{"id":1157,"date":"2021-06-28T08:00:55","date_gmt":"2021-06-28T07:00:55","guid":{"rendered":"https:\/\/www.databreachlawyers.co.uk\/news\/?p=1157"},"modified":"2025-11-26T16:17:51","modified_gmt":"2025-11-26T16:17:51","slug":"data-breaches-identified-by-hacks-and-leaks","status":"publish","type":"post","link":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks","title":{"rendered":"Data breaches identified by hacks and leaks"},"content":{"rendered":"<p>To hackers, personal data is a valuable commodity, as it can be used to carry out many different types of cybercrime. To obtain this data, hackers often target businesses and other organisations with cyberattacks, and when their hacks are successful, this can be a sign of existing vulnerabilities. The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.<\/p>\n<p>At the Data Breach Lawyers, we know that the main culprits of data breaches are not always hackers, as they can instead be the hacked organisations themselves. If a third party has failed to impose sufficient cybersecurity measures, they may have breached data protection law. We are here to represent anyone affected by such data breaches in their fight for justice, as victims could be entitled to thousands of pounds in compensation \u2013 all <a href=\"https:\/\/www.databreachlawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>on a No Win, No Fee basis<\/strong>.<\/a><\/p>\n<p><!--more--><\/p>\n<h3><strong>The GDPR and data protection breaches<\/strong><\/h3>\n<p>The GDPR (General Data Protection Regulation) is not really designed to punish the hackers themselves, but to ensure that any individual or third party in possession of personal data (for legal purposes) implements appropriate security measures to protect it. Hacks or data leaks are, however, often provoked by data protection failings within companies. For example, if a company has insecure databases, cybercriminals may be able to locate these holes in the defences and take advantage of them to illegally access information.<\/p>\n<p>Data breaches identified by hacks or leaks can consequently expose hacked companies, many of which are forced to accept a huge portion of the blame for the exposure of personal data.<\/p>\n<h3><strong>Examples of data breaches identified by hacks<\/strong><\/h3>\n<p>Although the GDPR makes good cybersecurity a requirement for all data processors, some companies continue to neglect their legal duties, and the repercussions can be severe.<\/p>\n<p>One of the most notable data breaches identified by a hack was the <strong>British Airways data breach<\/strong>. The airline suffered two cyberattacks in 2018, in which the personal and financial data of approximately 400,000 customers was exposed. The subsequent ICO investigation revealed that BA had failed to implement sufficient security measures, and had consequently failed to protect the information of their customers.<\/p>\n<p>In the <a href=\"https:\/\/www.databreachlawyers.co.uk\/news\/joining-the-equifax-lawsuit-in-the-uk\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Equifax data breach<\/strong><\/a>, a hack was also the key indicator of data protection breaches within the company. Hackers were able to take advantage of cybersecurity vulnerabilities that were already known to Equifax, but which they had failed to take action to resolve.<\/p>\n<h3><strong>Making a data breach claim<\/strong><\/h3>\n<p>Data breaches identified by hacks or leaks can be evidence of the lacklustre approach to data protection adopted by many companies. It is unacceptable for companies to carry on with poor data security in the hope a hack will not occur, as hackers can quite easily find and take advantage of these weaknesses.<\/p>\n<p>If you have suffered as a result of a hack or leak exposing your data, you may be able to recover compensation from the third party that failed to protect your personal information. Contact us today to receive free, no-obligation advice on your potential claim, as you could be entitled to thousands of pounds in compensation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To hackers, personal data is a valuable commodity, as it can be used to carry out many different types of cybercrime. To obtain this data, hackers often target businesses and other organisations with cyberattacks, and when their hacks are successful, this can be a sign of existing vulnerabilities. The data breaches identified by hacks can &hellip; <a href=\"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Data breaches identified by hacks and leaks<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[3,60,63,41,53,10,23],"tags":[4,35,44,29,46,75,74,7],"class_list":["post-1157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data-breach-compensation","category-gdpr","category-group-actions","category-scammers","category-tech-news","tag-breaches","tag-data-breach","tag-equifax","tag-gdpr","tag-group-actions","tag-no-fee","tag-no-win","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data breaches identified by hacks and leaks - Data Breach Lawyers<\/title>\n<meta name=\"description\" content=\"The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data breaches identified by hacks and leaks - Data Breach Lawyers\" \/>\n<meta property=\"og:description\" content=\"The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks\" \/>\n<meta property=\"og:site_name\" content=\"Data Breach Lawyers\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-28T07:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T16:17:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks\"},\"author\":{\"name\":\"Matt\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/8268f2eb7215625a8facfaa4240dec03\"},\"headline\":\"Data breaches identified by hacks and leaks\",\"datePublished\":\"2021-06-28T07:00:55+00:00\",\"dateModified\":\"2025-11-26T16:17:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks\"},\"wordCount\":520,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.databreachlawyers.co.uk\\\/news\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1\",\"keywords\":[\"Breaches\",\"Data Breach\",\"Equifax\",\"GDPR\",\"Group Actions\",\"No Fee\",\"No Win\",\"Personal Data\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data