{"id":27598,"date":"2025-05-29T17:27:27","date_gmt":"2025-05-29T15:27:27","guid":{"rendered":"https:\/\/tinextadefence.it\/?p=27598"},"modified":"2025-09-09T14:55:37","modified_gmt":"2025-09-09T12:55:37","slug":"ai4cyber-application-of-language-models-to-high-interaction-deception-technologies","status":"publish","type":"post","link":"https:\/\/tinextadefence.it\/en\/ai4cyber-application-of-language-models-to-high-interaction-deception-technologies\/","title":{"rendered":"AI4Cyber: Applying Linguistic Models to High-Interaction Deception Technologies"},"content":{"rendered":"<p><span data-contrast=\"auto\">In an environment where cyber threats are becoming increasingly complex, understanding, anticipating and countering attacks requires cross-sectoral skills and advanced technologies. This is why <\/span><b><span data-contrast=\"auto\">AI4Cyber studio<\/span><\/b><span data-contrast=\"auto\">, the new applied research space of <\/span><span data-contrast=\"auto\">Tinexta Defence<\/span><span data-contrast=\"auto\">dedicated to the research and application of Artificial Intelligence in cybersecurity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A multidisciplinary team that addresses the challenges of the cyber landscape, it supports clients in adopting AI by sharing research results with the scientific and technical community.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The entire lifecycle of AI systems - from data collection to deployment - is managed with Machine Learning, Deep Learning and LLM technologies, respecting the principles of ethics, transparency and privacy protection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The first in-depth study is devoted to an experimental project integrating language models in <\/span><b><span data-contrast=\"auto\">high-interaction deception technologies<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The study presents a framework for the creation of a <\/span><b><span data-contrast=\"auto\">high interaction honeypot (HHI)<\/span><\/b><span data-contrast=\"auto\"> using <\/span><b><span data-contrast=\"auto\">LLM locally<\/span><\/b><span data-contrast=\"auto\">capable of simulating a Linux terminal and responding credibly to attackers' commands by tracking their actions. The architecture consists of three modules: <\/span><b><span data-contrast=\"auto\">Terminal Protocol Proxy<\/span><\/b><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">Prompt Manager<\/span><\/b><span data-contrast=\"auto\"> and <\/span><b><span data-contrast=\"auto\">LLM Engine.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To handle the contextual limits of the models, an algorithm of <\/span><b><span data-contrast=\"auto\">pruning<\/span><\/b><span data-contrast=\"auto\"> and a classification system based on an 'F' value, which evaluates the impact of received commands.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The approach has been tested with several open-source models (Mistral, Gemma2, Phi4, Llama3.1, Qwen2.5) and advanced versions such as <\/span><b><span data-contrast=\"auto\">ChatGPT<\/span><\/b><span data-contrast=\"auto\"> and <\/span><b><span data-contrast=\"auto\">Claude AI<\/span><\/b><span data-contrast=\"auto\">confirming its validity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335557856&quot;:16777215,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW118710800 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW118710800 BCX0\">If you wish to learn more, here is the link to our <\/span><\/span><strong><a href=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/09\/AI4Cyber_report.pdf\"><span class=\"TextRun SCXW118710800 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW118710800 BCX0\">studio<\/span><\/span><span class=\"TextRun SCXW118710800 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"none\"> <span class=\"NormalTextRun SCXW118710800 BCX0\">complete<\/span><\/span><\/a><\/strong><span class=\"TextRun SCXW118710800 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW118710800 BCX0\">.<\/span><\/span><\/p>\n<p><span data-contrast=\"none\">In addition, you can subscribe to the specific mailing list <b>Cyber Studios by Tinexta Defence<\/b>, to receive updates on upcoming research: <\/span><a href=\"https:\/\/tinextadefence.it\/en\/cyber-studios-mailing-list\/\"><span data-contrast=\"none\">https:\/\/tinextadefence.it\/mailing-list-cyber-studios\/<\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>In a context where cyber threats are becoming increasingly complex, understanding, anticipating and countering attacks requires transversal skills and advanced technologies. This is why AI4Cyber studio, the new applied research space of Tinexta Defence, dedicated to the research and application of Artificial Intelligence in the cybersecurity field, was created.  A multidisciplinary team tackling the challenges of [...]<\/p>","protected":false},"author":7,"featured_media":27602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[102],"tags":[],"class_list":["post-27598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tinextadefencebusiness"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione - Tinexta Defence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tinextadefence.it\/en\/ai4cyber-application-of-language-models-to-high-interaction-deception-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione - Tinexta Defence\" \/>\n<meta property=\"og:description\" content=\"In un contesto in cui le minacce informatiche diventano sempre pi\u00f9 complesse, comprendere, anticipare e contrastare gli attacchi richiede competenze trasversali e tecnologie avanzate. Per questo nasce AI4Cyber studio, il nuovo spazio di ricerca applicata di Tinexta Defence,\u00a0dedicato alla ricerca e applicazione dell\u2019Intelligenza Artificiale in ambito cybersecurity.\u00a0 Un team multidisciplinare che affronta le sfide del [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tinextadefence.it\/en\/ai4cyber-application-of-language-models-to-high-interaction-deception-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"Tinexta Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-29T15:27:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T12:55:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Federica Casadei\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Federica Casadei\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/\"},\"author\":{\"name\":\"Federica Casadei\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d\"},\"headline\":\"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione\",\"datePublished\":\"2025-05-29T15:27:27+00:00\",\"dateModified\":\"2025-09-09T12:55:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/\"},\"wordCount\":282,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg\",\"articleSection\":[\"#TDefenceBusiness\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/\",\"url\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/\",\"name\":\"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione - Tinexta Defence\",\"isPartOf\":{\"@id\":\"https:\/\/tinextadefence.