{"id":26963,"date":"2019-04-24T13:42:11","date_gmt":"2019-04-24T13:42:11","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30071\/Hackers-Hit-Atlanta-Hawks-Shop-With-Malware.html"},"modified":"2019-04-24T13:42:11","modified_gmt":"2019-04-24T13:42:11","slug":"hackers-hit-atlanta-hawks-shop-with-malware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/","title":{"rendered":"Hackers Hit Atlanta Hawks Shop With Malware"},"content":{"rendered":"<p><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/Yg-oTjs8Bo3Q_oWqbNjE1d7igJk=\/1092x0\/2019\/04\/23\/c32c9eff-64a9-4679-a4ce-3818056251b1\/gettyimages-1134132862.jpg\" class alt=\"San Antonio Spurs v Atlanta Hawks\" height=\"0\" width=\"1092\"><\/span><\/span><\/p>\n<p><span class=\"caption\">The Atlanta Hawks may be good at defense on the court, but a security researcher found a different story online.<\/span><\/p>\n<p><span class=\"credit\">Getty Images<\/span><\/p>\n<p class=\"speakableTextP1\">The Atlanta Hawks need to play better defense online after a security researcher discovered malware at the basketball team&#8217;s online store.<\/p>\n<p class=\"speakableTextP2\">The merchandise website for the Hawks, the <a href=\"https:\/\/www.nba.com\/standings\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">12th-ranked team in the NBA&#8217;s Eastern conference<\/a>, was infected with malware designed to steal credit card information, according to Willem de Groot, lead forensic analyst at Sanguine Security.<\/p>\n<p>De Groot said he <a href=\"https:\/\/labs.sansec.io\/2019\/04\/24\/atlanta-hawks-magecart\/\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">first spotted the malware April 20<\/a>&nbsp;and noted it was stealing the names, addresses and credit card numbers of Hawks fans. He said he notified the team on Tuesday.<\/p>\n<p>&#8220;We take these threats seriously and are investigating,&#8221; a Hawks spokesperson said. The malware is no longer active on the site, the representative said.<\/p>\n<p>The malware represents the latest example of a credit-card skimming scam that&#8217;s gained steam over the last few years. During the last several months, <a href=\"https:\/\/www.cnet.com\/news\/newegg-data-breach-exposed-customer-credit-card-info-says-report\/\">NewEgg<\/a>, <a href=\"https:\/\/www.cnet.com\/news\/heres-how-british-airways-was-hacked-according-to-researchers\/\">British Airways<\/a> and <a href=\"https:\/\/www.cnet.com\/news\/ticketmaster-hit-by-data-breach-in-the-uk\/\">Ticketmaster UK<\/a> were among the victims of the same type of attack, perpetrated by Magecart, the world&#8217;s largest credit card-skimming operation, made up of different hacking groups.<\/p>\n<p>De Groot said Magecart, which targets popular online stores with security vulnerabilities, also hit Hawks Shop, a site for Atlanta Hawks fans to buy hats, jerseys and other team gear.<\/p>\n<p>&#8220;The frequency of hacked stores has gone down somewhat. However, the volume of stolen transactions apparently has gone up,&#8221; de Groot said. &#8220;They seem to have shifted from hacking many small stores (automated breaches) to manual breaches of larger, more profitable targets.&#8221;<\/p>\n<p>The Atlanta Hawks shop <a href=\"https:\/\/magento.com\/case-studies\/best-ecommerce-sites-atlanta-hawks-score-with-magento\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">boasted 7 million visits<\/a> one year, and has more than 1.2 million followers on Twitter.<\/p>\n<p>De Groot said he was able to spot the malware embedded on the Hawks Shop website through a Magecart detection engine he developed. The engine searches online stores for active payment skimmers. He said the tool finds between 50 and 150 stores compromised per day.<\/p>\n<p>He tested out the malware by using fake credentials to order an Atlanta Hawks hat. De Groot said he found code on the website that was logging his keystrokes as he entered the numbers in the payment form. The data was sent to a domain name first registered March 25 and hosted by a provider popular with online criminals.<\/p>\n<p>&#8220;The Magecart signature theft is to steal payment data, right when a customer enters them. Because at this stage, nothing has been encrypted yet, and the typical customer has no way of knowing that his data get siphoned off,&#8221; he said in a message.<\/p>\n<p>It&#8217;s still unclear how the hackers gained access to the Hawks Shop website, but de Groot said it&#8217;s likely they didn&#8217;t have to. In <a href=\"https:\/\/www.cnet.com\/news\/mypillow-amerisleep-websites-were-hit-with-hacks-stealing-credit-card-data\/\">previous attacks<\/a>, Magecart was able to compromise third-party tools and use them to infiltrate the shops.&nbsp;<\/p>\n<p>Originally published April 23, 2:31 p.m. PT<br \/><strong>Update, 6:27 p.m. PT<\/strong>: Adds that the malware is no longer active.&nbsp;<\/p>\n<footer class=\"row\"> <\/footer>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30071\/Hackers-Hit-Atlanta-Hawks-Shop-With-Malware.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26964,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5820],"class_list":["post-26963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerbankcybercrimefraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Hit Atlanta Hawks Shop With Malware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Hit Atlanta Hawks Shop With Malware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-24T13:42:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/hackers-hit-atlanta-hawks-shop-with-malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1092\" \/>\n\t<meta property=\"og:image:height\" content=\"774\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Hit Atlanta Hawks Shop With Malware\",\"datePublished\":\"2019-04-24T13:42:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hackers-hit-atlanta-hawks-shop-with-malware.jpg\",\"keywords\":[\"headline,hacker,bank,cybercrime,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/\",\"name\":\"Hackers Hit Atlanta Hawks Shop With Malware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hackers-hit-atlanta-hawks-shop-with-malware.jpg\",\"datePublished\":\"2019-04-24T13:42:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hackers-hit-atlanta-hawks-shop-with-malware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hackers-hit-atlanta-hawks-shop-with-malware.jpg\",\"width\":1092,\"height\":774},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hit-atlanta-hawks-shop-with-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,bank,cybercrime,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerbankcybercrimefraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Hit Atlanta Hawks Shop With Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Hit Atlanta Hawks Shop With Malware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Hit Atlanta Hawks Shop With Malware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-24T13:42:11+00:00","og_image":[{"width":1092,"height":774,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/hackers-hit-atlanta-hawks-shop-with-malware.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Hit Atlanta Hawks Shop With Malware","datePublished":"2019-04-24T13:42:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/"},"wordCount":501,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/hackers-hit-atlanta-hawks-shop-with-malware.jpg","keywords":["headline,hacker,bank,cybercrime,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/","name":"Hackers Hit Atlanta Hawks Shop With Malware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/hackers-hit-atlanta-hawks-shop-with-malware.jpg","datePublished":"2019-04-24T13:42:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/hackers-hit-atlanta-hawks-shop-with-malware.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/hackers-hit-atlanta-hawks-shop-with-malware.jpg","width":1092,"height":774},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hit-atlanta-hawks-shop-with-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,bank,cybercrime,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbankcybercrimefraud\/"},{"@type":"ListItem","position":3,"name":"Hackers Hit Atlanta Hawks Shop With Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26963"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26963\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26964"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}