{"id":2673,"date":"2018-06-11T14:52:33","date_gmt":"2018-06-11T14:52:33","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132713"},"modified":"2018-06-11T14:52:33","modified_gmt":"2018-06-11T14:52:33","slug":"unprotected-server-exposes-weight-watchers-internal-it-infrastructure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/","title":{"rendered":"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/03\/15174431\/Leaky_Server_AWS_DATA.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>A critical server for popular weight-loss service Weight Watchers was left unprotected, allowing researchers to take a bite out of dozens of exposed S3 buckets containing company data and AWS access keys.<\/p>\n<p>Researchers at Kromtech Security said that they discovered a Weight Watchers Kubernetes administration console earlier this month that was accessible over the Internet \u2013 without any password protection.<\/p>\n<p>Weight Watchers, which has been notified and has secured the console, said that its infrastructure was not compromised. A Kromtech Security spokesperson told Threatpost that researchers did not see any personally identifiable information exposed.<\/p>\n<p>\u201c[Weight Watchers] also confirms that no customer data was impacted,\u201d the spokesperson told Threatpost. \u201cHowever, the danger of the exposure is the availability of the root administration keys online that \u2013 potentially \u2013 could have opened many doors for malicious actors.\u201d<\/p>\n<p>The researchers said the open console was Kubernetes, an open-source container orchestration tool developed by Google, that automates the deployment and monitoring of application containers.<\/p>\n<p>Researchers said there was no password set for the Kubernetes cluster, which was found on at least three IP addresses with a kubelet port (specifically, port 10250) exposed.<\/p>\n<p>That allowed access to all of the pod\u2019s specifications, including the AWS access key (access key ID and secret access key) and several dozens of S3 buckets with company data, the researchers said. Overall, there were 31 users, including a user with root and administrative credentials and applications with programmatic access, \u00a0impacted.<\/p>\n<p>\u201cThe words \u2018public without password\u2019 and \u2018administration interface\u2019 should never go together,\u201d Kromtech Security researchers said in a post on <a href=\"https:\/\/kromtech.com\/blog\/security-center\/weightwatchers-exposure-a-simple-yet-powerful-lesson-in-cloud-security\" target=\"_blank\" rel=\"noopener\">Friday<\/a>. \u201cBy not properly protecting the administration console, Weight Watchers provided all the keys and information needed to gain full root access to their entire cluster. It was too easy.\u201d<\/p>\n<p>The Kromtech Security spokesperson told Threatpost that Weight Watchers responded \u201cin a timely manner and secured the console within same day, claiming though that this was a testing environment.\u201d<\/p>\n<p>Weight Watchers did not respond to a request from Threatpost for further comment. According to Kromtech Security, Weight Watchers sent the researchers this response:<\/p>\n<blockquote>\n<p><em>Thanks again for responsibly disclosing your issue. We really appreciate the community working to make us all safer. We have confirmed the issue \u2013 a security group for a test cluster in our non-production account was misconfigured during testing.<\/em><br \/><em>The issue should be resolved and keys should be revoked. We\u2019ve also implemented some safeguards to protect against this issue from recurrence.<\/em><\/p>\n<\/blockquote>\n<p>But Kromtech researchers said that even if it was a test Kubernetes cluster, \u201cthe DevOps responsible for it has no excuse. [The] Kubelet connection is not secure enough to be run across the internet. SSH tunnels must be used to securely put packets onto the cluster\u2019s network without exposing the Kubelet\u2019s web server to the internet,\u201d they said.<\/p>\n<p>Kromtech researchers suggested that companies protect their administration interfaces via an array of measures, including restricting port ranges at the firewall and forcing access only via secure sockets.<\/p>\n<p>\u201cAll of this should be done even if it\u2019s strictly on an internal network,\u201d they said. \u201cReports are rife with internal machines accidentally ending up out on the internet.\u201d<\/p>\n<p>Publicly accessible <a href=\"https:\/\/threatpost.com\/honda-universal-music-group-expose-sensitive-data-in-misconfig-blunders\/132451\/\" target=\"_blank\" rel=\"noopener\">unprotected databases<\/a>, administration interfaces and <a href=\"https:\/\/threatpost.com\/leaky-amazon-s3-bucket-exposes-personal-data-of-12000-social-media-influencers\/129810\/\" target=\"_blank\" rel=\"noopener\">storage buckets\u00a0<\/a>have continued to be a simple-to-fix yet alarmingly widespread issue, resulting in reams of exposed critical data. Also, in <a href=\"https:\/\/threatpost.com\/misconfigured-reverse-proxy-servers-spill-credentials\/132085\/\" target=\"_blank\" rel=\"noopener\">May,<\/a> researchers established a PoC attack that could allow unauthenticated bad actors to extract user credentials from misconfigured reverse proxy servers, to extract data from websites and applications.<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/132713\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers found that a critical Weight Watchers server revealed its IT internal infrastructure. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[536,1208,1209,1210,1211],"class_list":["post-2673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-cloud-security","tag-exposed-server","tag-kubernetes-server","tag-leaky-server","tag-weight-watchers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unprotected Server Exposes Weight Watchers Internal IT Infrastructure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-11T14:52:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure-1024x648.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure\",\"datePublished\":\"2018-06-11T14:52:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg\",\"keywords\":[\"Cloud Security\",\"exposed server\",\"Kubernetes server\",\"Leaky server\",\"Weight Watchers\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/\",\"name\":\"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg\",\"datePublished\":\"2018-06-11T14:52:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg\",\"width\":3441,\"height\":2177},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-11T14:52:33+00:00","og_image":[{"width":1024,"height":648,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure-1024x648.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure","datePublished":"2018-06-11T14:52:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/"},"wordCount":585,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg","keywords":["Cloud Security","exposed server","Kubernetes server","Leaky server","Weight Watchers"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/","url":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/","name":"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg","datePublished":"2018-06-11T14:52:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure.jpg","width":3441,"height":2177},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/unprotected-server-exposes-weight-watchers-internal-it-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-security\/"},{"@type":"ListItem","position":3,"name":"Unprotected Server Exposes Weight Watchers Internal IT Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2673"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2674"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}