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg\",\"datePublished\":\"2025-05-29T15:27:27+00:00\",\"dateModified\":\"2025-09-09T12:55:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg\",\"width\":1800,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tinextadefence.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tinextadefence.it\/#website\",\"url\":\"https:\/\/tinextadefence.it\/\",\"name\":\"Tinexta Defence\",\"description\":\"think next, protect now\",\"publisher\":{\"@id\":\"https:\/\/tinextadefence.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tinextadefence.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tinextadefence.it\/#organization\",\"name\":\"Tinexta Defence\",\"url\":\"https:\/\/tinextadefence.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"contentUrl\":\"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png\",\"width\":2000,\"height\":990,\"caption\":\"Tinexta Defence\"},\"image\":{\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d\",\"name\":\"Federica Casadei\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g\",\"caption\":\"Federica Casadei\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI4Cyber: Applying Linguistic Models to High-Interaction Deception Technologies - Tinexta Defence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tinextadefence.it\/en\/ai4cyber-application-of-language-models-to-high-interaction-deception-technologies\/","og_locale":"en_GB","og_type":"article","og_title":"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione - Tinexta Defence","og_description":"In un contesto in cui le minacce informatiche diventano sempre pi\u00f9 complesse, comprendere, anticipare e contrastare gli attacchi richiede competenze trasversali e tecnologie avanzate. Per questo nasce AI4Cyber studio, il nuovo spazio di ricerca applicata di Tinexta Defence,\u00a0dedicato alla ricerca e applicazione dell\u2019Intelligenza Artificiale in ambito cybersecurity.\u00a0 Un team multidisciplinare che affronta le sfide del [&hellip;]","og_url":"https:\/\/tinextadefence.it\/en\/ai4cyber-application-of-language-models-to-high-interaction-deception-technologies\/","og_site_name":"Tinexta Defence","article_published_time":"2025-05-29T15:27:27+00:00","article_modified_time":"2025-09-09T12:55:37+00:00","og_image":[{"width":1800,"height":960,"url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg","type":"image\/jpeg"}],"author":"Federica Casadei","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Federica Casadei","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#article","isPartOf":{"@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/"},"author":{"name":"Federica Casadei","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d"},"headline":"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione","datePublished":"2025-05-29T15:27:27+00:00","dateModified":"2025-09-09T12:55:37+00:00","mainEntityOfPage":{"@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/"},"wordCount":282,"commentCount":0,"publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"image":{"@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg","articleSection":["#TDefenceBusiness"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/","url":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/","name":"AI4Cyber: Applying Linguistic Models to High-Interaction Deception Technologies - Tinexta Defence","isPartOf":{"@id":"https:\/\/tinextadefence.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage"},"image":{"@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage"},"thumbnailUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg","datePublished":"2025-05-29T15:27:27+00:00","dateModified":"2025-09-09T12:55:37+00:00","breadcrumb":{"@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#primaryimage","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/05\/Business_evidenza-1.jpg","width":1800,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/tinextadefence.it\/ai4cyber-applicazione-di-modelli-linguistici-a-tecnologie-di-deception-ad-alta-interazione\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tinextadefence.it\/"},{"@type":"ListItem","position":2,"name":"AI4Cyber: Applicazione di Modelli Linguistici a Tecnologie di Deception ad Alta Interazione"}]},{"@type":"WebSite","@id":"https:\/\/tinextadefence.it\/#website","url":"https:\/\/tinextadefence.it\/","name":"Tinexta Defence","description":"think next, protect now","publisher":{"@id":"https:\/\/tinextadefence.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tinextadefence.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/tinextadefence.it\/#organization","name":"Tinexta Defence","url":"https:\/\/tinextadefence.it\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/","url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","contentUrl":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_marchio.png","width":2000,"height":990,"caption":"Tinexta Defence"},"image":{"@id":"https:\/\/tinextadefence.it\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/0dc89f3eeaa8cd7b7c354b61c84d164d","name":"Federica Casadei","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tinextadefence.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b35becb35fb83a681c7b431c36de302b4101b5ef0c48984910308c04617428f?s=96&d=mm&r=g","caption":"Federica Casadei"}}]}},"_links":{"self":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/27598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/comments?post=27598"}],"version-history":[{"count":0,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/posts\/27598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media\/27602"}],"wp:attachment":[{"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/media?parent=27598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/categories?post=27598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tinextadefence.it\/en\/wp-json\/wp\/v2\/tags?post=27598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}