{"id":1049,"date":"2018-05-23T00:32:49","date_gmt":"2018-05-23T00:32:49","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/"},"modified":"2018-05-23T00:32:49","modified_gmt":"2018-05-23T00:32:49","slug":"isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/","title":{"rendered":"ISP TalkTalk&#8217;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole"},"content":{"rendered":"<p>A years-old vulnerability continues to menace the security of some home Wi-Fi networks in the UK.<\/p>\n<p>The WPS feature in TalkTalk&#8217;s Super Router can be compromised to steal the gateway&#8217;s wireless network password, according to folks at software development house IndigoFuzz. The British ISP and telco was warned of the shortcoming in 2014, but seemingly nothing has been done about it.<\/p>\n<p>According to <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.indigofuzz.com\/article.php?docid=talktalk1430\">IndigoFuzz&#8217;s advisory<\/a> on Monday, the routers provide a WPS pairing option that is always turned on. Because that WPS connection is insecure, an attacker within range can exploit it using readily available hacking tools, and thus extract the router&#8217;s Wi-Fi password.<\/p>\n<p>In other words, if you&#8217;re near a TalkTalk Super Router, you can probe it for the Wi-Fi password via the wonky WPS feature, and hop onto the wireless network.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/11\/01\/talktalk_98374346.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"talktalk\"\/><\/p>\n<h2 title=\"But gives bonus to charity\">TalkTalk CEO Dido Harding pockets \u00a32.8m<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2016\/06\/20\/talktalk_ceo_dido_harding_pockets_28m\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;This method has proven successful on multiple TalkTalk Super Routers belonging to consenting parties which is enough to suggest that this vulnerability affects all TalkTalk Super Routers of this particular model\/version,&#8221; the IndigoFuzz team explained.<\/p>\n<p>&#8220;TalkTalk have been notified of this vulnerability in the past and have failed to patch it many years later.&#8221;<\/p>\n<p>Normally, a computer security researcher discovering such a vulnerability would give the affected vendor the courtesy of at least a 30-day waiting period to develop and roll out patches or mitigations before going public with the details. In this, case, however, IndigoFuzz went public immediately because TalkTalk subscribers <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/community.talktalk.co.uk\/t5\/Product-Archive\/D-Link-RT2860-Security-issuu\/td-p\/1542425\">publicly raised the alarm<\/a> in 2014 that the WPS feature is insecure, and thus the ISP has had plenty of time to correct its equipment.<\/p>\n<p>Researchers have, in fact, been unraveling various flaws in routers&#8217; WPS functionality all the way back <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2011\/12\/29\/wi_fi_not_protected\/\">to 2011<\/a>, if not beyond.<\/p>\n<p>Since <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2015\/11\/03\/talktalk_incident_management_review\/\">security-bungling TalkTalk<\/a> has had four years to address the matter, IndigoFuzz reckoned another 30 days won&#8217;t matter much, and went ahead with the disclosure this week. &#8220;The purpose of this article is to encourage TalkTalk to immediately patch this vulnerability in order to protect their customers,&#8221; the biz noted.<\/p>\n<p><em>The Register<\/em> has asked TalkTalk for comment. At the time of publication, we, like everyone else in this case, have yet to hear back. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/05\/22\/talktalk_routers_cracked_by_four_year_old_bug\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brit broadband biz has only had four years to patch up WPS A years-old vulnerability continues to menace the security of some home Wi-Fi networks in the UK.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1050,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-1049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISP TalkTalk&#039;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISP TalkTalk&#039;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-23T00:32:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"ISP TalkTalk&#8217;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole\",\"datePublished\":\"2018-05-23T00:32:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/\"},\"wordCount\":393,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/\",\"name\":\"ISP TalkTalk's Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg\",\"datePublished\":\"2018-05-23T00:32:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISP TalkTalk&#8217;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISP TalkTalk's Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/","og_locale":"en_US","og_type":"article","og_title":"ISP TalkTalk's Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-23T00:32:49+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"ISP TalkTalk&#8217;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole","datePublished":"2018-05-23T00:32:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/"},"wordCount":393,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/","url":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/","name":"ISP TalkTalk's Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg","datePublished":"2018-05-23T00:32:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/isp-talktalks-wi-fi-passwords-walk-walk-thanks-to-awks-awks-router-security-hole\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"ISP TalkTalk&#8217;s Wi-Fi passwords Walk Walk thanks to Awks Awks router security hole"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1049"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1049\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1050"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}