{"id":14948,"date":"2018-10-05T13:26:08","date_gmt":"2018-10-05T13:26:08","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29384\/The-Dark-Web-Market-Is-Dedicated-To-Compromising-Your-Emails.html"},"modified":"2018-10-05T13:26:08","modified_gmt":"2018-10-05T13:26:08","slug":"the-dark-web-market-is-dedicated-to-compromising-your-emails","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/","title":{"rendered":"The Dark Web Market Is Dedicated To Compromising Your Emails"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/07\/25\/61403dac-8632-454f-a4a5-d61fe1ab373d\/thumbnail\/770x578\/24f921a4ff4a16777aec6b1484802302\/istock-silly-hacker-hands.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Security researchers have exposed a thriving underground market with hackers offering access to business email addresses to crooks who then attempt to carry out frauds.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>According to research by security company Digital Shadows for as little as $150, <a href=\"https:\/\/www.techrepublic.com\/article\/dark-web-the-smart-persons-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">dark web sellers<\/a> are offering to hack into whichever corporate email account the user wants to gain access to &#8212; with many promising access within a week. In some instances, the sellers state they&#8217;ll only take the payment after they&#8217;ve proved the target has been compromised.<\/p>\n<p>Researchers at <a href=\"https:\/\/info.digitalshadows.com\/BECResearchReport_Reg-PressRelease.html\" target=\"_blank\" rel=\"noopener noreferrer\">Digital Shadows<\/a> examined dark web forums and found a large amount of these illicit services on offer, with some users asking for specific accounts to be hacked, while others are offering their account-hacking services in exchange for a fee.<\/p>\n<p>In exchange for acquiring access to the relevant email addresses to help conduct the campaigns, one attacker offered the undercover researcher 20 percent of the profits made.<\/p>\n<p>&#8220;That some actors are offering a commission structure reflects how easy it is to acquire compromised email accounts online. With so many in circulation, some actors prefer the quality of the account and the potential rewards from them rather than simply having access to a hundred low-level emails,&#8221; Rafael Amado, strategy and research analyst at Digital Shadows told ZDNet.<\/p>\n<p>&#8220;The commission structure would appeal if the attacker was targeting high-value victims, where the commission gained here would be far higher than paying a set fee for a set of low-level accounts with little financial value&#8221;.<\/p>\n<p><strong><strong>SEE: <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\">What is phishing? Everything you need to know to protect yourself from scam emails and more<\/a><\/strong><\/strong><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>By acquiring access to these email addresses by employing the skills of another dark web user, the attacker can then conducting their own phishing and social engineering schemes in an effort to trick corporate accounts departments into transferring them a large sum of money.<\/p>\n<p>Perhaps more worryingly, some companies don&#8217;t even need to be hacked. Digital Shadows discovered entire company email inboxes exposed &#8212; over 12 million email archive files (.eml, .msg, .pst, .ost, .mbox) publicly available across misconfigured rsync, FTP, SMB, S3 buckets, and NAS drives. It also found 27,000 invoices, 7,000 purchase orders, and 21,000 payment records.<\/p>\n<p>According to the FBI, business email compromise attacks have <a href=\"https:\/\/www.ic3.gov\/media\/2018\/180712.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">cost organisations over $12bn over the last five years<\/a> &#8212; if an attacker can make commission on one of these big attacks, it could be very lucrative; assuming their partner pays up, that is.<\/p>\n<p>With large profits potentially available, it&#8217;s no wonder that compromised email accounts of finance and accounting departments are a highly sought after commodity &#8212; which is why some dark web users are willing to pay large amounts to gain access.<\/p>\n<p>Researchers uncovered various posts on underground forums in which users were offering $5,000 up front for access to hacked company email addresses, with accounts departments in high demand. $5,000 might seem a lot to pay for some email addresses, but for those with the knowledge of how to exploit them, <a href=\"https:\/\/www.zdnet.com\/article\/cyber-fraudsters-now-stealing-millions-in-single-transactions\/\">there&#8217;s potentially millions of dollars to be made<\/a>.<\/p>\n<p>In order to ensure organisations are protected against business email compromise, Digital Shadows recommends that security awareness training is updated as new attacks come to light and that organisations should include business email compromise in their incident response and business continuity planning.<\/p>\n<p>It&#8217;s also recommended that wire transfers of large sums of money should need to be approved by multiple people and that organisations should continuously monitor for exposed credentials so they know if they could potentially be at higher risk.<\/p>\n<p>Companies should build the risk of business email compromise into their contingency plans, just as they have built ransomware and destructive malware into their incident response and business continuity planning, said Amado.<\/p>\n<p><strong>READ MORE ON CYBER CRIME<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29384\/The-Dark-Web-Market-Is-Dedicated-To-Compromising-Your-Emails.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14949,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1433],"class_list":["post-14948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerprivacyemail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Dark Web Market Is Dedicated To Compromising Your Emails 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dark Web Market Is Dedicated To Compromising Your Emails 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-05T13:26:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Dark Web Market Is Dedicated To Compromising Your Emails\",\"datePublished\":\"2018-10-05T13:26:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg\",\"keywords\":[\"headline,hacker,privacy,email\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/\",\"name\":\"The Dark Web Market Is Dedicated To Compromising Your Emails 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg\",\"datePublished\":\"2018-10-05T13:26:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-dark-web-market-is-dedicated-to-compromising-your-emails\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,email\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacyemail\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Dark Web Market Is Dedicated To Compromising Your Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dark Web Market Is Dedicated To Compromising Your Emails 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/","og_locale":"en_US","og_type":"article","og_title":"The Dark Web Market Is Dedicated To Compromising Your Emails 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-05T13:26:08+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Dark Web Market Is Dedicated To Compromising Your Emails","datePublished":"2018-10-05T13:26:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/"},"wordCount":636,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg","keywords":["headline,hacker,privacy,email"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/","url":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/","name":"The Dark Web Market Is Dedicated To Compromising Your Emails 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg","datePublished":"2018-10-05T13:26:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-dark-web-market-is-dedicated-to-compromising-your-emails.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-dark-web-market-is-dedicated-to-compromising-your-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,email","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacyemail\/"},{"@type":"ListItem","position":3,"name":"The Dark Web Market Is Dedicated To Compromising Your Emails"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14948"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14948\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14949"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}