{"id":21566,"date":"2018-12-10T15:02:19","date_gmt":"2018-12-10T15:02:19","guid":{"rendered":"http:\/\/5ee09052-1c84-4de4-8df1-80b694e26b31"},"modified":"2018-12-10T15:02:19","modified_gmt":"2018-12-10T15:02:19","slug":"market-volatility-fake-news-spooks-trading-algorithms","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/","title":{"rendered":"Market volatility: Fake news spooks trading algorithms"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2017\/03\/07\/39fb3f4b-14cd-45a5-a514-58657977973a\/thumbnail\/770x578\/ce4db018eb65b41cdedfbb8ed02af9ab\/financial-graph-on-technology-abstract-background.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Fake news and inaccurate headlines may have contributed to recent stock market volatility, as trading algorithms try to interpret market-related news.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/facebooks-fake-news-efforts-will-fail-heres-why\/\">Facebook&#8217;s fake news efforts will fail: Here&#8217;s why<\/a><\/strong><\/p>\n<p>Hugh Son, at <em>CNBC<\/em> <a href=\"https:\/\/www.cnbc.com\/2018\/12\/07\/why-are-markets-so-volatile-jpmorgan-guru-thinks-fake-news-to-blame.html\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> that in a note written to clients by J.P. Morgan Chase&#8217;s top quant, Marko Kolanovic, blamed a media landscape that&#8217;s a mix of real and fake news, which makes it easy for others to amplify negative news. The effects can be seen that, in spite of a booming economy and positive signals, the markets are reacting strongly to this mix of negative news.<\/p>\n<blockquote readability=\"11\">\n<p>&#8220;We trace the disconnect between negative sentiment and macroeconomic reality to the reinforcing feedback loop of real and fake negative news.&#8221;<\/p>\n<p>. . .<\/p>\n<p>&#8220;If we add to this an increased number of algorithms that trade based on posts and headlines, the impact on price action and investor psychology can be significant,&#8221; Kolanovic said.<\/p>\n<\/blockquote>\n<h3><strong>Foremski&#8217;s Take:<\/strong><\/h3>\n<p>High-speed trading algorithms scan news stories to try and quickly determine if there is any market-moving information that affects their portfolios. It doesn&#8217;t give them much time to determine which news stories are real.<\/p>\n<p>For example, a few years ago stock trading algorithms were buying Berkshire Hathaway stock because actress Anne Hathaway was in the news with a new movie. The algorithms have become more sophisticated, but even with exotic technologies such as artificial intelligence, they cannot reliably tell the difference between real and faked news. Mark Zuckerberg told US senators that it would be five years before AI-based algorithms could tell the difference.<\/p>\n<hr\/>\n<h3>Must read<\/h3>\n<hr\/>\n<p>The stock market trading algorithms have to work a lot faster than Facebook&#8217;s newsfeed algorithms, so this means they will continue to be vulnerable to the wrong news analysis and lose money.<\/p>\n<p>Fake news is not only a problem for democracy but also for Wall Street since the majority of stock trading is algorithm-based. And brands will lose billions in value as consumers lose trust. The winners will be nefarious third-parties who will use fake news to enrich themselves and protect themselves.<\/p>\n<h3>Previous and related coverage:<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><a href=\"https:\/\/www.zdnet.com\/video\/presidential-race-in-brazil-marred-by-whatsapp-scandal\/\"><strong>Despite preventive measures, WhatsApp flooded Brazilian voters with fake news<\/strong><\/a><\/p>\n<p>Frontrunner Jair Bolsonaro is involved in accusations over illegal campaigning tactics using the messaging service.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/trump-says-google-peddles-fake-news-the-horror-of-it\/\"><strong>Trump says Google peddles fake news. The horror of it<\/strong><\/a><\/p>\n<p>The president believes Google is against him and fixes its search results. Can this be?<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/can-regulating-facebook-and-twitter-stop-the-spread-of-fake-news\/\"><strong>Can regulating Facebook and Twitter stop the spread of fake news?<\/strong><\/a><\/p>\n<p>A report by UK MPs has rejected the idea that tech companies are merely platforms.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/facebook-acquires-bloomsbury-ai-team-brings-ai-to-the-fight-against-fake-news\/\">Facebook acquires Bloomsbury AI team to automate the fight against fake news<\/a><\/strong><\/p>\n<p>It is possible the new talent pool could be used to help tackle the spread of fake news.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/market-volatility-fake-news-spooks-trading-algorithms\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stock trading algorithms know how to read news headlines, but they don&#8217;t know what&#8217;s real.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":21567,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-21566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Market volatility: Fake news spooks trading algorithms 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Market volatility: Fake news spooks trading algorithms 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-10T15:02:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Market volatility: Fake news spooks trading algorithms\",\"datePublished\":\"2018-12-10T15:02:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\"},\"wordCount\":470,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\",\"name\":\"Market volatility: Fake news spooks trading algorithms 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg\",\"datePublished\":\"2018-12-10T15:02:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Market volatility: Fake news spooks trading algorithms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Market volatility: Fake news spooks trading algorithms 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/","og_locale":"en_US","og_type":"article","og_title":"Market volatility: Fake news spooks trading algorithms 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-10T15:02:19+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Market volatility: Fake news spooks trading algorithms","datePublished":"2018-12-10T15:02:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/"},"wordCount":470,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/","url":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/","name":"Market volatility: Fake news spooks trading algorithms 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg","datePublished":"2018-12-10T15:02:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/market-volatility-fake-news-spooks-trading-algorithms.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/market-volatility-fake-news-spooks-trading-algorithms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Market volatility: Fake news spooks trading algorithms"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/21566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=21566"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/21566\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/21567"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=21566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=21566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=21566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}