{"ok":true,"data":[{"id":23,"title":"Conflict Is Inevitable — How You Handle It Defines Your Professionalism","slug":"conflict-is-inevitable-how-you-handle-it-defines-your-professionalism","excerpt":"Conflict is natural in teams, but effective handling makes the difference. By understanding emotions, asking the right questions, avoiding blame and generalizations, and communicating calmly, conflicts can strengthen teamwork and improve collaboration.","author":{"name":"Ajmal Ali"},"category":{"name":"Communication Skills","slug":"communication-skills"},"tags":[{"name":"CommunicationSkills","slug":"communicationskills"},{"name":"ConflictManagement","slug":"conflictmanagement"},{"name":"EmotionalIntelligence","slug":"emotionalintelligence"},{"name":"InterpersonalSkills","slug":"interpersonalskills"},{"name":"LeadershipSkills","slug":"leadershipskills"},{"name":"ProfessionalDevelopment","slug":"professionaldevelopment"},{"name":"Teamwork","slug":"teamwork"},{"name":"WorkplaceCommunication","slug":"workplacecommunication"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":3,"published_at":"2026-05-02T19:15:00+05:30","updated_at":"2026-05-02T13:56:58+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=conflict-is-inevitable-how-you-handle-it-defines-your-professionalism","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=conflict-is-inevitable-how-you-handle-it-defines-your-professionalism"},{"id":22,"title":"API Test Post","slug":"api-test-post","excerpt":"Testing if the API can publish a simple post.","author":{"name":"Admin"},"category":{"name":"Testing","slug":"testing"},"tags":[{"name":"test","slug":"test"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":1,"published_at":"2026-05-01T08:39:35+05:30","updated_at":"2026-05-01T08:39:35+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=api-test-post","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=api-test-post"},{"id":21,"title":"EvilGinx and AiTM Phishing: What Security Teams Need to Know in 2026","slug":"evilginx-and-aitm-phishing-what-security-teams-need-to-know-in-2026","excerpt":"A defensive guide to adversary-in-the-middle phishing, why it matters, and what security teams can do to reduce account takeover risk.","author":{"name":"Admin"},"category":{"name":"Cybersecurity","slug":"cybersecurity"},"tags":[{"name":"Cybersecurity","slug":"cybersecurity"},{"name":"Identity Security","slug":"identity-security"},{"name":"MFA","slug":"mfa"},{"name":"Phishing Defense","slug":"phishing-defense"}],"media":{"thumbnail_url":"https://images.unsplash.com/photo-1516321318423-f06f85e504b3?auto=format&fit=crop&w=1600&q=80","banner_url":"https://images.unsplash.com/photo-1516321318423-f06f85e504b3?auto=format&fit=crop&w=1600&q=80","video_url":null},"reading_time_minutes":6,"published_at":"2026-04-30T11:21:06+05:30","updated_at":"2026-04-30T11:21:06+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=evilginx-and-aitm-phishing-what-security-teams-need-to-know-in-2026","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=evilginx-and-aitm-phishing-what-security-teams-need-to-know-in-2026"},{"id":20,"title":"EvilGinx: Setup Guide","slug":"evilginx-setup-guide","excerpt":"Guide on using EvilGinx for ethical hacking and security testing.","author":{"name":"Admin"},"category":{"name":"Security","slug":"security"},"tags":[{"name":"Cybersecurity","slug":"cybersecurity"},{"name":"Ethical Hacking","slug":"ethical-hacking"},{"name":"EvilGinx","slug":"evilginx"},{"name":"Phishing","slug":"phishing"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":1,"published_at":"2026-04-30T11:18:57+05:30","updated_at":"2026-04-30T11:18:57+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=evilginx-setup-guide","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=evilginx-setup-guide"},{"id":19,"title":"Preparing for Gen Z Cybersecurity Analyst Interviews","slug":"preparing-for-gen-z-cybersecurity-analyst-interviews","excerpt":"Overview of interview preparation strategies for Gen Z candidates pursuing careers in cybersecurity.","author":{"name":"Admin"},"category":{"name":"Security","slug":"security"},"tags":[{"name":"Analyst","slug":"analyst"},{"name":"Cybersecurity","slug":"cybersecurity"},{"name":"Gen Z","slug":"gen-z"},{"name":"Interviews","slug":"interviews"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":1,"published_at":"2026-04-30T10:12:52+05:30","updated_at":"2026-04-30T10:12:52+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=preparing-for-gen-z-cybersecurity-analyst-interviews","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=preparing-for-gen-z-cybersecurity-analyst-interviews"},{"id":18,"title":"OWASP Top 10 Vulnerabilities for LLM","slug":"owasp-top-10-vulnerabilities-for-llm","excerpt":"A comprehensive overview of the OWASP Top 10 vulnerabilities specifically for large language models (LLMs).","author":{"name":"Admin"},"category":{"name":"Security","slug":"security"},"tags":[{"name":"AI","slug":"ai"},{"name":"LLM","slug":"llm"},{"name":"OWASP","slug":"owasp"},{"name":"Security","slug":"security"},{"name":"Vulnerabilities","slug":"vulnerabilities"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":1,"published_at":"2026-04-30T10:07:44+05:30","updated_at":"2026-04-30T10:07:44+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=owasp-top-10-vulnerabilities-for-llm","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=owasp-top-10-vulnerabilities-for-llm"},{"id":17,"title":"RTL-SDR Blog V3 vs V4 in 2026: Which One Should You Buy?","slug":"rtl-sdr-blog-v3-vs-v4-in-2026-which-one-should-you-buy","excerpt":"A practical long-form comparison of RTL-SDR Blog V3 and V4, including HF performance, filtering, software support, and who each version suits best in 2026.","author":{"name":"Admin"},"category":{"name":"Tech Tools","slug":"tech-tools"},"tags":[{"name":"Hardware Comparison","slug":"hardware-comparison"},{"name":"Radio Tools","slug":"radio-tools"},{"name":"RTL-SDR","slug":"rtl-sdr"},{"name":"SDR","slug":"sdr"}],"media":{"thumbnail_url":"https://images.unsplash.com/photo-1518770660439-4636190af475?auto=format&fit=crop&w=1600&q=80","banner_url":"https://images.unsplash.com/photo-1518770660439-4636190af475?auto=format&fit=crop&w=1600&q=80","video_url":null},"reading_time_minutes":7,"published_at":"2026-04-30T10:06:40+05:30","updated_at":"2026-04-30T10:06:40+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=rtl-sdr-blog-v3-vs-v4-in-2026-which-one-should-you-buy","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=rtl-sdr-blog-v3-vs-v4-in-2026-which-one-should-you-buy"},{"id":16,"title":"OWASP for LLM Apps: A Practical Guide to the Biggest Security Risks in AI Systems","slug":"owasp-for-llm-apps-a-practical-guide-to-the-biggest-security-risks-in-ai-systems","excerpt":"A long-form guide to the OWASP Top 10 for LLM applications, with practical examples, risk explanations, and links to primary sources.","author":{"name":"Admin"},"category":{"name":"Cybersecurity","slug":"cybersecurity"},"tags":[{"name":"AI Security","slug":"ai-security"},{"name":"Generative AI","slug":"generative-ai"},{"name":"LLM Security","slug":"llm-security"},{"name":"OWASP","slug":"owasp"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":6,"published_at":"2026-04-30T10:01:18+05:30","updated_at":"2026-04-30T10:01:18+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=owasp-for-llm-apps-a-practical-guide-to-the-biggest-security-risks-in-ai-systems","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=owasp-for-llm-apps-a-practical-guide-to-the-biggest-security-risks-in-ai-systems"},{"id":15,"title":"People-First SEO Operations: How to Build a Publishing Workflow That Search Engines and Readers Can Trust","slug":"people-first-seo-operations-how-to-build-a-publishing-workflow-that-search-engines-and-readers-can-trust","excerpt":"A long-form practical guide to building a people-first SEO workflow with research, metadata, verification, examples, and publishing discipline.","author":{"name":"Admin"},"category":{"name":"SEO Automation","slug":"seo-automation"},"tags":[{"name":"Content Operations","slug":"content-operations"},{"name":"People-First Content","slug":"people-first-content"},{"name":"Publishing Workflow","slug":"publishing-workflow"},{"name":"SEO","slug":"seo"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":7,"published_at":"2026-04-30T09:57:07+05:30","updated_at":"2026-04-30T09:57:07+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=people-first-seo-operations-how-to-build-a-publishing-workflow-that-search-engines-and-readers-can-trust","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=people-first-seo-operations-how-to-build-a-publishing-workflow-that-search-engines-and-readers-can-trust"},{"id":14,"title":"Why Metadata and Post-Publish Verification Matter in SEO Workflows","slug":"why-metadata-and-post-publish-verification-matter-in-seo-workflows","excerpt":"A practical guide to clean metadata, structured publishing, and verification steps that help content teams avoid invisible SEO failures.","author":{"name":"Admin"},"category":{"name":"SEO Automation","slug":"seo-automation"},"tags":[{"name":"Content Workflow","slug":"content-workflow"},{"name":"Metadata","slug":"metadata"},{"name":"Publishing","slug":"publishing"},{"name":"SEO","slug":"seo"}],"media":{"thumbnail_url":null,"banner_url":null,"video_url":null},"reading_time_minutes":2,"published_at":"2026-04-30T09:52:03+05:30","updated_at":"2026-04-30T09:52:03+05:30","url":"http://blogs.zyrops.com/public/post.php?slug=why-metadata-and-post-publish-verification-matter-in-seo-workflows","api_url":"http://blogs.zyrops.com/public/api/post.php?slug=why-metadata-and-post-publish-verification-matter-in-seo-workflows"}],"meta":{"page":1,"limit":10,"total":21,"total_pages":3,"has_next":true,"has_previous":false},"links":{"self":"http://blogs.zyrops.com/public/api/posts.php?","documentation":"http://blogs.zyrops.com/public/api-docs.php"}}