{"id":57144,"date":"2026-02-23T07:44:31","date_gmt":"2026-02-22T21:44:31","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/?p=57144"},"modified":"2026-02-23T07:44:35","modified_gmt":"2026-02-22T21:44:35","slug":"ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests","status":"publish","type":"post","link":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/","title":{"rendered":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests"},"content":{"rendered":"\n<p>In this blog post <strong>AI Recommendation Poisoning How Attackers Skew What Your AI Suggests<\/strong> we will walk through what recommendation poisoning is, why it\u2019s becoming a real-world risk, and what practical steps you can take to reduce the chance your AI gets \u201cnudged\u201d into making the wrong suggestions.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>If you run any system that <em>recommends<\/em> things\u2014products, suppliers, job candidates, support articles, security actions, or even \u201cnext best action\u201d inside a business workflow\u2014there\u2019s a nasty reality: someone may be trying to influence those recommendations without hacking your servers.<\/p>\n\n\n\n<p>They don\u2019t need to break in. They just need to <strong>feed your system the right kind of bad signals<\/strong> so your AI learns the wrong lessons and confidently points people in the wrong direction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-high-level-explanation-of-recommendation-poisoning\">High-level explanation of recommendation poisoning<\/h2>\n\n\n\n<p>Recommendation poisoning is when an attacker <strong>manipulates the data<\/strong> your recommendation system relies on, so the system starts recommending what the attacker wants.<\/p>\n\n\n\n<p>Think of it like online reviews. If someone floods a product with fake 5-star reviews, that product climbs the rankings. Recommendation poisoning is the same idea, but applied to the signals AI uses\u2014clicks, ratings, purchases, helpdesk searches, document content, tags, keywords, metadata, and user behaviour.<\/p>\n\n\n\n<p>The business impact isn\u2019t theoretical. Poisoned recommendations can lead to wasted spend, higher security risk, reputational damage, compliance issues, and employees losing trust in your AI tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-where-this-shows-up-in-business-systems-not-just-big-tech\">Where this shows up in business systems (not just big tech)<\/h2>\n\n\n\n<p>Most people hear \u201crecommender system\u201d and think streaming services. In mid-market organisations (50\u2013500 staff), we see recommendation-like systems everywhere:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Internal knowledge search<\/strong> that suggests \u201cbest\u201d policies, procedures, and templates.<\/li>\n\n\n\n<li><strong>Customer support portals<\/strong> that recommend help articles or next troubleshooting steps.<\/li>\n\n\n\n<li><strong>Security tooling<\/strong> that prioritises alerts or recommends remediation actions.<\/li>\n\n\n\n<li><strong>Procurement and finance<\/strong> workflows that surface preferred vendors or \u201csuggested\u201d items.<\/li>\n\n\n\n<li><strong>Sales and marketing<\/strong> systems that recommend leads, segments, or outreach actions.<\/li>\n\n\n\n<li><strong>AI assistants with search<\/strong> (often called RAG, short for \u201cretrieval augmented generation\u201d), where the AI looks up documents and then answers based on what it finds.<\/li>\n<\/ul>\n\n\n\n<p>That last one matters because many organisations now have an AI assistant connected to SharePoint, Confluence, Google Drive, a ticketing system, or a document store. If an attacker can plant or modify content inside the \u201cknowledge base,\u201d they can influence what the AI retrieves and therefore what it recommends.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-technology-behind-it-plain-english-but-accurate\">The technology behind it (plain English, but accurate)<\/h2>\n\n\n\n<p>Most recommendation systems work by turning messy real-world activity into \u201csignals.\u201d Those signals might include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>User signals:<\/strong> clicks, likes, ratings, purchases, dwell time, searches.<\/li>\n\n\n\n<li><strong>Content signals:<\/strong> titles, tags, descriptions, keywords, document text.<\/li>\n\n\n\n<li><strong>Similarity signals:<\/strong> \u201cpeople who did X also did Y,\u201d or \u201cthis document looks like that document.\u201d<\/li>\n<\/ul>\n\n\n\n<p>Modern systems often convert content into numbers called <strong>embeddings<\/strong>. An embedding is just a way of representing text (or an item) as a long list of numbers so the system can measure \u201chow similar\u201d two things are. If two pieces of text are close in this number-space, the system treats them as related.<\/p>\n\n\n\n<p>Recommendation poisoning happens when an attacker figures out what your system is using as signals, then injects data that bends those signals. That can be done by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fake behaviour<\/strong> (bots clicking, searching, rating, or purchasing in patterns).<\/li>\n\n\n\n<li><strong>Profile injection<\/strong> (creating many fake users that behave in coordinated ways).