{"id":1335,"date":"2026-04-15T15:00:51","date_gmt":"2026-04-15T20:00:51","guid":{"rendered":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/?p=1335"},"modified":"2026-04-15T15:00:51","modified_gmt":"2026-04-15T20:00:51","slug":"snowflake-docketwise-supply-chain-data-breaches-2026","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/blog\/snowflake-docketwise-supply-chain-data-breaches-2026\/","title":{"rendered":"The Snowflake DocketWise Breaches: Navigating the 2026 Supply Chain Crisis"},"content":{"rendered":"<p>&nbsp;<\/p>\n<table style=\"background: #f4f8fa\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding: 0\" align=\"center\">\n<table style=\"width: 100%;max-width: 900px\" border=\"0\" width=\"900\" cellspacing=\"0\" cellpadding=\"0\"><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 ANIMATED HERO \u2014 RED (active threat) \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tbody>\n<tr>\n<td style=\"background-color: #ef3f37;padding: 52px 40px 40px 40px\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\">\n<div class=\"cmit-h1\" style=\"background: #002f44;border: 1px solid #ffffff;color: #ffffff;font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;padding: 6px 14px;border-radius: 3px;margin-bottom: 18px\">\ud83d\udea8 SUPPLY CHAIN CRISIS \u2014 APRIL 2026<\/div>\n<h1 class=\"cmit-h1\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 2.1em;font-weight: 900;color: #ffffff;margin: 0 0 16px 0;line-height: 1.15\">The Snowflake &amp; DocketWise Breaches: Navigating the 2026 Supply Chain Crisis<\/h1>\n<p class=\"cmit-sub\" style=\"font-size: 1.05em;color: #ffffff;margin: 0 0 24px 0;line-height: 1.75\">ShinyHunters doesn&#8217;t need your password. They steal your session token. Las Vegas legal firms, financial offices, and cloud-dependent businesses are directly in the blast radius.<\/p>\n<table class=\"cmit-btns\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background: #002f44;border-radius: 4px\"><a class=\"cmit-btn-red\" style=\"padding: 14px 26px;font-family: Avenir,Arial,sans-serif;font-size: 0.95rem;font-weight: bold;color: #ffffff;text-decoration: none;background: #002f44;border-radius: 4px\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">\ud83d\udee1\ufe0f Get a Third-Party Risk Assessment<\/a><\/td>\n<td width=\"14\"><\/td>\n<td style=\"border: 2px solid #ffffff;border-radius: 4px\"><a class=\"cmit-btn-ghost\" style=\"padding: 12px 22px;font-family: Avenir,Arial,sans-serif;font-size: 0.95rem;font-weight: bold;color: #ffffff;text-decoration: none\" href=\"tel:+17027252877\">\ud83d\udcde 702-725-2877<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td style=\"padding-left: 30px\" valign=\"top\" width=\"210\">\n<table class=\"cmit-card\" style=\"background: #003d58;border: 1px solid #ffffff;border-radius: 6px;overflow: hidden\" border=\"0\" width=\"195\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background: #004a6b;padding: 12px 14px;font-family: Avenir,Arial,sans-serif;font-size: 0.68rem;font-weight: bold;letter-spacing: 0.1em;text-transform: uppercase;color: #ffffff\">INCIDENT SNAPSHOT<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 14px 14px 6px 14px\">\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;color: #ffffff;margin-bottom: 2px;opacity: 0.6\">ACTORS<\/div>\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9rem;font-weight: bold;color: #ffffff;margin-bottom: 10px\">ShinyHunters Gang<\/div>\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;color: #ffffff;margin-bottom: 2px;opacity: 0.6\">TARGETS<\/div>\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9rem;font-weight: bold;color: #ffffff;margin-bottom: 10px\">Snowflake \u00b7 Anodot \u00b7 DocketWise<\/div>\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;color: #ffffff;margin-bottom: 2px;opacity: 0.6\">INDIVIDUALS EXPOSED<\/div>\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.3rem;font-weight: 900;color: #ffffff;margin-bottom: 10px\">116,000+<\/div>\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;color: #ffffff;margin-bottom: 2px;opacity: 0.6\">NOTIFICATION DELAY<\/div>\n<div style=\"background: #ef3f37;padding: 3px 10px;border-radius: 3px;font-family: Avenir,Arial,sans-serif;font-size: 0.8rem;font-weight: bold;color: #ffffff\">6 MONTHS<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- ALERT BAR --><\/p>\n<tr>\n<td style=\"background-color: #002f44;padding: 14px 