{"id":27503,"date":"2019-06-26T14:20:49","date_gmt":"2019-06-26T14:20:49","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30264\/China-Hacked-Eight-Major-Computer-Services-Firms.html"},"modified":"2019-06-26T14:20:49","modified_gmt":"2019-06-26T14:20:49","slug":"china-hacked-eight-major-computer-services-firms","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/","title":{"rendered":"China Hacked Eight Major Computer Services Firms"},"content":{"rendered":"<p>LONDON (Reuters) &#8211; Hackers working for China\u2019s Ministry of State Security broke into networks of eight of the world\u2019s biggest technology service providers in an effort to steal commercial secrets from their clients, according to sources familiar with the attacks.<\/p>\n<div class=\"PrimaryAsset_container\" readability=\"7\">\n<div class=\"Image_container\" tabindex=\"-1\" readability=\"9\">\n<div class=\"LazyImage_container LazyImage_dark\"><img decoding=\"async\" src=\"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20\" aria-label=\"FILE PHOTO - A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS\/Kacper Pempel\/Illustration\">\n<\/div>\n<p><span>FILE PHOTO &#8211; A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS\/Kacper Pempel\/Illustration<\/span><\/p>\n<\/div>\n<\/div>\n<p>Reuters today reported extensive new details about the global hacking campaign, known as Cloud Hopper and attributed to China by the United States and its Western allies.<\/p>\n<p>Read the full report here:<\/p>\n<p><a href=\"https:\/\/www.reuters.com\/investigates\/special-report\/china-cyber-cloudhopper\">here<\/a><\/p>\n<p>A U.S. indictment in December outlined an elaborate operation to steal Western intellectual property in order to advance China\u2019s economic interests but stopped short of naming victim companies. A Reuters report at the time identified two: Hewlett Packard Enterprise and IBM.<\/p>\n<p>Now, Reuters has found that at least six other technology service providers were compromised: Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation and DXC Technology, HPE\u2019s spun-off services arm.<\/p>\n<p>Reuters has also identified more than a dozen victims who were clients of the service providers. That list includes Swedish telecoms giant Ericsson, U.S. Navy shipbuilder Huntington Ingalls Industries and travel reservation system Sabre.<\/p>\n<p>HPE said it worked \u201cdiligently for our customers to mitigate this attack and protect their information.\u201d DXC said it had \u201crobust security measures in place\u201d to protect itself and clients, neither of which have \u201cexperienced a material impact\u201d due to Cloud Hopper.<\/p>\n<p>NTT Data, Dimension Data, Tata Consultancy Services, Fujitsu and IBM declined to comment. IBM has previously said it has no evidence sensitive corporate data was compromised by the attacks.<\/p>\n<p>Sabre said it had disclosed a cybersecurity incident in 2015 and an investigation concluded no traveler data was accessed. A Huntington Ingalls spokeswoman said the company is \u201cconfident that there was no breach of any HII data\u201d via HPE or DXC.<\/p>\n<p>Ericsson said it does not comment on specific cybersecurity incidents. \u201cWhile there have been attacks on our enterprise network, we have found no evidence in any of our extensive investigations that Ericsson\u2019s infrastructure has ever been used as part of a successful attack on one of our customers,\u201d a spokesman said.<\/p>\n<p>The Chinese government has consistently denied all accusations of involvement in hacking. The Chinese Foreign Ministry said Beijing opposed cyber-enabled industrial espionage. \u201cThe Chinese government has never in any form participated in or supported any person to carry out the theft of commercial secrets,\u201d it said in a statement to Reuters.<\/p>\n<p>The Cloud Hopper attacks carry worrying lessons for government officials and technology companies struggling to manage security threats.<\/p>\n<p>Chinese hackers, including a group known as APT10, were able to continue the attacks in the face of a counter-offensive by top security specialists and despite a 2015 U.S.-China pact to refrain from economic espionage.<\/p>\n<p>Reuters was unable to detail the full extent of the damage done by the hacking and many victims are unable to tell exactly what was stolen. Yet senior Western intelligence officials say the toll was high.<\/p>\n<p>\u201cThis was a sustained series of attacks with a devastating impact,\u201d said Robert Hannigan, former director of Britain\u2019s GCHQ signals intelligence agency and now European chairman at cybersecurity firm BlueVoyant.<\/p>\n<div class=\"Attribution_container\" readability=\"7\">\n<div class=\"Attribution_attribution\" readability=\"9\">\n<p class=\"Attribution_content\">Additional reporting by Gao Liangping, Cate Cadell and Ben Blanchard in Beijing. Editing by Ronnie Greene and Jonathan Weber<\/p>\n<\/div>\n<\/div>\n<div class=\"StandardArticleBody_trustBadgeContainer\"><span class=\"StandardArticleBody_trustBadgeTitle\">Our Standards:<\/span><span class=\"trustBadgeUrl\"><a href=\"http:\/\/thomsonreuters.com\/en\/about-us\/trust-principles.html\">The Thomson Reuters Trust Principles.<\/a><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30264\/China-Hacked-Eight-Major-Computer-Services-Firms.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[6888],"class_list":["post-27503","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentchinacyberwarbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>China Hacked Eight Major Computer Services Firms 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China Hacked Eight Major Computer Services Firms 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-26T14:20:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"China Hacked Eight Major Computer Services Firms\",\"datePublished\":\"2019-06-26T14:20:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/\"},\"wordCount\":584,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20\",\"keywords\":[\"headline,hacker,government,china,cyberwar,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/\",\"name\":\"China Hacked Eight Major Computer Services Firms 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20\",\"datePublished\":\"2019-06-26T14:20:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20\",\"contentUrl\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/china-hacked-eight-major-computer-services-firms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,china,cyberwar,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentchinacyberwarbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"China Hacked Eight Major Computer Services Firms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China Hacked Eight Major Computer Services Firms 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/","og_locale":"en_US","og_type":"article","og_title":"China Hacked Eight Major Computer Services Firms 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-26T14:20:49+00:00","og_image":[{"url":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"China Hacked Eight Major Computer Services Firms","datePublished":"2019-06-26T14:20:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/"},"wordCount":584,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20","keywords":["headline,hacker,government,china,cyberwar,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/","url":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/","name":"China Hacked Eight Major Computer Services Firms 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20","datePublished":"2019-06-26T14:20:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#primaryimage","url":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20","contentUrl":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20190626&amp;t=2&amp;i=1401679995&amp;r=LYNXNPEF5P12T&amp;w=20"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/china-hacked-eight-major-computer-services-firms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,china,cyberwar,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentchinacyberwarbackdoor\/"},{"@type":"ListItem","position":3,"name":"China Hacked Eight Major Computer Services Firms"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27503"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27503\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}