{"id":4277,"date":"2019-03-24T12:44:56","date_gmt":"2019-03-24T16:44:56","guid":{"rendered":"http:\/\/capecodsecurity.com\/files\/2019\/03\/recognizing-threat-2.jpg"},"modified":"2019-03-24T12:44:56","modified_gmt":"2019-03-24T16:44:56","slug":"recognizing-threat-2","status":"inherit","type":"attachment","link":"https:\/\/capecodsecurity.com\/training\/baton\/recognizing-threat-2\/","title":{"rendered":"recognizing-threat-2"},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0},"class_list":["post-4277","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"