<\/li>\n\n\n\n<li><strong>Content poisoning<\/strong> (adding or editing descriptions, tags, titles, or documents to push certain items higher).<\/li>\n\n\n\n<li><strong>Embedding manipulation<\/strong> (crafting text so it \u201clooks similar\u201d to many queries and gets retrieved often).<\/li>\n<\/ul>\n\n\n\n<p>If your AI assistant uses a \u201cretrieve then answer\u201d approach, poisoning can be as simple as planting one highly-retrievable document that contains misleading instructions, and ensuring it gets pulled into context when users ask common questions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-recommendation-poisoning-is-hard-to-spot\">Why recommendation poisoning is hard to spot<\/h2>\n\n\n\n<p>Traditional security monitoring looks for break-ins: suspicious logins, malware, data exfiltration. Poisoning can look like normal business activity.<\/p>\n\n\n\n<p>A fake user clicking ten items isn\u2019t always suspicious. A document with a plausible title in SharePoint isn\u2019t always suspicious. Even a change to tags or metadata can fly under the radar\u2014yet it can drastically change what the system recommends.<\/p>\n\n\n\n<p>The scary part is the <strong>outcome<\/strong>: the AI looks like it\u2019s working. It\u2019s just working in a subtly biased direction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-attack-goals-what-attackers-actually-want\">Common attack goals (what attackers actually want)<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Promotion:<\/strong> push a product, vendor, article, or action to the top.<\/li>\n\n\n\n<li><strong>Demotion:<\/strong> bury legitimate options so users don\u2019t see them.<\/li>\n\n\n\n<li><strong>Misdirection:<\/strong> steer users to insecure steps (\u201cturn off MFA to fix login issues\u201d).<\/li>\n\n\n\n<li><strong>Reputation damage:<\/strong> make the AI recommend embarrassing or unsafe content.<\/li>\n\n\n\n<li><strong>Operational disruption:<\/strong> flood the system with junk so recommendations degrade and people stop using it.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-real-world-style-scenario-anonymised\">A real-world style scenario (anonymised)<\/h2>\n\n\n\n<p>Imagine a 200-person professional services firm rolling out an internal AI assistant for staff. The assistant can search SharePoint and recommend policy snippets, onboarding steps, and IT self-service instructions.<\/p>\n\n\n\n<p>A contractor account is left active after a project ends. Nothing \u201cexplodes,\u201d so nobody notices.<\/p>\n\n\n\n<p>Over a few weeks, that account uploads a handful of documents with very believable names like \u201cVPN Access Guide,\u201d \u201cRemote Work Checklist,\u201d and \u201cPassword Reset Process.\u201d The content looks fine at a glance, but it contains two subtle problems:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It recommends a non-approved remote access tool.<\/li>\n\n\n\n<li>It suggests bypass steps that reduce security controls \u201ctemporarily.\u201d<\/li>\n<\/ul>\n\n\n\n<p>Because the documents contain common terms employees search for, the AI retrieves them frequently. Staff start following the instructions because \u201cthe AI said so.\u201d<\/p>\n\n\n\n<p>No one hacked the firewall. The attacker manipulated what the AI recommended. The business outcome is still serious: higher breach risk, audit headaches, and lots of rework cleaning up unsafe endpoints.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-reduce-the-risk-practical-controls-that-work\">How to reduce the risk (practical controls that work)<\/h2>\n\n\n\n<p>You don\u2019t have to stop using AI. You do need to treat \u201crecommendation inputs\u201d as a security surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-lock-down-who-can-write-to-the-source-of-truth\">1) Lock down who can write to the source of truth<\/h3>\n\n\n\n<p>Recommendation poisoning often starts with write access: who can create, edit, tag, or upload content.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Limit who can publish to \u201ctrusted\u201d knowledge locations.<\/li>\n\n\n\n<li>Use approval flows for policy and process documents.<\/li>\n\n\n\n<li>Remove stale accounts quickly (especially contractors and vendors).<\/li>\n<\/ul>\n\n\n\n<p>If you\u2019re using Microsoft 365, this is where a well-designed permissions model and lifecycle processes matter more than ever.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-separate-draft-content-from-ai-approved-content\">2) Separate \u201cdraft content\u201d from \u201cAI-approved content\u201d<\/h3>\n\n\n\n<p>One simple pattern: have the AI assistant only retrieve from a curated, controlled set of libraries.<\/p>\n\n\n\n<p>Yes, it\u2019s less convenient than \u201csearch everything,\u201d but it\u2019s far safer. You can still allow broad search for humans while restricting what the AI uses as authoritative input.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-monitor-for-suspicious-patterns-in-recommendation-signals\">3) Monitor for suspicious patterns in recommendation signals<\/h3>\n\n\n\n<p>Poisoning leaves fingerprints. Examples:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sudden spikes in clicks\/views for obscure items.<\/li>\n\n\n\n<li>New items that jump to top recommendations unusually fast.<\/li>\n\n\n\n<li>Many new accounts behaving similarly (same sequence of clicks).