{"id":11992,"date":"2018-09-07T12:00:34","date_gmt":"2018-09-07T12:00:34","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541989"},"modified":"2018-09-07T12:00:34","modified_gmt":"2018-09-07T12:00:34","slug":"sound-fury-and-nothing-one-year-after-equifax","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/","title":{"rendered":"Sound, Fury, And Nothing One Year After Equifax"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-913014396.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>One year ago today, Equifax suffered what remains one of the largest and most impactful data breaches in U.S. history. Last September, it was revealed that the personal information of <a href=\"https:\/\/www.equifaxsecurity2017.com\/frequently-asked-questions\/\">145 million Americans<\/a>, almost <a href=\"https:\/\/www.equifax.co.uk\/incident.html\">700,000 UK citizens<\/a>, and <a href=\"https:\/\/www.cbc.ca\/news\/business\/equifax-canadians-affected-update-1.4424066\">19,000 Canadians<\/a> was stolen by cybercriminals.<\/p>\n<p>This information included names, addresses, birthdays, Social Security numbers, and\u2014in some cases\u2014driver\u2019s licenses. All critical, personally identifiable information (PII) that can resold in the underground and used to commit identity fraud.<\/p>\n<p>This breach had very real impact on the millions affected. On Equifax? Or the industry as a whole? Not so much\u2026<\/p>\n<p>The result is that your personal information remains \u201centrusted\u201d with various agencies without your knowledge. Agencies that may or may not have your best interests at heart. A year after the Equifax breach, your data has never been at greater risk. <strong>Why?<\/strong><\/p>\n<p>The Equifax breach made international headlines for weeks. It\u2019s a story that has corporate intrigue, political uproar, and controversy\u2026yet nothing really has changed.<\/p>\n<h2>What Happened?<\/h2>\n<p>Cybercriminals gained access to Equifax\u2019s systems through a <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5638\">known vulnerability<\/a> in Apache Struts (a web application framework). This easily exploited vulnerability has been left unpatched and unmitigated by Equifax for weeks.<\/p>\n<p>When Equifax discovered the breach, they waited weeks to notify affected individuals and the general public. That notification came in the form of an insecure site on a new domain name. This contributed to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Equifax#Criticism\">criticism<\/a> the company faced as they bumbled the response.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Equifax#May%E2%80%93July_2017_data_breach\">The saga<\/a> took a number of twists and unexpected turns as <a href=\"https:\/\/www.theglobeandmail.com\/business\/international-business\/us-business\/article-former-equifax-employee-charged-in-us-with-insider-trading\/\">executives were accused<\/a> of <a href=\"https:\/\/www.theguardian.com\/business\/2018\/mar\/14\/equifax-insider-trading-data-breach-jun-ying-charged\">insider trading<\/a>, having sold shared valued at $1.8 million dollars after the breach was discovered but before the public announcement. The <a href=\"https:\/\/techcrunch.com\/2017\/09\/15\/equifax-security-and-information-executives-are-stepping-down\/\">CIO and CISO<\/a> stepped down in the wake of the breach. As the company continued to see pushback, political and consumer frustration, the <a href=\"https:\/\/www.npr.org\/2017\/09\/26\/553799200\/equifax-ceo-richard-smith-resigns-after-backlash-over-massive-data-breach\">CEO eventually resigned<\/a> allowing the company to try and turn the page.<\/p>\n<p>After all, Equifax had the tools, people, and process in place to prevent the breach but simply dropped the ball\u2026with catastrophic results.<\/p>\n<h2>Customers?<\/h2>\n<p>One of the biggest challenges in light of this breach was the relationship that Equifax had with the affected individuals. Equifax maintained a significant amount of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\">personally identifiable information<\/a> on hundreds of millions of individuals in the US and around the world yet very few of these individuals had a direct relationship with the company.<\/p>\n<p>Equifax and a handful of other <a href=\"https:\/\/www.thebalance.com\/who-are-the-three-major-credit-bureaus-960416\">consumer credit reporting agencies<\/a> make their money by selling customer profiles and credit ratings to other business, essentially acting as massive reputation clearing houses.<\/p>\n<p>Given the role played by these agencies, individuals in the US have alarmingly few actions they can take in recourse to an error or breach of their information in care of such an agency. This was a key point raised in the uproar after the Equifax breach.<\/p>\n<p>One year later, let\u2019s check in on the progress made so far\u2026<\/p>\n<h2>Lack of Personal Data Protections<\/h2>\n<p>Alarmingly, there has been no federal action and only one state has passed legislation regarding personal data protections since the Equifax breach.<\/p>\n<p>In June, California passed the California Consumer Privacy Act of 2018 (<a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375\">AB 375<\/a>). This landmark legislation takes a much needed step towards personal data protections in the state of California. While not <a href=\"https:\/\/www.nytimes.com\/2018\/05\/13\/business\/california-data-privacy-ballot-measure.html\">the driving factor<\/a> for the legislation, the breach contributed to awareness of the need for such protections.<\/p>\n<p>This protects Californian\u2019s in a similar manner to European\u2019s under GDPR. If either piece of legislation was in effect during the Equifax breach, the company <a href=\"https:\/\/www.darkreading.com\/equifax-avoided-fines-but-what-if-\/a\/d-id\/1332487?\">would have been looking at major fines<\/a>.<\/p>\n<h2>What Now?