Breach Compensation\",\"GDPR\",\"Group Actions\",\"Scammers\",\"Tech News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks\",\"url\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks\",\"name\":\"Data breaches identified by hacks and leaks - Data Breach Lawyers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.databreachlawyers.co.uk\\\/news\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1\",\"datePublished\":\"2021-06-28T07:00:55+00:00\",\"dateModified\":\"2025-11-26T16:17:51+00:00\",\"description\":\"The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.databreachlawyers.co.uk\\\/news\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.databreachlawyers.co.uk\\\/news\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1\",\"width\":1200,\"height\":300,\"caption\":\"Virgin Media data breach action\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/data-breaches-identified-by-hacks-and-leaks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data breaches identified by hacks and leaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/\",\"name\":\"Data Breach Lawyers\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#organization\",\"name\":\"Data Breach Lawyers\",\"url\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.databreachlawyers.co.uk\\\/news\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/data_breach_logo.png?fit=250%2C80&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.databreachlawyers.co.uk\\\/news\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/data_breach_logo.png?fit=250%2C80&ssl=1\",\"width\":250,\"height\":80,\"caption\":\"Data Breach Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/8268f2eb7215625a8facfaa4240dec03\",\"name\":\"Matt\",\"url\":\"https:\\\/\\\/www.databreachlawyers.co.uk\\\/news\\\/author\\\/matt\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data breaches identified by hacks and leaks - Data Breach Lawyers","description":"The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks","og_locale":"en_GB","og_type":"article","og_title":"Data breaches identified by hacks and leaks - Data Breach Lawyers","og_description":"The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.","og_url":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks","og_site_name":"Data Breach Lawyers","article_published_time":"2021-06-28T07:00:55+00:00","article_modified_time":"2025-11-26T16:17:51+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg","type":"image\/jpeg"}],"author":"Matt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matt","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#article","isPartOf":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks"},"author":{"name":"Matt","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#\/schema\/person\/8268f2eb7215625a8facfaa4240dec03"},"headline":"Data breaches identified by hacks and leaks","datePublished":"2021-06-28T07:00:55+00:00","dateModified":"2025-11-26T16:17:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks"},"wordCount":520,"commentCount":0,"publisher":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#organization"},"image":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1","keywords":["Breaches","Data Breach","Equifax","GDPR","Group Actions","No Fee","No Win","Personal Data"],"articleSection":["Claims","Cybersecurity","Data Breach Compensation","GDPR","Group Actions","Scammers","Tech News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks","url":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks","name":"Data breaches identified by hacks and leaks - Data Breach Lawyers","isPartOf":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#primaryimage"},"image":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1","datePublished":"2021-06-28T07:00:55+00:00","dateModified":"2025-11-26T16:17:51+00:00","description":"The data breaches identified by hacks can sometimes be damning evidence of company-wide data protection negligence.","breadcrumb":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#primaryimage","url":"https:\/\/i0.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1","width":1200,"height":300,"caption":"Virgin Media data breach action"},{"@type":"BreadcrumbList","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/data-breaches-identified-by-hacks-and-leaks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.databreachlawyers.co.uk\/news"},{"@type":"ListItem","position":2,"name":"Data breaches identified by hacks and leaks"}]},{"@type":"WebSite","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#website","url":"https:\/\/www.databreachlawyers.co.uk\/news\/","name":"Data Breach Lawyers","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.databreachlawyers.co.uk\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#organization","name":"Data Breach Lawyers","url":"https:\/\/www.databreachlawyers.co.uk\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2016\/09\/data_breach_logo.png?fit=250%2C80&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2016\/09\/data_breach_logo.png?fit=250%2C80&ssl=1","width":250,"height":80,"caption":"Data Breach Lawyers"},"image":{"@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.databreachlawyers.co.uk\/news\/#\/schema\/person\/8268f2eb7215625a8facfaa4240dec03","name":"Matt","url":"https:\/\/www.databreachlawyers.co.uk\/news\/author\/matt"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.databreachlawyers.co.uk\/news\/wp-content\/uploads\/2017\/03\/twitter-counter-hack.jpg?fit=1200%2C300&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/posts\/1157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":2,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/posts\/1157\/revisions"}],"predecessor-version":[{"id":2379,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/posts\/1157\/revisions\/2379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/media\/251"}],"wp:attachment":[{"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/media?parent=1157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/categories?post=1157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.databreachlawyers.co.uk\/news\/wp-json\/wp\/v2\/tags?post=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}