{"id":28809,"date":"2019-08-27T14:00:00","date_gmt":"2019-08-27T14:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/risk\/6-ways-airlines-and-hotels-can-keep-their-networks-secure--------------------\/d\/d-id\/1335620"},"modified":"2019-08-27T14:00:00","modified_gmt":"2019-08-27T14:00:00","slug":"6-ways-airlines-and-hotels-can-keep-their-networks-secure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/","title":{"rendered":"6 Ways Airlines and Hotels Can Keep Their Networks Secure"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">As recent news can attest, travel and hospitality companies are prime targets for cybercriminals. Here are six privacy and security tips that can help lock down privacy and security.<\/span> <\/p>\n<div>\n<div><span class=\"smaller blue\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" alt=\"Previous\"><\/span><\/p>\n<p><span class=\"smaller blue\">1 of 7<\/span><\/p>\n<p><span class=\"smaller blue\"><a href=\"https:\/\/www.darkreading.com\/risk\/6-ways-airlines-and-hotels-can-keep-their-networks-secure--------------------\/d\/d-id\/1335620?image_number=2\" title=\"Next\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-black-right.png\" alt=\"Next\"><\/a><\/span><\/div>\n<\/div>\n<div class=\"docimage\" align=\"center\" readability=\"4.4571428571429\"><a href=\"https:\/\/www.darkreading.com\/risk\/6-ways-airlines-and-hotels-can-keep-their-networks-secure--------------------\/d\/d-id\/1335620?_mc=rss%5Fx%5Fdrr%5Fedt%5Faud%5Fdr%5Fx%5Fx%2Drss%2Dsimple&amp;image_number=1\" target=\"new\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"docimage\" src=\"https:\/\/img.deusm.com\/darkreading\/1335620\/1.jpeg\" alt=\"Image Source:Adobe Stock: Space_Cat \" border=\"0\"><\/a> <\/div>\n<p>The bad news doesn&#8217;t stop for travel and hospitality companies.<\/p>\n<p>A long list of breaches have been widely reported in the past year. On the hotel front, there&#8217;s <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/massive-starwood-hotels-breach-hits-500-million-guests\/d\/d-id\/1333379\" target=\"_blank\" rel=\"noopener noreferrer\">Marriott\/Starwood,<\/a> <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/radisson-rewards-program-targeted-in-data-breach\/d\/d-id\/1333176\" target=\"_blank\" rel=\"noopener noreferrer\">Radisson,<\/a> and the most recent <a href=\"https:\/\/www.darkreading.com\/cloud\/700k-guest-records-stolen-in-choice-hotels-breach\/d\/d-id\/1335507\" target=\"_blank\" rel=\"noopener noreferrer\">Choice Hotels<\/a> breach. High-profile hacks on airlines include <a href=\"https:\/\/www.darkreading.com\/britain-looks-to-levy-record-gdpr-fine-against-british-airways\/d\/d-id\/1335166\" target=\"_blank\" rel=\"noopener noreferrer\">British Airways<\/a>, <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/buckle-up-a-closer-look-at-airline-security-breaches\/d\/d-id\/1333336\" target=\"_blank\" rel=\"noopener noreferrer\">Air Canada<\/a>, and <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/cathay-pacific-suffers-largest-airline-breach\/d\/d-id\/1333128\" target=\"_blank\" rel=\"noopener noreferrer\">Cathay Pacific.<\/a><\/p>\n<p>David Dufour, vice president of engineering at Webroot, says airlines and hotels are prime targets because they&#8217;re not typical businesses at which employees are locked into a single corporate location.<\/p>\n<p>&#8220;The employees at airlines and hotels handle a lot private information, and there&#8217;s a lot of turnover in those industries,&#8221; Dufour says. &#8220;People don&#8217;t spend long careers at the front desk of a hotel.&#8221;<\/p>\n<p>Airlines and hotels also have branch offices in hundreds of cities around the world, so the sheer volume of their operations creates a high degree of exposure, Dufour adds.<\/p>\n<p>&#8220;As a frequent traveler, when I go into an airport lounge, I want them to have all my information on hand, but from a security perspective these situations are ripe with opportunity,&#8221; Dufour says. &#8220;As a customer, I expect the service, but the reality is that potentially every open area is a vulnerability.&#8221;<\/p>\n<p>The struggle to achieve that balance between customer convenience and security continues for travel and hospitality companies. Here are six tips they can follow to help lock down privacy and security. &nbsp;<\/p>\n<p> <span class=\"italic\">Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=2460\">View Full Bio<\/a><\/span> <\/p>\n<div>\n<div><span class=\"smaller blue\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" alt=\"Previous\"><\/span><\/p>\n<p><span class=\"smaller blue\">1 of 7<\/span><\/p>\n<p><span class=\"smaller blue\"><a href=\"https:\/\/www.darkreading.com\/risk\/6-ways-airlines-and-hotels-can-keep-their-networks-secure--------------------\/d\/d-id\/1335620?image_number=2\" title=\"Next\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-black-right.png\" alt=\"Next\"><\/a><\/span><\/div>\n<\/div>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/risk\/6-ways-airlines-and-hotels-can-keep-their-networks-secure--------------------\/d\/d-id\/1335620?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As recent news can attest, travel and hospitality companies are prime targets for cybercriminals. Here are six privacy and security tips that can help lock down privacy and security. Read More <a href=\"https:\/\/www.darkreading.com\/risk\/6-ways-airlines-and-hotels-can-keep-their-networks-secure--------------------\/d\/d-id\/1335620?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-28809","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Ways Airlines and Hotels Can Keep Their Networks Secure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ways Airlines and Hotels Can Keep Their Networks Secure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-27T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"6 Ways Airlines and Hotels Can Keep Their Networks Secure\",\"datePublished\":\"2019-08-27T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\"},\"wordCount\":311,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\",\"name\":\"6 Ways Airlines and Hotels Can Keep Their Networks Secure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"datePublished\":\"2019-08-27T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage\",\"url\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"contentUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Ways Airlines and Hotels Can Keep Their Networks Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Ways Airlines and Hotels Can Keep Their Networks Secure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/","og_locale":"en_US","og_type":"article","og_title":"6 Ways Airlines and Hotels Can Keep Their Networks Secure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-27T14:00:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"6 Ways Airlines and Hotels Can Keep Their Networks Secure","datePublished":"2019-08-27T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/"},"wordCount":311,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/","url":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/","name":"6 Ways Airlines and Hotels Can Keep Their Networks Secure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","datePublished":"2019-08-27T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#primaryimage","url":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","contentUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/6-ways-airlines-and-hotels-can-keep-their-networks-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"6 Ways Airlines and Hotels Can Keep Their Networks Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28809"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28809\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}