40px\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.78rem;font-weight: bold;letter-spacing: 0.07em;text-transform: uppercase;color: #ffffff;opacity: 0.6;white-space: nowrap\">ATTACK VECTORS:<\/td>\n<td style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.85rem;color: #ffffff;padding-left: 14px\">\ud83d\udd11 Token Hijacking \u00a0|\u00a0 \u2601\ufe0f Unsecured Service Accounts \u00a0|\u00a0 \u23f1\ufe0f 6-Month Dwell Time \u00a0|\u00a0 \ud83d\udc80 Pure Extortion (No Encryption)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 SECTION 1: EXECUTIVE SUMMARY \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background: #ffffff;padding: 48px 40px 36px 40px\">\n<div class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;color: #ef3f37;margin-bottom: 8px\">01 \u2014 EXECUTIVE SUMMARY<\/div>\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.8em;font-weight: 800;color: #002f44;margin: 0 0 20px 0;line-height: 1.2\">The Vendor Extortion Wave<\/h2>\n<table class=\"cmit-reveal\" style=\"background: #fff8f8;border-left: 4px solid #ef3f37;margin-bottom: 24px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding: 18px 22px\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;font-weight: bold;color: #002f44;margin: 0 0 6px 0\">\ud83d\udea8 The Core Threat Has Shifted<\/p>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.96em;color: #333;margin: 0;line-height: 1.75\">The threat is no longer just a direct hack against your internal servers. It is the compromise of the third-party cloud platforms you trust daily \u2014 and <strong>your liability doesn&#8217;t disappear when the breach happens somewhere else.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;color: #444;line-height: 1.8;margin: 0 0 16px 0\">Two major incidents are sending shockwaves across the corporate landscape: the <strong style=\"color: #002f44\">Snowflake and Anodot supply chain breach<\/strong> orchestrated by the ShinyHunters extortion gang, and the massive <strong style=\"color: #002f44\">DocketWise data breach<\/strong> affecting immigration law firms and over 116,000 individuals.<\/p>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;color: #444;line-height: 1.8;margin: 0\">By stealing authentication tokens and exploiting unsecured cloud service accounts, cybercriminals are bypassing traditional defenses entirely \u2014 leading to catastrophic data exposure and massive regulatory compliance failures. For Las Vegas legal professionals, financial officers, and any business relying on cloud platforms, this is a direct operational warning.<\/p>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 SECTION 2: TECHNICAL DETAILS \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background-color: #002f44;padding: 48px 40px\">\n<div class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;color: #ffffff;margin-bottom: 8px\">02 \u2014 TECHNICAL DETAILS<\/div>\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.8em;font-weight: 800;color: #ffffff;margin: 0 0 10px 0;line-height: 1.2\">Token Hijacking and Dwell Time: The Attack Anatomy<\/h2>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;color: #ffffff;line-height: 1.75;margin: 0 0 28px 0\">These incidents align with CISA-tracked APT campaigns and MITRE ATT&amp;CK T1528. Here is exactly how the attacks unfolded:<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\"><!-- Stage 1 --><\/p>\n<tbody>\n<tr>\n<td class=\"cmit-reveal cmit-hover-card\" style=\"background: #003d58;border: 1px solid #004a6b;border-top: 3px solid #ef9b37;padding: 22px;border-radius: 4px;margin-bottom: 14px\" valign=\"top\">\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.65rem;font-weight: bold;letter-spacing: 0.1em;text-transform: uppercase;color: #ef9b37;margin-bottom: 8px\">ATTACK VECTOR 1 \u2014 T1528<\/div>\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;font-weight: bold;color: #ffffff;margin: 0 0 10px 0\">\ud83d\udd11 Authentication Token Theft (Snowflake \/ Anodot)<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #ffffff;line-height: 1.7;margin: 0\">ShinyHunters did not need to break your encryption. They compromised <strong style=\"color: #ef9b37\">authentication session tokens<\/strong> using LummaC2 infostealer malware deployed on unmanaged devices \u2014 completely bypassing standard Multi-Factor Authentication. Once the token is stolen, the attacker is authenticated as a legitimate user with no further barriers.