{"id":25977,"date":"2019-03-08T15:35:18","date_gmt":"2019-03-08T15:35:18","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29914\/809-Million-Records-Exposed-By-Email-Marketing-Giant.html"},"modified":"2019-03-08T15:35:18","modified_gmt":"2019-03-08T15:35:18","slug":"809-million-records-exposed-by-email-marketing-giant","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/","title":{"rendered":"809 Million Records Exposed By Email Marketing Giant"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2019\/03\/08\/c9553a59-98eb-43c7-9173-e5f56040d71f\/thumbnail\/770x578\/3205a0a4fbed9ef90e2f41d430d3ccb2\/screenshot-2019-03-08-at-10-27-15.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Data breaches are so common now that your eyes may tend to gloss over the news of yet-another public exposure of personally identifiable information (PII) and customer records.<\/p>\n<p>Even in such a world, however, sometimes a case which tops many others still enters the public domain &#8212; such as the discovery of a database which has been described as &#8220;perhaps the biggest and most comprehensive email database I have ever reported&#8221; by the researcher who uncovered the breach.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>According to Bob Diachenko, alongside security researcher Vinny Troia, the 150GB MongoDB instance in question&nbsp;<a href=\"https:\/\/securitydiscovery.com\/800-million-emails-leaked-online-by-email-verification-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">contained four separate collections<\/a> of data.<\/p>\n<p>In total, Diachenko and Troia found 808,539,939 records, the largest collection of which was named &#8220;mailEmailDatabase,&#8221; separated into three sections as below:<\/p>\n<ul>\n<li>Emailrecords (798,171,891 records)<\/li>\n<li>emailWithPhone (4,150,600 records)<\/li>\n<li>businessLeads (6,217,358 records)<\/li>\n<\/ul>\n<p>The information on offer was &#8220;more detailed than just the email address and included PII,&#8221; the researchers say, with information relating to ZIP codes, phone numbers, physical addresses, email addresses, genders, user IP addresses, and dates of birth all available to anyone with an Internet connection.<\/p>\n<p>After cross-referencing the database with records obtained from Troy Hunt&#8217;s <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HaveIBeenPwned<\/a> database &#8212; a collection of known leaks and exposures which can be used by visitors to find out if they have been involved in a data breach &#8212; Diachenko was able to ascertain that the database was not just a bulk data dump of stolen information, such as in the case of the <a href=\"https:\/\/www.zdnet.com\/article\/security-firm-identifies-hacker-behind-collection-1-leak-as-collection-2-5-become-public\/\" target=\"_blank\">Collection 1 leak<\/a>.<\/p>\n<p>&#8220;Although not all records contained the detailed profile information about the email owner, a large number of records were very detailed,&#8221; the researcher added.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The MongoDB instance did provide some clues as to whom the data may belong to &#8212; namely, a company called &#8220;Verifications.io.&#8221;<\/p>\n<p>At the time of writing, the <a href=\"https:\/\/verifications.io\/services\/\" target=\"_blank\" rel=\"noopener noreferrer\">company&#8217;s website<\/a> is unavailable, but <a href=\"https:\/\/webcache.googleusercontent.com\/search?q=cache:https:\/\/verifications.io\/services\/\" target=\"_blank\" rel=\"noopener noreferrer\">cached pages<\/a> show that Verifications.io describes itself as an email marketing firm with a particular specialization in circumventing spam traps and hard bounces.<\/p>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/facebook-messenger-bug-revealed-who-you-had-conversations-with\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook Messenger bug revealed who you had conversations with<\/a><\/p>\n<p>One such service the company offers is called &#8220;Enterprise Email Validation,&#8221; which allows customers to upload email lists for marketing and verification purposes. An email is simply sent to someone as a test which validates the email, but if it bounces, the message is added to a bounce list for testing later.<\/p>\n<p>However, these messages appear to have been stored in plaintext and without any form of protective encryption once uploaded to the service.<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/termite-and-earthworm-testing-tool-weaponized-to-create-multi-platform-botnet\/\" target=\"_blank\" rel=\"noopener noreferrer\">Termite and EarthWorm testing tool weaponized to create multi-platform botnet<\/a><\/p>\n<p>While a list of email addresses and some PII may not seem like a big deal, Diachenko laid out a potential attack vector in which threat groups would find such a database an invaluable find.<\/p>\n<p>If a hacker drew up a list of companies they wanted to compromise and also obtained a list of potentially usable credentials, rather than brute-force attack each one, all of their email addresses could be uploaded to a service such as Verifications.io.<\/p>\n<p>By doing so, the threat actor is able to save time and reduce the chance of being exposed, while at the same time, the service validates their email cache to find the true targets worth pursuing &#8212; as well as prove PII which could be used in identity theft or social engineering attacks.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/banking-trojan-attacks-flood-the-enterprise-sector\/\" target=\"_blank\">Banking Trojans flood the enterprise, Android attacks surge<\/a><\/p>\n<p>The researchers reported their findings to Verifications.io, which pulled its website offline in response. The database was also taken down on the same day.<\/p>\n<p>&#8220;In the response they identified that what I had discovered was public data and not client data, so why close the database and take the site offline if it indeed was &#8220;public&#8221;?,&#8221; Diachenko noted. &#8220;In addition to the email profiles this database also had access details and a user list of (130 records), with names and credentials to access FTP server to upload \/ download email lists (hosted on the same IP with MongoDB). We can only speculate that this was not meant to be public data.&#8221;<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29914\/809-Million-Records-Exposed-By-Email-Marketing-Giant.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25978,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5217],"class_list":["post-25977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyemaildata-loss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>809 Million Records Exposed By Email Marketing Giant 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"809 Million Records Exposed By Email Marketing Giant 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T15:35:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/809-million-records-exposed-by-email-marketing-giant.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"809 Million Records Exposed By Email Marketing Giant\",\"datePublished\":\"2019-03-08T15:35:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/809-million-records-exposed-by-email-marketing-giant.png\",\"keywords\":[\"headline,privacy,email,data loss\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/\",\"name\":\"809 Million Records Exposed By Email Marketing Giant 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/809-million-records-exposed-by-email-marketing-giant.png\",\"datePublished\":\"2019-03-08T15:35:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/809-million-records-exposed-by-email-marketing-giant.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/809-million-records-exposed-by-email-marketing-giant.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/809-million-records-exposed-by-email-marketing-giant\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,email,data loss\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyemaildata-loss\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"809 Million Records Exposed By Email Marketing Giant\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"809 Million Records Exposed By Email Marketing Giant 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/","og_locale":"en_US","og_type":"article","og_title":"809 Million Records Exposed By Email Marketing Giant 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-08T15:35:18+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/809-million-records-exposed-by-email-marketing-giant.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"809 Million Records Exposed By Email Marketing Giant","datePublished":"2019-03-08T15:35:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/"},"wordCount":689,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/809-million-records-exposed-by-email-marketing-giant.png","keywords":["headline,privacy,email,data loss"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/","url":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/","name":"809 Million Records Exposed By Email Marketing Giant 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/809-million-records-exposed-by-email-marketing-giant.png","datePublished":"2019-03-08T15:35:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/809-million-records-exposed-by-email-marketing-giant.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/809-million-records-exposed-by-email-marketing-giant.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/809-million-records-exposed-by-email-marketing-giant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,email,data loss","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyemaildata-loss\/"},{"@type":"ListItem","position":3,"name":"809 Million Records Exposed By Email Marketing Giant"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25977"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25978"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}