<\/li>\n\n\n\n<li>Metadata changes (tags\/titles) that correlate with ranking changes.<\/li>\n<\/ul>\n\n\n\n<p>You don\u2019t need perfect detection. You need enough visibility to investigate anomalies quickly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-add-trust-signals-and-provenance\">4) Add \u201ctrust signals\u201d and provenance<\/h3>\n\n\n\n<p>If the AI recommends a document or action, show users why it\u2019s recommended and where it came from.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Show the source document name, location, and last approved date.<\/li>\n\n\n\n<li>Prefer content with an \u201capproved\u201d label or owner.<\/li>\n\n\n\n<li>Down-rank items with unknown owners or recent unreviewed edits.<\/li>\n<\/ul>\n\n\n\n<p>This reduces overreliance and makes it easier for staff to spot \u201cthat looks off.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-rate-limit-and-harden-public-facing-feedback-loops\">5) Rate-limit and harden public-facing feedback loops<\/h3>\n\n\n\n<p>If external users can influence recommendations (reviews, ratings, likes, comments), treat it like fraud prevention:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rate limits, bot detection, and account verification.<\/li>\n\n\n\n<li>Detect clusters of similar behaviour.<\/li>\n\n\n\n<li>Quarantine suspicious events rather than feeding them directly into learning pipelines.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-test-your-system-with-poisoning-drills\">6) Test your system with \u201cpoisoning drills\u201d<\/h3>\n\n\n\n<p>Run a controlled exercise: can a normal user account create content that the AI then starts recommending incorrectly?<\/p>\n\n\n\n<p>For example, create a harmless \u201cpoison\u201d doc that contains an obviously wrong instruction, then see if it becomes top-ranked for common queries. If it does, you have a tuning, permissions, and curation problem\u2014not an \u201cAI problem.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-small-technical-example-for-developers\">A small technical example (for developers)<\/h2>\n\n\n\n<p>If you run a retrieval-based assistant, one common mitigation is to filter retrieval results by a trust label. Below is a simplified example pattern: retrieve documents, then keep only those with an approved flag and an allowed source.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/\/ Pseudocode: filter retrieval results by trust controls\nresults = vectorSearch(query, topK = 20)\n\ntrusted = &#91;]\nfor doc in results:\n if doc.source in &#91;\"Policies\", \"IT_KB\", \"HR_KB\"]\n and doc.approvalStatus == \"Approved\"\n and doc.lastReviewedDate &amp;gt;= now() - 365 days:\n trusted.append(doc)\n\n\/\/ If trusted is empty, fall back to a safe response\nif trusted.length == 0:\n return \"I couldn't find an approved source. Please contact IT or check the official policy library.\"\n\ncontext = buildContext(trusted.take(5))\nreturn llmAnswer(query, context)<\/code><\/pre>\n\n\n\n<p>This doesn\u2019t \u201csolve security,\u201d but it removes the easiest poisoning path: dumping unreviewed content into the retrieval pool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-this-maps-to-real-security-and-compliance-expectations-in-australia\">How this maps to real security and compliance expectations in Australia<\/h2>\n\n\n\n<p>In Australia, more organisations are aligning to the Essential 8 (the Australian Government\u2019s cybersecurity framework that many organisations are now required to follow). Recommendation poisoning often exploits gaps that Essential 8 is designed to reduce\u2014like weak access control, poor account lifecycle management, and uncontrolled administrative changes.<\/p>\n\n\n\n<p>If an auditor asks, \u201cWho can change the documents your AI uses to make decisions?\u201d you want a confident, evidence-based answer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-to-do-next\">What to do next<\/h2>\n\n\n\n<p>Recommendation poisoning is a business risk disguised as a data quality problem. If your AI suggestions influence spending, security actions, or staff behaviour, you should assume someone will eventually try to game it.<\/p>\n\n\n\n<p>CloudProInc is a Melbourne-based Microsoft Partner and Wiz Security Integrator. We help teams design AI and cloud systems that are practical, secure, and support compliance\u2014not science projects.<\/p>\n\n\n\n<p>If you\u2019re not sure whether your AI assistant or recommendation features could be quietly steered off course, we\u2019re happy to take a look and give you a straight answer\u2014no pressure, no strings attached.<\/p>\n\n\n\n<ul class=\"wp-block-yoast-seo-related-links yoast-seo-related-links\">\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/08\/29\/step-back-prompting-explained-and-why-it-beats-zero-shot-for-llms\/\">Step-back prompting explained and why it beats zero-shot for LLMs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloudproinc.com.au\/index.php\/2025\/09\/01\/auto-start-python-virtual-environment-in-github-codespaces\/\">Auto Start Python Virtual Environment in GitHub Codespaces<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/09\/03\/keep-docker-containers-running-prevent-common-exits\/\">Keep Docker Containers Running: Prevent Common Exits<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/11\/26\/block-prompt-attacks-with-azure-ai-services\/\">Block Prompt Attacks with Azure AI Services<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/\">Secure Windows 11 Devices with Defender XDR<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Recommendation poisoning is a quiet way to manipulate AI suggestions by planting misleading signals in your data. Learn how it works, what it looks like, and practical defences for real systems.