<\/h2>\n<p>Despite the initial uproar, very little has happened in wake of the Equifax breach. The creation of strict regulation in the EU had been underway for years. The initiative in California had already been underway when this breach happened.<\/p>\n<p>Despite the outrage, very little came of the breach outside of Equifax itself. They brought in new leadership and have tried to <a href=\"https:\/\/www.wired.com\/story\/equifax-security-overhaul-year-after-breach\/\">shift the security culture<\/a>, both solid steps. The <a href=\"http:\/\/www.latimes.com\/business\/la-fi-equifax-settlement-20180627-story.html#\">consent letter<\/a> signed will help ensure that Equifax continues to build a strong security culture but it doesn\u2019t impact any of the other agencies.<\/p>\n<p>Is this the future? As more and more companies move to monetize data and customer behaviours, a <a href=\"https:\/\/www.axios.com\/after-equifaxs-mega-breach-nothing-changed-1536241622-baf8e0cf-d727-43db-b4d4-77c7599fff1e.html\">lack of political will<\/a> and a lack of consumer pressure means that <strong>YOUR<\/strong> data remains at risk.<\/p>\n<p>Regulation is always challenging but it\u2019s clear that the market isn\u2019t providing a solution as few of the affected individuals have a relationship with the companies holding the data. Your personal information is just that\u2026yours and very personal.<\/p>\n<p>Individuals need the ability to hold organizations that put that information at risk accountable.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/sound-fury-and-nothing-one-year-after-equifax\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One year ago today, Equifax suffered what remains one of the largest and most impactful data breaches in U.S. history. Last September, it was revealed that the personal information of 145 million Americans, almost 700,000 UK citizens, and 19,000 Canadians was stolen by cybercriminals. This information included names, addresses, birthdays, Social Security numbers, and\u2014in some&#8230;<br \/>\nThe post Sound, Fury, And Nothing One Year After Equifax appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":11993,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[375,311,1478,307],"class_list":["post-11992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-business","tag-current-news","tag-equifax-breach","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sound, Fury, And Nothing One Year After Equifax 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sound, Fury, And Nothing One Year After Equifax 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-07T12:00:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/sound-fury-and-nothing-one-year-after-equifax.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Sound, Fury, And Nothing One Year After Equifax\",\"datePublished\":\"2018-09-07T12:00:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/\"},\"wordCount\":785,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/sound-fury-and-nothing-one-year-after-equifax.jpg\",\"keywords\":[\"Business\",\"Current News\",\"Equifax breach\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/\",\"name\":\"Sound, Fury, And Nothing One Year After Equifax 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/sound-fury-and-nothing-one-year-after-equifax.jpg\",\"datePublished\":\"2018-09-07T12:00:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/sound-fury-and-nothing-one-year-after-equifax.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/sound-fury-and-nothing-one-year-after-equifax.jpg\",\"width\":300,\"height\":169},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sound-fury-and-nothing-one-year-after-equifax\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/business\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sound, Fury, And Nothing One Year After Equifax\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sound, Fury, And Nothing One Year After Equifax 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/","og_locale":"en_US","og_type":"article","og_title":"Sound, Fury, And Nothing One Year After Equifax 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-07T12:00:34+00:00","og_image":[{"width":300,"height":169,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/sound-fury-and-nothing-one-year-after-equifax.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Sound, Fury, And Nothing One Year After Equifax","datePublished":"2018-09-07T12:00:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/"},"wordCount":785,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/sound-fury-and-nothing-one-year-after-equifax.jpg","keywords":["Business","Current News","Equifax breach","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/","url":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/","name":"Sound, Fury, And Nothing One Year After Equifax 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/sound-fury-and-nothing-one-year-after-equifax.jpg","datePublished":"2018-09-07T12:00:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/sound-fury-and-nothing-one-year-after-equifax.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/sound-fury-and-nothing-one-year-after-equifax.jpg","width":300,"height":169},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sound-fury-and-nothing-one-year-after-equifax\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Business","item":"https:\/\/www.threatshub.org\/blog\/tag\/business\/"},{"@type":"ListItem","position":3,"name":"Sound, Fury, And Nothing One Year After Equifax"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=11992"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/11992\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/11993"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=11992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=11992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=11992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}