{"id":13100,"date":"2018-09-18T15:27:12","date_gmt":"2018-09-18T15:27:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29326\/14-Million-Records-Exposed-In-GovPayNow-Leak.html"},"modified":"2018-09-18T15:27:12","modified_gmt":"2018-09-18T15:27:12","slug":"14-million-records-exposed-in-govpaynow-leak","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/","title":{"rendered":"14 Million Records Exposed In GovPayNow Leak"},"content":{"rendered":"<div class=\"wysiwyg\">\n<p>GovPayNow.com, a payment system used by thousands of federal and state government agencies in the U.S. and recently acquired by Securus Technologies, has leaked 14 million customer records.<\/p>\n<p>Information exposed includes the last four digits of payment cards, names, phone numbers and addresses, according to <a href=\"https:\/\/krebsonsecurity.com\/2018\/09\/govpaynow-com-leaks-14m-records\/\">Brian Krebs<\/a>, who discovered the leak.<\/p>\n<p>Anyone could view the information by changing the digits in the URL of an online receipt\u00a0that the service gives users when they pay parking citations, fines or make other financial transactions.<\/p>\n<p>\u201cGovPayNet [which is doing business as GovPayNow] has addressed a potential issue with our online system that allows users to access copies of their receipts, but did not adequately restrict access only to authorized recipients,\u201d according to a company statement sent to KrebsOnSecurity, which also said there was no \u201cindication that any improperly accessed information was used to harm any customer, and receipts do not contain information that can be used to initiate a financial transaction.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/3erczm2x84t2p8xnj226kmxx-wpengine.netdna-ssl.com\/wp-content\/uploads\/sites\/4\/2018\/08\/databreach_1091065-3.jpg\" alt=\"\" class=\"wp-image-87261\" width=\"350\" height=\"190\" srcset=\"https:\/\/3erczm2x84t2p8xnj226kmxx-wpengine.netdna-ssl.com\/wp-content\/uploads\/sites\/4\/2018\/08\/databreach_1091065-3.jpg 700w, https:\/\/3erczm2x84t2p8xnj226kmxx-wpengine.netdna-ssl.com\/wp-content\/uploads\/sites\/4\/2018\/08\/databreach_1091065-3-300x162.jpg 300w, https:\/\/3erczm2x84t2p8xnj226kmxx-wpengine.netdna-ssl.com\/wp-content\/uploads\/sites\/4\/2018\/08\/databreach_1091065-3-156x84.jpg 156w, https:\/\/3erczm2x84t2p8xnj226kmxx-wpengine.netdna-ssl.com\/wp-content\/uploads\/sites\/4\/2018\/08\/databreach_1091065-3-312x169.jpg 312w, https:\/\/3erczm2x84t2p8xnj226kmxx-wpengine.netdna-ssl.com\/wp-content\/uploads\/sites\/4\/2018\/08\/databreach_1091065-3-640x347.jpg 640w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\"\/><\/p>\n<p>Noting that most of the information exposed \u201cis a matter of public record that may be accessed through other means,\u201d the company said. \u201cNonetheless, out of an abundance of caution and to maximize security for users, GovPayNet has updated this system to ensure that only authorized users will be able to view their receipts.\u201d<\/p>\n<p>Calling the breach at the Indianapolis-based company \u201cfairly minor\u201d compared to others over the last year, Nick Bilogorskiy, cybersecurity strategist at Juniper Networks, said, \u201cOnline payment providers, especially those doing business with the government, should take special care to protect their customers\u2019 receipts by using HTTPS and checking that the user is logged in and has permissions to view them.\u201d<\/p>\n<p>Bilogorskiy also recommended, to \u201cavoid information disclosure and directory traversal issues,\u201d that companies deny \u201canonymous web visitors the ability to read permissions for any sensitive data files and removing any unnecessary files from web-accessible directories.\u201d<\/p>\n<p>Pravin Kothari, CEO of CipherCloud, noted the security incident \u2013 which exposed data from as far back as 2012 \u2013 isn\u2019t the first for Securus, which bought the company in January.<\/p>\n<p>\u201cSecurus has had other issues with cybersecurity over the past few years including the misuse of a service that tracked convicted felons\u2019 cellphones, hackers penetrating this same system and subsequently stealing logins and legitimate credentials, and finally another flaw in May that allowed unauthorized access to accounts by guessing answers to the security questions,\u201d he explained.<\/p>\n<p>In the spring, a hacker swiped 2,800 logins and passwords from <a href=\"https:\/\/www.scmagazine.com\/home\/news\/privacy-compliance\/securus-hacked-after-reports-cops-used-it-for-tracking-location\/\">Securus<\/a>, on the heels of Sen. Ron Wyden, D-Ore., asking the Federal Communications Commission (FCC) to investigate the wireless carriers that allow law enforcement to have \u201cunrestricted access to the location data\u201d of their customers after a former Missouri sheriff was indicted for, among other things, tracking the cell phones of numerous persons, including some state troopers, without the benefit of a court order.<\/p>\n<p>The issues prompted wireless carriers like <a href=\"https:\/\/www.scmagazine.com\/home\/news\/privacy-compliance\/verizon-att-cutting-ties-with-location-aggregators-who-sold-to-law-enforcement\/\">Verizon<\/a>\u00a0to\u00a0review their location aggregator programs and terminate existing location data sharing agreements with third-party brokers.