<\/p>\n","protected":false},"author":1,"featured_media":57145,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24,13,107],"tags":[],"class_list":["post-57144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-blog","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Recommendation Poisoning How Attackers Skew What Your AI Suggests - CPI Consulting<\/title>\n<meta name=\"description\" content=\"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests\" \/>\n<meta property=\"og:description\" content=\"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-22T21:44:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-22T21:44:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudproinc.com.au\/wp-content\/uploads\/2026\/02\/post-35.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests\",\"datePublished\":\"2026-02-22T21:44:31+00:00\",\"dateModified\":\"2026-02-22T21:44:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/\"},\"wordCount\":1590,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/post-35.png\",\"articleSection\":[\"AI\",\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/\",\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/\",\"name\":\"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests - CPI Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/post-35.png\",\"datePublished\":\"2026-02-22T21:44:31+00:00\",\"dateModified\":\"2026-02-22T21:44:35+00:00\",\"description\":\"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/post-35.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/post-35.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/02\\\/23\\\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests - CPI Consulting","description":"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/","og_locale":"en_US","og_type":"article","og_title":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests","og_description":"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.","og_url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/","og_site_name":"CPI Consulting","article_published_time":"2026-02-22T21:44:31+00:00","article_modified_time":"2026-02-22T21:44:35+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.cloudproinc.com.au\/wp-content\/uploads\/2026\/02\/post-35.png","type":"image\/png"}],"author":"CPI Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#article","isPartOf":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/"},"author":{"name":"CPI Staff","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests","datePublished":"2026-02-22T21:44:31+00:00","dateModified":"2026-02-22T21:44:35+00:00","mainEntityOfPage":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/"},"wordCount":1590,"commentCount":0,"publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"image":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/02\/post-35.png","articleSection":["AI","Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/","url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/","name":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests - CPI Consulting","isPartOf":{"@id":"https:\/\/cloudproinc.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#primaryimage"},"image":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/02\/post-35.png","datePublished":"2026-02-22T21:44:31+00:00","dateModified":"2026-02-22T21:44:35+00:00","description":"Understand AI Recommendation Poisoning and how attackers can skew what your AI suggests. Protect your recommendations effectively.","breadcrumb":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#primaryimage","url":"\/wp-content\/uploads\/2026\/02\/post-35.png","contentUrl":"\/wp-content\/uploads\/2026\/02\/post-35.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"AI Recommendation Poisoning How Attackers Skew What Your AI Suggests"}]},{"@type":"WebSite","@id":"https:\/\/cloudproinc.com.au\/#website","url":"https:\/\/cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/www.cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2026\/02\/post-35.png","jetpack-related-posts":[{"id":57373,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/02\/how-ai-is-expanding-the-attack-surface-for-mid-market-organisations\/","url_meta":{"origin":57144,"position":0},"title":"How AI Is Expanding the Attack Surface for Mid-Market Organisations","author":"CPI Staff","date":"April 2, 2026","format":false,"excerpt":"The attack surface for mid-market organisations has expanded faster than most security strategies have adapted. AI is not just a tool for defenders. It is now an operational accelerator for attackers \u2014 and the techniques are not science fiction. Google's Threat Intelligence Group, Mandiant, and multiple cybersecurity vendors have documented\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 1x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 2x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 3x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 