{"id":28868,"date":"2019-09-04T11:31:04","date_gmt":"2019-09-04T11:31:04","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/"},"modified":"2019-09-04T11:31:04","modified_gmt":"2019-09-04T11:31:04","slug":"red-flag-home-office-inks-45m-border-tech-extension-with-ibm","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/","title":{"rendered":"Red flag: Home Office inks \u00a345m border tech extension with IBM"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/01\/17\/uk_passport_control2_photo_via_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The Home Office has inked a \u00a345m 33-month contract extension with IBM for its creaking Semaphore border technology contract.<\/p>\n<p>The Semaphore database, which has been running since 2004, collects data from airline carriers about persons of interest and those who are on watch lists before they arrive at the border.<\/p>\n<p>It was created ahead of the troubled e-borders contract with Raytheon, which <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/03\/04\/eborders_at_least_eight_years_late_and_will_cost_more_than_1bn\/\" rel=\"noopener noreferrer\">was cancelled in 2010<\/a>. In the process the Home Office had to settle the dispute relating to the cancellation of the \u00a3750m contract: paying \u00a3150m to the supplier Raytheon and \u00a335m on legal fees.<\/p>\n<p>However, the latest extension suggests its successors, the Border Systems Programme and Digital Services at the Border, will not provide a replacement for the database for several years.<\/p>\n<p>According to the <a target=\"_blank\" href=\"https:\/\/ted.europa.eu\/udl?uri=TED:NOTICE:403311-2019:TEXT:EN:HTML&amp;src=0\" rel=\"noopener noreferrer\">tender note<\/a>, there had not been a prior publication of a call for competition because for &#8220;technical reasons, only the incumbent can deliver the service for the required term.&#8221;<\/p>\n<p>The notice said this is a &#8220;short term interim contract with flexible termination options with the incumbent supplier, whilst longer term re-procurement\/reorganisation activity is taking place to deliver the replacement systems and services.&#8221;<\/p>\n<p>A 2018 <a target=\"_blank\" href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/695321\/An_inspection_of_exit_checks.pdf\" rel=\"noopener noreferrer\">report (PDF)<\/a> from the chief inspector of borders and immigration, David Bolt, found that the processes within the Home Office are &#8220;unable to fully exploit the potential of the data it is receiving&#8221;. At that point there still seemed to be plans in motion to replace Semaphore by March 2019.<\/p>\n<p>It found the details of 600,000 foreign visitors have slipped through the cracks of the Home Office&#8217;s database thanks to its &#8220;shambolic&#8221; exit checks system.<\/p>\n<p>Between April 2014 and April 2015, as part of the Exit Checks Programme, the Home Office developed the Initial Status Analysis database, which matches inbound and outbound travel data received via Semaphore with data recorded on its other immigration related systems.<\/p>\n<p>The report recommended: &#8220;Plans for the replacement of Semaphore are revisited and firmed up and, pending its replacement, maintenance and support for Semaphore is prioritised.&#8221;<\/p>\n<p>Georgina O&#8217;Toole, analyst at TechMarketView, noted: &#8220;The IBM e-Borders programme has faced ongoing difficulties, and that was without bringing Brexit into the equation.<\/p>\n<p>&#8220;Adding the fact that the department is faced with uncertainty, and the knowledge that systems will need to cope with new rules post-Brexit, an extension like this was, arguably, inevitable.&#8221; \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/09\/04\/home_office_inks_45m_border_tech_extension_with_ibm\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After 15 years, Semaphore DB that flags up persons of interest goes into extra (Brexit) time The Home Office has inked a \u00a345m 33-month contract extension with IBM for its creaking Semaphore border technology contract.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28869,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-28868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Red flag: Home Office inks \u00a345m border tech extension with IBM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red flag: Home Office inks \u00a345m border tech extension with IBM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-04T11:31:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"423\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Red flag: Home Office inks \u00a345m border tech extension with IBM\",\"datePublished\":\"2019-09-04T11:31:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/\"},\"wordCount\":395,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/\",\"name\":\"Red flag: Home Office inks \u00a345m border tech extension with IBM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg\",\"datePublished\":\"2019-09-04T11:31:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg\",\"width\":648,\"height\":423},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Red flag: Home Office inks \u00a345m border tech extension with IBM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red flag: Home Office inks \u00a345m border tech extension with IBM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/","og_locale":"en_US","og_type":"article","og_title":"Red flag: Home Office inks \u00a345m border tech extension with IBM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-09-04T11:31:04+00:00","og_image":[{"width":648,"height":423,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Red flag: Home Office inks \u00a345m border tech extension with IBM","datePublished":"2019-09-04T11:31:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/"},"wordCount":395,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/","url":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/","name":"Red flag: Home Office inks \u00a345m border tech extension with IBM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg","datePublished":"2019-09-04T11:31:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm.jpg","width":648,"height":423},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/red-flag-home-office-inks-45m-border-tech-extension-with-ibm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Red flag: Home Office inks \u00a345m border tech extension with IBM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28868"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28869"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}