{"id":293,"date":"2018-05-08T13:59:39","date_gmt":"2018-05-08T13:59:39","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/28938\/Equifax-Reveals-Full-Horror-Of-That-Monstrous-Cyber-Heist-Of-Its-Servers.html"},"modified":"2018-05-08T13:59:39","modified_gmt":"2018-05-08T13:59:39","slug":"equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/","title":{"rendered":"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers"},"content":{"rendered":"<p>Equifax has published yet more details on the personal records and sensitive information stolen by miscreants after they hacked its databases in 2017.<\/p>\n<p>The good news: the number of individuals affected by the network intrusion hasn&#8217;t increased from the 146.6 million Equifax previously announced, but extra types of records accessed by the hackers have turned up in Mandiant&#8217;s ongoing audit of the security breach.<\/p>\n<p>In February, in response to questions from US Senator Elizabeth Warren (D-MA), Equifax <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/02\/13\/equifax_security_breach_bad\/\">agreed<\/a> that card expiry dates and tax IDs could have been among the siphoned data, but it hadn&#8217;t yet worked out how many people were affected.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/03\/09\/doh_image_via_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Doh image via Shutterstock\"\/><\/p>\n<h2 title=\"Pwned credit-score biz quietly admits more info lost\">Equifax hack worse than previously thought: Biz kissed goodbye to card expiry dates, tax IDs etc<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/02\/13\/equifax_security_breach_bad\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Late last week, the company gave the numbers in letters to the various US congressional committees investigating the network infiltration, and on Monday, it <a target=\"_blank\" href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/33185\/000119312518154706\/0001193125-18-154706-index.htm\">submitted a letter<\/a> to the SEC, corporate America&#8217;s financial watchdog.<\/p>\n<p>As well as the \u2013 take a breath \u2013 146.6 million names, 146.6 million dates of birth, 145.5 million social security numbers, 99 million address information and 209,000 payment cards (number and expiry date) exposed, the company said there were also 38,000 American drivers&#8217; licenses and 3,200 passport details lifted, too.<\/p>\n<p>The further details emerged after Mandiant&#8217;s investigators helped \u201cstandardise certain data elements for further analysis to determine the consumers whose personally identifiable information was stolen.\u201d<\/p>\n<p>The extra data elements, the company said, didn&#8217;t involve any individuals not already known to be part of the super-hack, so no additional consumer notifications are required.<\/p>\n<p>The cyber-break-in occurred because Equifax ran an unpatched and therefore insecure version of Apache Struts, something it <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/10\/04\/sole_security_worker_at_fault_for_equifax_fail_says_former_ceo\/\">blamed<\/a> on a single employee.<\/p>\n<p>At February&#8217;s RSA conference in San Francisco, Derek Weeks of Sonatype claimed \u201cthousands\u201d of companies continued to download vulnerable versions of Struts (video below). \u00ae<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=IvcTAOdWnQg\" data-media=\"x-videoplayer\">Youtube Video<\/a><\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>Read More <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/28938\/Equifax-Reveals-Full-Horror-Of-That-Monstrous-Cyber-Heist-Of-Its-Servers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read More HERE&#8230;<\/p>\n","protected":false},"author":1,"featured_media":294,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[169],"class_list":["post-293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerprivacydata-lossfraudidentity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-08T13:59:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@thadmin\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/\"},\"author\":{\"name\":\"thadmin\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\"},\"headline\":\"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers\",\"datePublished\":\"2018-05-08T13:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/\"},\"wordCount\":326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg\",\"keywords\":[\"headline,hacker,privacy,data loss,fraud,identity theft\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/\",\"name\":\"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg\",\"datePublished\":\"2018-05-08T13:59:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,data loss,fraud,identity theft\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacydata-lossfraudidentity-theft\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\",\"name\":\"thadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"caption\":\"thadmin\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thadmin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/","og_locale":"en_US","og_type":"article","og_title":"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-08T13:59:39+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg","type":"image\/jpeg"}],"author":"thadmin","twitter_card":"summary_large_image","twitter_creator":"@thadmin","twitter_site":"@threatshub","twitter_misc":{"Written by":"thadmin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/"},"author":{"name":"thadmin","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66"},"headline":"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers","datePublished":"2018-05-08T13:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/"},"wordCount":326,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg","keywords":["headline,hacker,privacy,data loss,fraud,identity theft"],"articleSection":["Packet Storm"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/","url":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/","name":"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg","datePublished":"2018-05-08T13:59:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/equifax-reveals-full-horror-of-that-monstrous-cyber-heist-of-its-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,data loss,fraud,identity theft","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-lossfraudidentity-theft\/"},{"@type":"ListItem","position":3,"name":"Equifax Reveals Full Horror Of That Monstrous Cyber-Heist Of Its Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66","name":"thadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","caption":"thadmin"},"sameAs":["https:\/\/x.com\/thadmin"]}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/294"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}