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<p><!-- Stage 2 --><\/p>\n<tr>\n<td class=\"cmit-reveal cmit-hover-card\" style=\"background: #003d58;border: 1px solid #004a6b;border-top: 3px solid #ef3f37;padding: 22px;border-radius: 4px\" valign=\"top\">\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.65rem;font-weight: bold;letter-spacing: 0.1em;text-transform: uppercase;color: #ef3f37;margin-bottom: 8px\">ATTACK VECTOR 2<\/div>\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;font-weight: bold;color: #ffffff;margin: 0 0 10px 0\">\u2601\ufe0f Unsecured Cloud Service Accounts<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #ffffff;line-height: 1.7;margin: 0\">Supply chain attacks target cloud service accounts lacking stringent conditional access policies or network restrictions. Without proper segmentation, attackers extract massive databases <strong style=\"color: #ef9b37\">directly from cloud environments<\/strong> \u2014 no ransomware, no encryption, just silent exfiltration.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<p><!-- Stage 3 --><\/p>\n<tr>\n<td class=\"cmit-reveal cmit-hover-card\" style=\"background: #3a1a1a;border: 1px solid #7a2a2a;border-top: 3px solid #ef3f37;padding: 22px;border-radius: 4px\" valign=\"top\">\n<div style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.65rem;font-weight: bold;letter-spacing: 0.1em;text-transform: uppercase;color: #ef3f37;margin-bottom: 8px\">THE MOST DAMAGING DETAIL \u2014 DOCKETWISE<\/div>\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;font-weight: bold;color: #ffffff;margin: 0 0 10px 0\">\u23f1\ufe0f Six Months of Dwell Time<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #ffffff;line-height: 1.7;margin: 0\">DocketWise reportedly waited <strong style=\"color: #ef3f37\">approximately six months<\/strong> from breach discovery to notifying the 116,000+ victims whose Social Security numbers and passport data were exposed. This excessive dwell time gave attackers unmitigated access to some of the most sensitive personal data that exists \u2014 and has already triggered multiple class-action investigations.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 SECTION 3: THE RISK \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background: #f4f8fa;padding: 48px 40px\">\n<div class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;color: #ef3f37;margin-bottom: 8px\">03 \u2014 THE RISK<\/div>\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.8em;font-weight: 800;color: #002f44;margin: 0 0 10px 0;line-height: 1.2\">Why CEOs and Managing Partners Must Act Now<\/h2>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;color: #555;line-height: 1.75;margin: 0 0 28px 0\">If your business relies on cloud-based practice management, data warehousing, or CRM platforms, a vendor breach instantly becomes your liability. Here is the specific risk profile:<\/p>\n<table class=\"cmit-reveal\" style=\"margin-bottom: 14px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"cmit-hover-card\" style=\"background: #ffffff;border: 1px solid #d0dadf;border-left: 5px solid #ef3f37;padding: 22px 24px;border-radius: 4px\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.1em;font-weight: 800;color: #002f44;margin: 0 0 8px 0\">\u2696\ufe0f Regulatory and Litigation Hammers<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\">The 6-month notification delay in the DocketWise breach has already triggered multiple class-action investigations. Failure to report within 72 hours can violate GDPR, HIPAA, and emerging state-level privacy laws \u2014 including Maine&#8217;s LD 1822 and Kentucky&#8217;s HB 692 \u2014 resulting in <strong>crippling fines on top of the litigation<\/strong>. Your business doesn&#8217;t need to be the breached party to face liability if your clients&#8217; data was exposed through your vendor.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"cmit-reveal\" style=\"margin-bottom: 14px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"cmit-hover-card\" style=\"background: #ffffff;border: 1px solid #d0dadf;border-left: 5px solid #ef9b37;padding: 22px 24px;border-radius: 4px\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.1em;font-weight: 800;color: #002f44;margin: 0 0 8px 0\">\ud83c\udfdb\ufe0f Loss of Client Trust \u2014 Especially for Law Firms<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\">For professional services and immigration law firms using platforms like DocketWise, <strong>confidentiality is the product<\/strong>. A third-party breach that exposes sensitive client passports, visa applications, and legal records permanently destroys brand reputation. In the Las Vegas legal market, one breach headline can end decades of client trust overnight.