{"id":2,"name":"securityseriously","url":"","description":"","link":"https:\/\/www.securityseriously.net\/de\/author\/securityseriously\/","slug":"securityseriously","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/68be9ee661e5f96410e4ed9ea3097d2c067d91e86da6785459c3b15d7d0c6257?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/68be9ee661e5f96410e4ed9ea3097d2c067d91e86da6785459c3b15d7d0c6257?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/68be9ee661e5f96410e4ed9ea3097d2c067d91e86da6785459c3b15d7d0c6257?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/www.securityseriously.net\/de\/wp-json\/wp\/v2\/users\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securityseriously.net\/de\/wp-json\/wp\/v2\/users"}]}}