4x"},"classes":[]},{"id":57371,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/04\/why-zero-trust-for-ai-agents-requires-a-different-architecture-than-zero-trust-for-users\/","url_meta":{"origin":57144,"position":1},"title":"Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users","author":"CPI Staff","date":"April 4, 2026","format":false,"excerpt":"Zero Trust is well understood for users. Verify identity, check device health, enforce least privilege, assume breach. Most mature IT organisations have some version of this in place. AI agents break that model. Not because Zero Trust principles are wrong \u2014 but because agents operate in ways that existing Zero\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/why-zero-trust-for-ai-agents-requires-different-architecture-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/why-zero-trust-for-ai-agents-requires-different-architecture-cover.png 1x, \/wp-content\/uploads\/2026\/04\/why-zero-trust-for-ai-agents-requires-different-architecture-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/why-zero-trust-for-ai-agents-requires-different-architecture-cover.png 2x, \/wp-content\/uploads\/2026\/04\/why-zero-trust-for-ai-agents-requires-different-architecture-cover.png 3x, \/wp-content\/uploads\/2026\/04\/why-zero-trust-for-ai-agents-requires-different-architecture-cover.png 4x"},"classes":[]},{"id":57413,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","url_meta":{"origin":57144,"position":2},"title":"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next","author":"CPI Staff","date":"April 9, 2026","format":false,"excerpt":"Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint \u2014 if MFA is in place, accounts are protected. That assumption just got a serious challenge. Microsoft Defender Security Research has exposed a widespread phishing campaign that bypasses MFA entirely. It abuses\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 1x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 2x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 3x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 4x"},"classes":[]},{"id":57372,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/03\/googles-ai-threat-landscape-report-signals-five-risks-every-australian-ciso-should-act-on-now\/","url_meta":{"origin":57144,"position":3},"title":"Google&#8217;s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now","author":"CPI Staff","date":"April 3, 2026","format":false,"excerpt":"Google's Threat Intelligence Group just published one of the most detailed reports to date on how adversaries are using AI to accelerate attacks. For Australian CISOs, five findings demand immediate attention. The GTIG AI Threat Tracker, published in early 2026 and based on Q4 2025 observations, moves the conversation beyond\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 1x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 2x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 3x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 4x"},"classes":[]},{"id":57261,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/03\/16\/the-hidden-security-risks-of-ai-agents-and-how-to-control-them\/","url_meta":{"origin":57144,"position":4},"title":"The Hidden Security Risks of AI Agents and How to Control Them","author":"CPI Staff","date":"March 16, 2026","format":false,"excerpt":"AI agents can save time, but they can also expose data, amplify mistakes, and create new compliance gaps. Here is how to adopt them safely without slowing your business down.","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-25.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-25.png 1x, \/wp-content\/uploads\/2026\/03\/post-25.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-25.png 2x, \/wp-content\/uploads\/2026\/03\/post-25.png 3x, \/wp-content\/uploads\/2026\/03\/post-25.png 4x"},"classes":[]},{"id":57259,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/03\/16\/what-every-cio-should-ask-before-buying-ai-agents-for-business\/","url_meta":{"origin":57144,"position":5},"title":"What Every CIO Should Ask Before Buying AI Agents for Business","author":"CPI Staff","date":"March 16, 2026","format":false,"excerpt":"AI agents can save time or create expensive risk. These are the questions every CIO should ask vendors before approving budget, access, and rollout.","rel":"","context":"In &quot;AI Agents&quot;","block_context":{"text":"AI Agents","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai-agents\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-23.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-23.png 1x, \/wp-content\/uploads\/2026\/03\/post-23.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-23.png 2x, \/wp-content\/uploads\/2026\/03\/post-23.png 3x, \/wp-content\/uploads\/2026\/03\/post-23.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=57144"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57144\/revisions"}],"predecessor-version":[{"id":57147,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57144\/revisions\/57147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/57145"}],"wp:attachment":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=57144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=57144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=57144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}