{"id":27641,"date":"2019-07-03T15:45:51","date_gmt":"2019-07-03T15:45:51","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30281\/Hackers-Hijacked-VR-Chatrooms-To-Manipulate-Users-Reality.html"},"modified":"2019-07-03T15:45:51","modified_gmt":"2019-07-03T15:45:51","slug":"hackers-hijacked-vr-chatrooms-to-manipulate-users-reality","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/","title":{"rendered":"Hackers Hijacked VR Chatrooms To Manipulate Users&#8217; Reality"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/5d1bc0b3e6db7e0008d9f676\/lede\/1562106838772-Screen-Shot-2019-07-02-at-63329-PM.png?crop=0.9554xw:0.9988xh;0.02xw,0.0012xh&amp;resize=1200:*\" class=\"ff-og-image-inserted\"><\/div>\n<p>By taking advantage of unknown vulnerabilities, hackers could have hacked into people\u2019s computers just by having them join a chat room in the popular virtual reality applications Steam VR and VRChat.<\/p>\n<p>Security researchers Alex Radocea and Philip Pettersson found vulnerabilities in three different virtual reality platforms that would have allowed hackers to take over the target\u2019s computer, as the researchers explained in <a href=\"https:\/\/cfp.recon.cx\/reconmtl2019\/talk\/ZG3D8M\/\" target=\"_blank\" rel=\"noopener noreferrer\">a talk<\/a> at the Recon hacking conference in Montreal last week. The vulnerabilities were in <a href=\"https:\/\/www.vice.com\/en_us\/article\/wjpbpq\/vrchat-review\" target=\"_blank\" rel=\"noopener noreferrer\">VRChat<\/a>, the virtual home feature of Valve&#8217;s <a href=\"https:\/\/www.vice.com\/en_us\/article\/yp3pg5\/valve-teases-new-theater-mode-for-playing-steam-games-in-virtual-reality\" target=\"_blank\" rel=\"noopener noreferrer\">Steam VR<\/a>, and <a href=\"https:\/\/www.highfidelity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">High Fidelity<\/a>, an open-source platform for virtual reality.<\/p>\n<p>The researchers said they reported the vulnerabilities to the VR developers, which fixed them. But these bugs show that VR developers have a lot of work to do to secure their users.<\/p>\n<p>\u201cWhen you get hacked in virtual reality you can definitely feel that yourself. The attacker has complete access to your senses,\u201d Pettersson said in a phone call. \u201cHe can see through your eyes\u2014the headsets have cameras. He can hear what you&#8217;re saying\u2014they have microphones. He can project images into your retina. He can modify this virtual world in any way he wants.\u201d<\/p>\n<p class=\"article__blockquote\"><strong><em>Have a tip about a data breach or a security incident? You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email lorenzofb@vice.com<\/em><\/strong><\/p>\n<p>Petterson and Radocea said that the VRChat and Steam VR vulnerabilities were particularly dangerous.<\/p>\n<p>By embedding an exploit in a chat room, all a hacker had to do was invite people to it to take over their computers. At that point, the hacker could turn on their webcams, microphones, or manipulate what they see within their VR headset. Hackers could have even made this into a worm, a self-spreading VR malware that infected anyone who entered a chat room, and then invited all their friends to enter the malicious chat room\u2014potentially reaching all VRChat or Steam VR users, just like <a href=\"https:\/\/www.vice.com\/en_us\/article\/wnjwb4\/the-myspace-worm-that-changed-the-internet-forever\" target=\"_blank\" rel=\"noopener noreferrer\">the infamous MySpace worm did in 2005<\/a>.<\/p>\n<p>\u201c[Hackers could] create a program that invites all of their friends into the room and once they get infected, it also invites all their contacts into the room,\u201d Radocea said.<\/p>\n<p>The researchers made a demo video showing how a hack like this would look like.<\/p>\n<p>VRChat, Valve, and High Fidelity did not immediately respond to a request for comment.<\/p>\n<p>Radocea and Petterson said their research serves as a warning to VR makers to step up their security game and make sure their platforms are not easily exploitable.<\/p>\n<p><strong><em>Subscribe to our new cybersecurity podcast,<\/em><\/strong> <a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><em>CYBER<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30281\/Hackers-Hijacked-VR-Chatrooms-To-Manipulate-Users-Reality.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27642,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[256],"class_list":["post-27641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Hijacked VR Chatrooms To Manipulate Users&#039; Reality 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Hijacked VR Chatrooms To Manipulate Users&#039; Reality 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-03T15:45:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1478\" \/>\n\t<meta property=\"og:image:height\" content=\"831\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Hijacked VR Chatrooms To Manipulate Users&#8217; Reality\",\"datePublished\":\"2019-07-03T15:45:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\"},\"wordCount\":439,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\",\"name\":\"Hackers Hijacked VR Chatrooms To Manipulate Users' Reality 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg\",\"datePublished\":\"2019-07-03T15:45:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg\",\"width\":1478,\"height\":831},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Hijacked VR Chatrooms To Manipulate Users&#8217; Reality\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Hijacked VR Chatrooms To Manipulate Users' Reality 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Hijacked VR Chatrooms To Manipulate Users' Reality 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-03T15:45:51+00:00","og_image":[{"width":1478,"height":831,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Hijacked VR Chatrooms To Manipulate Users&#8217; Reality","datePublished":"2019-07-03T15:45:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/"},"wordCount":439,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg","keywords":["headline,hacker,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/","name":"Hackers Hijacked VR Chatrooms To Manipulate Users' Reality 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg","datePublished":"2019-07-03T15:45:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality.jpg","width":1478,"height":831},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijacked-vr-chatrooms-to-manipulate-users-reality\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"Hackers Hijacked VR Chatrooms To Manipulate Users&#8217; Reality"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27641"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27642"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}