{"id":16218,"date":"2018-10-18T21:40:00","date_gmt":"2018-10-18T21:40:00","guid":{"rendered":"http:\/\/525e7610-8834-436b-b3d5-281c1d510b40"},"modified":"2018-10-18T21:40:00","modified_gmt":"2018-10-18T21:40:00","slug":"flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/","title":{"rendered":"Flaws in telepresence robots allow hackers access to pictures, video feeds"},"content":{"rendered":"<p>Telepresence robots from Vecna Technologies can be hacked using a suite of five vulnerabilities. The flaws can be combined to allow an attacker full control over a robot, giving an intruder the capability to alter firmware, steal chat logs, pictures, or even access live video streams.<\/p>\n<p>Vecna has already patched two of the five vulnerabilities and is in the process of addressing the other three.<\/p>\n<ul>\n<li><strong>CVE-2018-8858:<\/strong> Insufficiently Protected Credentials &#8211; Wi-Fi, XMPP &#8211; Patch Pending<\/li>\n<li><strong>CVE-2018-8860:<\/strong> Cleartext Transmission of Sensitive Information &#8211; Firmware &#8211; Patched<\/li>\n<li><strong>CVE-2018-8866:<\/strong> Improper Neutralization of Special Elements &#8211; RCE &#8211; Patched<\/li>\n<li><strong>CVE-2018-17931:<\/strong> Improper Access Control (USB) &#8211; Patch Pending<\/li>\n<li><strong>CVE-2018-17933:<\/strong> Improper Authorization (XMPP Client) &#8211; Patch Pending<\/li>\n<\/ul>\n<p>The flaws were discovered earlier this year by Dan Regalado, a security researcher with IoT cyber-security firm Zingbox.<\/p>\n<p>The vulnerabilities affect <a href=\"https:\/\/www.vecna.com\/vgo-robot-celia-makes-sick-kids-smile\/\" target=\"_blank\" rel=\"noopener noreferrer\">Vecna VGo Celia<\/a>, a telepresence robot that can be deployed in the field but controlled from a remote location. Telepresence robots are equipped with both a microphone and a video camera and sit on movable rigs.<\/p>\n<p>They are usually found in hospitals, to allow doctors to interview patients from afar, in schools, to allow sick children to attend classes or professors to give classes while on the road, or in factories to allow technical inspections from authorized personnel.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2018\/10\/18\/1f6a7e14-a9c5-4e99-a31f-42a869a5d012\/7afe82b023d8aafefa23ddb2a993a571\/vgo-celia.jpg\" class=\"\" alt=\"vgo-celia.jpg\"\/><\/span> <span class=\"credit\">Image: Vecna<\/span> <\/p>\n<p>&#8220;Because the robot performs firmware updates over HTTP, an attacker with access to the same network segment where the robot is connected can intercept the update,&#8221; said Regalado in a <a href=\"http:\/\/go.zingbox.com\/rs\/562-ZPO-907\/images\/Zingbox%20Whitepaper%20-%20Telepresence%20Robot%20Vulnerabilities.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">research paper<\/a> published this week.<\/p>\n<p>The attacker can poison the firmware with malicious code, or analyze it for flaws he can exploit at a later date. This last scenario is what Regalado did.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>He found that Vecna devs had left a developer tool active on the robot that made the device vulnerable to a trove of attacks. This tool, a CGI script, allowed the attacker to execute commands with root privileges on the device.<\/p>\n<p>Regalado says the attacker can use this vulnerability to access internal robot functions, but could also use the infected robot to attack other devices on an organization&#8217;s internal network.<\/p>\n<p>Vecna has already patched these two issues, CVE-2018-8860 and CVE-2018-8866, but Regalado says there&#8217;s another one just as bad.<\/p>\n<p>He says that CVE-2018-17931 lets an attacker plug in a USB thumb drive into a robot and the robot&#8217;s firmware will execute a file hosted on the USB stick (\/config\/startup.script) with root privileges, giving the attacker the opportunity to hijack the device.<\/p>\n<p>Regalado also discovered CVE-2018-8858. This flaw lets an attacker recover WiFi passwords that the robot uses to connect to an organization&#8217;s internal network or the XMPP credentials that the robot owner uses to connect to the device from remote locations.<\/p>\n<p>CVE-2018-17933, the last of the three unpatched vulnerabilities, resides in the XMPP client, which is the heart of the robot&#8217;s firmware, working as a tunnel between the remote user and the telepresence robot&#8217;s internal functions.<\/p>\n<p>The XMPP client has access to everything, and Regalado says an attacker could abuse this flaw to execute any commands he wants, allowing him to steal chat logs, pictures the robot has taken, or even dump raw video feeds as they&#8217;re streamed and send the video files to an attacker.<\/p>\n<p>Knowing that many of these telepresence robots are also deployed in enterprise boardroom environments, an attacker intent on economic espionage can use these robots to gain access to private intellectual property, or to attend closed meetings where sensitive information may be exchanged, information that can is extremely valuable for insider trading.<\/p>\n<h3>RELATED COVERAGE:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vendor has patched two of five reported bugs. Three patches are in the works.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16219,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-16218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Flaws in telepresence robots allow hackers access to pictures, video feeds 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flaws in telepresence robots allow hackers access to pictures, video feeds 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-18T21:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"325\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Flaws in telepresence robots allow hackers access to pictures, video feeds\",\"datePublished\":\"2018-10-18T21:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/\"},\"wordCount\":617,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/\",\"name\":\"Flaws in telepresence robots allow hackers access to pictures, video feeds 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg\",\"datePublished\":\"2018-10-18T21:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg\",\"width\":770,\"height\":325},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flaws in telepresence robots allow hackers access to pictures, video feeds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Flaws in telepresence robots allow hackers access to pictures, video feeds 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/","og_locale":"en_US","og_type":"article","og_title":"Flaws in telepresence robots allow hackers access to pictures, video feeds 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-18T21:40:00+00:00","og_image":[{"width":770,"height":325,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Flaws in telepresence robots allow hackers access to pictures, video feeds","datePublished":"2018-10-18T21:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/"},"wordCount":617,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/","url":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/","name":"Flaws in telepresence robots allow hackers access to pictures, video feeds 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg","datePublished":"2018-10-18T21:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds.jpg","width":770,"height":325},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/flaws-in-telepresence-robots-allow-hackers-access-to-pictures-video-feeds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Flaws in telepresence robots allow hackers access to pictures, video feeds"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16218"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16219"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}