{"id":25239,"date":"2019-02-14T01:54:13","date_gmt":"2019-02-14T01:54:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29825\/Games-Of-Thrones-Hacker-Worked-With-US-Defector.html"},"modified":"2019-02-14T01:54:13","modified_gmt":"2019-02-14T01:54:13","slug":"games-of-thrones-hacker-worked-with-us-defector","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/","title":{"rendered":"Games Of Thrones Hacker Worked With US Defector"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2017\/07\/18\/78d763c6-3bb9-457f-bafd-88c9e9419709\/e3d1cf214060a33e49470964c3360878\/game-of-thrones-season-7-promo-photo.jpg\" class=\"\" alt=\"game-of-thrones-season-7-promo-photo.jpg\"\/><\/span><\/p>\n<p>The US Department of Justice unsealed today espionage-related charges against a former US Air Force service member who defected to Iran and helped the country&#8217;s hackers target her former Air Force colleagues.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Besides charges and an arrest warrant issued in the name of the former USAF service member, the DOJ also indicted four Iranian hackers who supposedly carried out the cyber-attacks acting on information provided by Witt.<\/p>\n<p>The most notable of the four Iranian hackers is Behzad Mesri, who US authorities also <a href=\"https:\/\/www.justice.gov\/usao-sdny\/pr\/acting-manhattan-us-attorney-announces-charges-against-iranian-national-conducting\" target=\"_blank\" rel=\"noopener noreferrer\">charged in November 2017<\/a> with hacking HBO, stealing scripts for unaired episodes of season 6 of the hit series Game Of Thrones TV show, and later attempting to extort HBO execs for $6 million.<\/p>\n<p>Mesri isn&#8217;t just some random cyber-criminal, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hbo-hacker-was-part-of-irans-charming-kitten-elite-cyber-espionage-unit\/\" target=\"_blank\" rel=\"noopener noreferrer\">he&#8217;s believed to be a member<\/a> of the &#8220;Charming Kitten&#8221; Iranian cyber-espionage unit, a top hacker and a close collaborator of the Iranian Revolutionary Guard Corps (IRGC), the country&#8217;s main intelligence service.<\/p>\n<p>But at the heart of today&#8217;s indictment stands Monica Elfriede Witt, 39, a former US Air Force counter-intelligence special agent specialized in Middle East operations, who served for the Air Force between 1997 and 2008, and later worked as a DOD contractor until 2010 &#8211;including for Booz Allen Hamilton, the same defense company where Edward Snowden worked.<\/p>\n<p>Prosecutors say that Iranian intelligence recruited Witt in 2012 when she attended a conference in Iran called &#8220;Hollywoodism,&#8221; organized by Iranian company New Horizon Organization and sponsored by the IRGC. The conference&#8217;s main topic was condemning American moral standards, promoting anti-US propaganda, anti-Semitism, and Holocaust denial.<\/p>\n<p>Prosecutors say that Witt established relations with individuals she met at the conference, one of whom later arranged her defection to Iran in August 2013, where she received housing and computer equipment from the Iranian government.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The DOJ claims Witt has been working ever since with IRGC hacking units to craft and fine-tune cyber-operations against her former Air Force colleagues, some of whom she knew personally.<\/p>\n<p>Some of the attacks mentioned in the <a href=\"https:\/\/www.justice.gov\/opa\/press-release\/file\/1131726\/download\" target=\"_blank\" rel=\"noopener noreferrer\">indictment<\/a> include spear-phishing campaigns, malware infections, and social media-based operations.<\/p>\n<p>Witt allegedly provided information on the targets that were worth hacking and even worked with the four hackers to register an impostor Facebook account in the name of a former colleague, successfully befriending other special agents.<\/p>\n<p>Witt&#8217;s defection and subsequent collaboration with Iranian hackers were made much worse because she also had high-level security clearance and field duty experience, and indirectly helped Iranian intelligence gain deep insight into how US operations are conducted both internally and overseas.<\/p>\n<p>All the five suspects named in the indictment are still at large, believed to be located in Iran. The DOJ says Witt now goes by the names of Fatemah Zahra or Narges Witt.<\/p>\n<p>The US Department of Treasury also <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/sm611\" target=\"_blank\" rel=\"noopener noreferrer\">announced<\/a> economic sanctions against two Iranian companies today &#8211;New Horizon Organization, for its support of the IRGC; and Net Peygard Samavat Company, a company that developed and attempted to install malware on US government personnel&#8217; computers under the coordination of the IRGC.<\/p>\n<h3>Related security coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29825\/Games-Of-Thrones-Hacker-Worked-With-US-Defector.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25240,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5829],"class_list":["post-25239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusairan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Games Of Thrones Hacker Worked With US Defector 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Games Of Thrones Hacker Worked With US Defector 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T01:54:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2878\" \/>\n\t<meta property=\"og:image:height\" content=\"1404\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Games Of Thrones Hacker Worked With US Defector\",\"datePublished\":\"2019-02-14T01:54:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\"},\"wordCount\":514,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg\",\"keywords\":[\"headline,hacker,government,usa,iran\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\",\"name\":\"Games Of Thrones Hacker Worked With US Defector 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg\",\"datePublished\":\"2019-02-14T01:54:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg\",\"width\":2878,\"height\":1404},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,iran\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusairan\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Games Of Thrones Hacker Worked With US Defector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Games Of Thrones Hacker Worked With US Defector 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/","og_locale":"en_US","og_type":"article","og_title":"Games Of Thrones Hacker Worked With US Defector 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-14T01:54:13+00:00","og_image":[{"width":2878,"height":1404,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Games Of Thrones Hacker Worked With US Defector","datePublished":"2019-02-14T01:54:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/"},"wordCount":514,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg","keywords":["headline,hacker,government,usa,iran"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/","url":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/","name":"Games Of Thrones Hacker Worked With US Defector 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg","datePublished":"2019-02-14T01:54:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/games-of-thrones-hacker-worked-with-us-defector.jpg","width":2878,"height":1404},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/games-of-thrones-hacker-worked-with-us-defector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,iran","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusairan\/"},{"@type":"ListItem","position":3,"name":"Games Of Thrones Hacker Worked With US Defector"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25239"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25240"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}