"url\":\"https:\/\/mitigata.com\/blog\/\",\"name\":\"Mitigata Cyber insurance & security blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#organization\"},\"alternateName\":\"Mitigata - smart cyber insurance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mitigata.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mitigata.com\/blog\/#organization\",\"name\":\"Mitigata: Smart Cyber insurance\",\"url\":\"https:\/\/mitigata.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png\",\"contentUrl\":\"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png\",\"width\":648,\"height\":280,\"caption\":\"Mitigata: Smart Cyber insurance\"},\"image\":{\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/mitigata\",\"https:\/\/www.instagram.com\/mitigata_insurance\/\",\"https:\/\/www.linkedin.com\/company\/mitigata-insurance\/\"],\"legalName\":\"Mitigata Insurance Broker private limited\",\"foundingDate\":\"2021-07-30\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba\",\"name\":\"areena g\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mitigata.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g\",\"caption\":\"areena g\"},\"description\":\"Areena is a content and marketing professional with over three years of experience. She enjoys building content strategies and writing pieces that speak clearly to the audience and support real business goals. Her strength lies in turning complex topics into meaningful, reader-friendly content.\",\"sameAs\":[\"https:\/\/mitigata.com\/\"],\"url\":\"https:\/\/mitigata.com\/blog\/author\/areena\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"India Cyber Threat Report 2025 | Year of Digital Attacks","description":"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/","og_locale":"en_US","og_type":"article","og_title":"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks","og_description":"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.","og_url":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/","og_site_name":"Mitigata Cyber insurance &amp; security blogs","article_published_time":"2026-01-30T13:17:28+00:00","article_modified_time":"2026-01-30T13:27:48+00:00","og_image":[{"width":1101,"height":400,"url":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png","type":"image\/png"}],"author":"areena g","twitter_card":"summary_large_image","twitter_creator":"@mitigata","twitter_site":"@mitigata","twitter_misc":{"Written by":"areena g","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#article","isPartOf":{"@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/"},"author":{"name":"areena g","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba"},"headline":"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks","datePublished":"2026-01-30T13:17:28+00:00","dateModified":"2026-01-30T13:27:48+00:00","mainEntityOfPage":{"@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/"},"wordCount":1250,"commentCount":0,"publisher":{"@id":"https:\/\/mitigata.com\/blog\/#organization"},"image":{"@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png","articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/","url":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/","name":"India Cyber Threat Report 2025 | Year of Digital Attacks","isPartOf":{"@id":"https:\/\/mitigata.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage"},"image":{"@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png","datePublished":"2026-01-30T13:17:28+00:00","dateModified":"2026-01-30T13:27:48+00:00","description":"India faced 369 million malware attacks in 2025. Discover key threats, real breach cases, and protection strategies for 2026.","breadcrumb":{"@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#primaryimage","url":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png","contentUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2026\/01\/Frame-167.png","width":1101,"height":400,"caption":"india cyber threat report 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/mitigata.com\/blog\/india-cyber-threat-report-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mitigata.com\/blog\/"},{"@type":"ListItem","position":2,"name":"India Cyber Threat Report 2025 | A Record-Breaking Year of Digital Attacks"}]},{"@type":"WebSite","@id":"https:\/\/mitigata.com\/blog\/#website","url":"https:\/\/mitigata.com\/blog\/","name":"Mitigata Cyber insurance & security blogs","description":"","publisher":{"@id":"https:\/\/mitigata.com\/blog\/#organization"},"alternateName":"Mitigata - smart cyber insurance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mitigata.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mitigata.com\/blog\/#organization","name":"Mitigata: Smart Cyber insurance","url":"https:\/\/mitigata.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png","contentUrl":"https:\/\/mitigata.com\/blog\/wp-content\/uploads\/2025\/08\/Mitigata-Full-Stack-Logo-Black.png","width":648,"height":280,"caption":"Mitigata: Smart Cyber insurance"},"image":{"@id":"https:\/\/mitigata.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/mitigata","https:\/\/www.instagram.com\/mitigata_insurance\/","https:\/\/www.linkedin.com\/company\/mitigata-insurance\/"],"legalName":"Mitigata Insurance Broker private limited","foundingDate":"2021-07-30","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/person\/bf18bdba5137c3be679cc409393d82ba","name":"areena g","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mitigata.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0774f83f6c2e5054152d6e6cca8ebb1388e3b539b74f91e75a0c85fd90967769?s=96&d=mm&r=g","caption":"areena g"},"description":"Areena is a content and marketing professional with over three years of experience. She enjoys building content strategies and writing pieces that speak clearly to the audience and support real business goals. Her strength lies in turning complex topics into meaningful, reader-friendly content.","sameAs":["https:\/\/mitigata.com\/"],"url":"https:\/\/mitigata.com\/blog\/author\/areena\/"}]}},"_links":{"self":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts\/9112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/comments?post=9112"}],"version-history":[{"count":7,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts\/9112\/revisions"}],"predecessor-version":[{"id":9126,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/posts\/9112\/revisions\/9126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/media\/9113"}],"wp:attachment":[{"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/media?parent=9112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/categories?post=9112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mitigata.com\/blog\/wp-json\/wp\/v2\/tags?post=9112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}