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"cmit-reveal\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"cmit-hover-card\" style=\"background: #ffffff;border: 1px solid #d0dadf;border-left: 5px solid #002f44;padding: 22px 24px;border-radius: 4px\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.1em;font-weight: 800;color: #002f44;margin: 0 0 8px 0\">\ud83d\udc80 Extortion Without Encryption<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\">Gangs like ShinyHunters increasingly <strong>skip ransomware encryption entirely<\/strong>. They steal the data, then threaten to release it on dark web forums or send it directly to your clients unless a multi-million dollar ransom is paid. Your backups are irrelevant. Your disaster recovery plan is irrelevant. The only defense is preventing exfiltration in the first place.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 SECTION 4: MITIGATION PLAN \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background: #ffffff;padding: 48px 40px\">\n<div class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;color: #2fb17e;margin-bottom: 8px\">04 \u2014 IMMEDIATE ACTION PLAN<\/div>\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.8em;font-weight: 800;color: #002f44;margin: 0 0 10px 0;line-height: 1.2\">The 3-Step Mitigation Plan<\/h2>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;color: #555;line-height: 1.75;margin: 0 0 30px 0\">You cannot control the internal servers of Snowflake or DocketWise \u2014 but you can control your authentication architecture, vendor audit process, and incident response posture. Implement these today:<\/p>\n<p><!-- Step 1 --><\/p>\n<table class=\"cmit-reveal\" style=\"margin-bottom: 20px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding-right: 20px\" valign=\"top\" width=\"64\">\n<div class=\"cmit-step-num\" style=\"width: 52px;height: 52px;background: #2fb17e;border-radius: 50%;text-align: center;line-height: 52px;font-family: Avenir,Arial,sans-serif;font-size: 1.4em;font-weight: 900;color: #ffffff\">1<\/div>\n<\/td>\n<td style=\"background: #f4f8fa;border: 1px solid #d0dadf;border-left: 4px solid #2fb17e;padding: 20px 22px;border-radius: 4px\" valign=\"top\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.15em;font-weight: 800;color: #002f44;margin: 0 0 8px 0\">Enforce Phishing-Resistant MFA and Token Expiration<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #ef3f37;font-weight: bold;margin: 0 0 6px 0\">The Gap: SMS codes and push notifications are useless once an active session token is stolen.<\/p>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\"><strong>The Fix:<\/strong> Implement <strong>FIDO2 hardware security keys<\/strong> (YubiKey) for all administrative cloud access. Enforce strict Session Lifetime policies that force rapid token expiration \u2014 rendering stolen tokens useless before attackers can act on them.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 2 --><\/p>\n<table class=\"cmit-reveal\" style=\"margin-bottom: 20px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding-right: 20px\" valign=\"top\" width=\"64\">\n<div class=\"cmit-step-num\" style=\"width: 52px;height: 52px;background: #ef9b37;border-radius: 50%;text-align: center;line-height: 52px;font-family: Avenir,Arial,sans-serif;font-size: 1.4em;font-weight: 900;color: #ffffff\">2<\/div>\n<\/td>\n<td style=\"background: #f4f8fa;border: 1px solid #d0dadf;border-left: 4px solid #ef9b37;padding: 20px 22px;border-radius: 4px\" valign=\"top\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.15em;font-weight: 800;color: #002f44;margin: 0 0 8px 0\">Implement Strict Third-Party Vendor Audits<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #ef3f37;font-weight: bold;margin: 0 0 6px 0\">The Gap: Relying blindly on a vendor&#8217;s Terms of Service without verifying their actual security posture.<\/p>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\"><strong>The Fix:<\/strong> Require all software vendors managing your sensitive data to provide current <strong>SOC 2 Type II compliance reports<\/strong> and proof of annual penetration testing. Limit integration API access using the principle of Least Privilege \u2014 vendors should only touch what they absolutely need.