<\/p>\n<p>Many of the \u201cflaws are simple to find and fix. That\u2019s not the issue,\u201d said Kothari. \u201cThe issue is that there will always be open vulnerabilities, misconfigurations, and missing updates that attackers can exploit. You cannot fix them all.\u201d<\/p>\n<p>It\u2019s inevitable that attackers will penetrate networks, given increasing numbers and an escalating volume of persistent attacks,\u201d he said.\u00a0<\/p>\n<p>\u201cBest practices today position safekeeping of your data, at all times, in a pseudonymized form,\u201d Kothari said. \u201cThis makes it an order of magnitude harder for the attackers to acquire useful information which they can exploit from within your on-premise networks or your cloud services.\u201d<\/p>\n<p>GovPayNow.com displays an online receipt when citizens use it to settle state and local government fees and fines via the site. Until this past weekend it was possible to view millions of customer records simply by altering digits in the Web address displayed by each receipt.<\/p>\n<\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p><a href=\"https:\/\/www.scmagazine.com\/tag\/credit-card\/\" class=\"button -secondary\">Credit Card<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/feature\/\" class=\"button -secondary\">Feature<\/a><\/section>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29326\/14-Million-Records-Exposed-In-GovPayNow-Leak.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":13101,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3518],"class_list":["post-13100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentprivacyusadata-loss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>14 Million Records Exposed In GovPayNow Leak 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"14 Million Records Exposed In GovPayNow Leak 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-18T15:27:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/14-million-records-exposed-in-govpaynow-leak.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"14 Million Records Exposed In GovPayNow Leak\",\"datePublished\":\"2018-09-18T15:27:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/\"},\"wordCount\":656,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/14-million-records-exposed-in-govpaynow-leak.jpg\",\"keywords\":[\"headline,government,privacy,usa,data loss\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/\",\"name\":\"14 Million Records Exposed In GovPayNow Leak 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/14-million-records-exposed-in-govpaynow-leak.jpg\",\"datePublished\":\"2018-09-18T15:27:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/14-million-records-exposed-in-govpaynow-leak.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/14-million-records-exposed-in-govpaynow-leak.jpg\",\"width\":700,\"height\":379},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/14-million-records-exposed-in-govpaynow-leak\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,privacy,usa,data loss\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentprivacyusadata-loss\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"14 Million Records Exposed In GovPayNow Leak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"14 Million Records Exposed In GovPayNow Leak 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/","og_locale":"en_US","og_type":"article","og_title":"14 Million Records Exposed In GovPayNow Leak 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-18T15:27:12+00:00","og_image":[{"width":700,"height":379,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/14-million-records-exposed-in-govpaynow-leak.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"14 Million Records Exposed In GovPayNow Leak","datePublished":"2018-09-18T15:27:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/"},"wordCount":656,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/14-million-records-exposed-in-govpaynow-leak.jpg","keywords":["headline,government,privacy,usa,data loss"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/","url":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/","name":"14 Million Records Exposed In GovPayNow Leak 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/14-million-records-exposed-in-govpaynow-leak.jpg","datePublished":"2018-09-18T15:27:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/14-million-records-exposed-in-govpaynow-leak.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/14-million-records-exposed-in-govpaynow-leak.jpg","width":700,"height":379},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/14-million-records-exposed-in-govpaynow-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,privacy,usa,data loss","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentprivacyusadata-loss\/"},{"@type":"ListItem","position":3,"name":"14 Million Records Exposed In GovPayNow Leak"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=13100"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13100\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/13101"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=13100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=13100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=13100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}