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 3 --><\/p>\n<table class=\"cmit-reveal\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding-right: 20px\" valign=\"top\" width=\"64\">\n<div class=\"cmit-step-num\" style=\"width: 52px;height: 52px;background: #ef3f37;border-radius: 50%;text-align: center;line-height: 52px;font-family: Avenir,Arial,sans-serif;font-size: 1.4em;font-weight: 900;color: #ffffff\">3<\/div>\n<\/td>\n<td style=\"background: #f4f8fa;border: 1px solid #d0dadf;border-left: 4px solid #ef3f37;padding: 20px 22px;border-radius: 4px\" valign=\"top\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.15em;font-weight: 800;color: #002f44;margin: 0 0 8px 0\">Establish a 72-Hour Incident Response (IR) Plan<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #ef3f37;font-weight: bold;margin: 0 0 6px 0\">The Gap: Waiting six months to notify stakeholders \u2014 as DocketWise did \u2014 is legal suicide in 2026.<\/p>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\"><strong>The Fix:<\/strong> Develop, document, and table-top test an Incident Response Plan that mandates threat containment, forensic analysis, and legal notification <strong>within 72 hours<\/strong> of any discovered anomaly. Regulatory frameworks are not forgiving of organizations that knew and waited.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 SECTION 5: CMIT SOLUTIONS \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background-color: #002f44;padding: 48px 40px\">\n<div class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;color: #ffffff;margin-bottom: 8px\">05 \u2014 HOW WE PROTECT YOU<\/div>\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.8em;font-weight: 800;color: #ffffff;margin: 0 0 16px 0;line-height: 1.2\">Secure Your Supply Chain with CMIT Solutions<\/h2>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;color: #ffffff;line-height: 1.8;margin: 0 0 28px 0\">At CMIT Solutions, we build IT environments designed to survive the failures of external vendors. We act as your Virtual CIO \u2014 auditing your third-party supply chain, enforcing Zero Trust identity management, and providing 24\/7 SOC monitoring to ensure that when a global cloud platform is compromised, your corporate data remains isolated and secure.<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"cmit-reveal cmit-hover-card\" style=\"background: #003d58;border: 1px solid #004a6b;border-top: 3px solid #2fb17e;padding: 20px;border-radius: 4px\" valign=\"top\" width=\"31%\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;color: #ffffff;margin: 0 0 10px 0\">\ud83d\udd11 FIDO2 &amp; Zero Trust MFA<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.86em;color: #ffffff;line-height: 1.65;margin: 0\">Hardware key deployment and session lifetime policy enforcement that makes stolen authentication tokens useless before attackers can act on them.<\/p>\n<\/td>\n<td width=\"3%\"><\/td>\n<td class=\"cmit-reveal cmit-hover-card\" style=\"background: #003d58;border: 1px solid #004a6b;border-top: 3px solid #ef9b37;padding: 20px;border-radius: 4px\" valign=\"top\" width=\"31%\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;color: #ffffff;margin: 0 0 10px 0\">\ud83d\udccb Vendor Risk Audits<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.86em;color: #ffffff;line-height: 1.65;margin: 0\">We audit every third-party vendor in your cloud environment \u2014 verifying SOC 2 compliance, reviewing API access, and enforcing Least Privilege segmentation so a vendor breach can&#8217;t pivot into your network.<\/p>\n<\/td>\n<td width=\"3%\"><\/td>\n<td class=\"cmit-reveal cmit-hover-card\" style=\"background: #003d58;border: 1px solid #004a6b;border-top: 3px solid #ef3f37;padding: 20px;border-radius: 4px\" valign=\"top\" width=\"31%\">\n<h3 style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;color: #ffffff;margin: 0 0 10px 0\">\u26a1 72-Hour IR Plan<\/h3>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.86em;color: #ffffff;line-height: 1.65;margin: 0\">We design, document, and table-top test your Incident Response Plan \u2014 ensuring containment, forensic analysis, and legal notification happen within 72 hours, not six months.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Expert quote --><\/p>\n<table class=\"cmit-reveal\" style=\"background: #003d58;border: 1px solid #004a6b;border-radius: 4px;margin-top: 28px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding: 22px 26px\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.05em;font-style: italic;color: #ffffff;line-height: 1.8;margin: 0 0 10px 0\">&#8220;ShinyHunters didn&#8217;t crack a single password in these attacks. They walked in through an unlocked door \u2014 an unmanaged device with an expired session that nobody was watching. Zero Trust isn&#8217;t a product you buy; it&#8217;s an architecture you enforce.&#8221;<\/p>\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.85em;font-weight: bold;color: #ef9b37;margin: 0\">\u2014 Adam Lopez, CMIT Solutions of Las Vegas<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 INTERACTIVE FAQ ACCORDIONS \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background: #f4f8fa;padding: 48px 40px\">\n<div class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.72rem;font-weight: bold;letter-spacing: 0.12em;text-transform: uppercase;color: #ef3f37;margin-bottom: 8px\">FREQUENTLY ASKED QUESTIONS<\/div>\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.8em;font-weight: 800;color: #002f44;margin: 0 0 8px 0;line-height: 1.2\">Snowflake, DocketWise &amp; Supply Chain Security: What Las Vegas Businesses Ask<\/h2>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.9em;color: #888;margin: 0 0 24px 0\">Click any question to expand.<\/p>\n<p><!-- FAQ 1 --><\/p>\n<table class=\"cmit-reveal\" style=\"margin-bottom: 10px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background: #ffffff;border: 1px solid #d0dadf;border-left: 4px solid #002f44;border-radius: 4px;overflow: hidden\">\n<div class=\"cmit-faq-q\" style=\"padding: 18px 22px;justify-content: space-between;align-items: center;background: #ffffff\"><span style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;color: #002f44\">What happened in the Snowflake and Anodot supply chain breach?<\/span><br \/>\n<span class=\"cmit-faq-icon\" style=\"color: #002f44;font-size: 1.4em;font-weight: 300;margin-left: 16px;flex-shrink: 0\">+<\/span><\/div>\n<div class=\"cmit-faq-a\">\n<div style=\"padding: 0 22px 16px 22px\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\">The ShinyHunters extortion gang compromised authentication session tokens \u2014 not encryption keys \u2014 using LummaC2 infostealer malware on unmanaged devices, bypassing standard MFA entirely. They then exploited unsecured cloud service accounts lacking conditional access policies to extract massive databases directly from cloud environments with no ransomware deployed.<\/p>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- FAQ 2 --><\/p>\n<table class=\"cmit-reveal\" style=\"margin-bottom: 10px\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background: #ffffff;border: 1px solid #d0dadf;border-left: 4px solid #ef9b37;border-radius: 4px;overflow: hidden\">\n<div class=\"cmit-faq-q\" style=\"padding: 18px 22px;justify-content: space-between;align-items: center;background: #ffffff\"><span style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;color: #002f44\">What is the DocketWise data breach and how many people were affected?<\/span><br \/>\n<span class=\"cmit-faq-icon\" style=\"color: #ef9b37;font-size: 1.4em;font-weight: 300;margin-left: 16px;flex-shrink: 0\">+<\/span><\/div>\n<div class=\"cmit-faq-a\">\n<div style=\"padding: 0 22px 16px 22px\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\">DocketWise, a cloud-based practice management platform used by immigration law firms, suffered a breach exposing sensitive information \u2014 including Social Security numbers and passport data \u2014 for over 116,000 individuals. DocketWise reportedly waited approximately six months from discovery to notifying victims, triggering multiple class-action investigations under GDPR, HIPAA, and state privacy laws.<\/p>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- FAQ 3 --><\/p>\n<table class=\"cmit-reveal\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background: #ffffff;border: 1px solid #d0dadf;border-left: 4px solid #2fb17e;border-radius: 4px;overflow: hidden\">\n<div class=\"cmit-faq-q\" style=\"padding: 18px 22px;justify-content: space-between;align-items: center;background: #ffffff\"><span style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;color: #002f44\">How can Las Vegas law firms and businesses protect against supply chain cloud breaches?<\/span><br \/>\n<span class=\"cmit-faq-icon\" style=\"color: #2fb17e;font-size: 1.4em;font-weight: 300;margin-left: 16px;flex-shrink: 0\">+<\/span><\/div>\n<div class=\"cmit-faq-a\">\n<div style=\"padding: 0 22px 16px 22px\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.93em;color: #444;line-height: 1.7;margin: 0\">Three immediate actions: (1) Replace SMS\/push MFA with FIDO2 hardware keys and enforce rapid session token expiration; (2) Require all cloud vendors to provide SOC 2 Type II compliance reports and limit API access via Least Privilege; (3) Develop and test a 72-hour Incident Response Plan. Call CMIT Solutions of Las Vegas at <strong>702-725-2877<\/strong> for a Third-Party Risk Assessment.<\/p>\n<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<p><!-- \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 FINAL CTA \u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550\u2550 --><\/p>\n<tr>\n<td style=\"background-color: #ef3f37;padding: 52px 40px;text-align: center\">\n<h2 class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.9em;font-weight: 900;color: #ffffff;margin: 0 0 12px 0;line-height: 1.2\">Are Your Cloud Vendors Putting Your Data at Risk?<\/h2>\n<p class=\"cmit-reveal\" style=\"font-family: Avenir,Arial,sans-serif;font-size: 1.1em;color: #ffffff;margin: 0 0 28px 0;line-height: 1.75\">The Snowflake and DocketWise breaches are not isolated incidents. Supply chain extortion is the dominant attack model of 2026. Let CMIT Solutions audit your vendor ecosystem, harden your authentication, and build your 72-hour IR plan \u2014 before you need it.<\/p>\n<p><a class=\"cmit-btn-red\" style=\"background: #ffffff;color: #ef3f37;font-family: Avenir,Arial,sans-serif;font-size: 1.4em;font-weight: 900;text-decoration: none;padding: 14px 32px;border-radius: 4px;margin-bottom: 16px\" href=\"tel:+17027252877\">\ud83d\udcde 702-725-2877<\/a><\/p>\n<p><a style=\"background: #002f44;color: #ffffff;font-family: Avenir,Arial,sans-serif;font-size: 1.0em;font-weight: bold;text-decoration: none;padding: 14px 32px;border-radius: 4px\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Your Free Third-Party Risk Assessment \u2192<\/a><\/td>\n<\/tr>\n<p><!-- SOURCE --><\/p>\n<tr>\n<td style=\"background: #f4f8fa;padding: 20px 40px;border-top: 1px solid #d0dadf\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.82em;color: #6b7a7a;margin: 0;line-height: 1.6\"><strong>Source:<\/strong> <a style=\"color: #002f44\" href=\"https:\/\/medium.com\/@mjk_89787\/daily-privacy-brief-89936990e9b2\" target=\"_blank\" rel=\"noopener noreferrer\">Daily Privacy Brief \u2014 April 2026 (Medium)<\/a> \u00a0|\u00a0 <strong>Framework:<\/strong> <a style=\"color: #002f44\" href=\"https:\/\/attack.mitre.org\/techniques\/T1528\/\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK T1528 \u2014 Steal Application Access Token<\/a><\/p>\n<\/td>\n<\/tr>\n<p><!-- NAP FOOTER --><\/p>\n<tr>\n<td style=\"background-color: #002f44;padding: 22px 40px;text-align: center\">\n<p style=\"font-family: Avenir,Arial,sans-serif;font-size: 0.85em;color: #ffffff;margin: 0;line-height: 1.8\"><strong style=\"color: #ffffff\">CMIT Solutions of Las Vegas<\/strong> \u00a0|<br \/>\n<a style=\"color: #ffffff;text-decoration: none\" href=\"tel:+17027252877\">702-725-2877<\/a> \u00a0|<br \/>\n<a style=\"color: #ffffff;text-decoration: none\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\">cmitsolutions.com\/lasvegas-nv-1206<\/a> \u00a0|<br \/>\nServing Las Vegas, Henderson, Summerlin, North Las Vegas &amp; Clark County<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The recent supply chain breaches involving Snowflake, Anodot, and DocketWise reveal a terrifying reality: threat actors are bypassing perimeter security by stealing authentication tokens and exploiting third-party software vendors.&#8221;<\/p>\n","protected":false},"author":1008,"featured_media":1336,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/comments?post=1335"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1335\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media\/1336"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media?parent=1335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/categories?post=1335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/tags?post=1335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}