{"id":29469,"date":"2019-10-03T14:13:22","date_gmt":"2019-10-03T14:13:22","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30545\/Zendesk-Clocks-10-000-Accounts-Accessed-By-Miscreants-Prior-To-November-2016.html"},"modified":"2019-10-03T14:13:22","modified_gmt":"2019-10-03T14:13:22","slug":"zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/","title":{"rendered":"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/06\/15\/peepingtom.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Zendesk has admitted to suffering a data snafu \u2013 but while it affects 10,000 customers, it only applies to those who were using the firm&#8217;s helpdesk products before 1 November 2016.<\/p>\n<p>In an email to all its customers, seen by <em>The Register<\/em>, Zendesk coughed to the breach.<\/p>\n<p>&#8220;We recently became aware of a security matter that may have affected Zendesk Support and Chat products and customers of those products activated prior to November 1, 2016,&#8221; the firm told its customers.<\/p>\n<p>Zendesk&#8217;s main products are for companies wanting off-the-shelf customer support systems.<\/p>\n<p>Spokeswoman Erica Faltous told <em>The Reg<\/em> that Zendesk was contacted by a &#8220;third party&#8221;, triggering an internal investigation and also, she said, informing regulatory agencies.<\/p>\n<p>TLS certificates were affected. Given the time span, theoretically there could be some old TLS certs dating back to 2016 still in use thanks to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/08\/13\/site_certificate_lifetimes\/\" rel=\"noopener noreferrer\">the old three-year lifespan<\/a>, though the likely number at this stage is likely to be small.<\/p>\n<p>When we asked about these, Faltous said: &#8220;TLS certificates for a small number of customers who provided those for use in the product were exposed. An even smaller amount of these are still valid and in use, and we have reached out to customers to ensure they can revoke and replace these certificates.&#8221;<\/p>\n<p>As for the security incident itself, Zendesk reckons it hasn&#8217;t seen unauthorised use of stolen login creds just yet. Faltous said: &#8220;We have no indication at this time that authentication credentials were used in an unauthorized manner. However, customers may want to consider rotating authentication credentials used in Zendesk products prior to November 1, 2016.&#8221;<\/p>\n<p>All those with Zendesk accounts in 2016 have had their passwords expired, we understand, to include &#8220;all active agents in Support and Chat, and all end users in Support&#8221;.<\/p>\n<p>Zendesk has published a blog with <a target=\"_blank\" href=\"https:\/\/www.zendesk.com\/blog\/security-update-2019\/\" rel=\"noopener noreferrer\">more information<\/a>. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7801\/your-guide-to-becoming-truly-data-driven-with-unrivalled-data-analytics-performance?td=wptl1858\">Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30545\/Zendesk-Clocks-10-000-Accounts-Accessed-By-Miscreants-Prior-To-November-2016.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29470,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7969],"class_list":["post-29469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacydata-losscryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-03T14:13:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016\",\"datePublished\":\"2019-10-03T14:13:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/\"},\"wordCount\":319,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg\",\"keywords\":[\"headline,hacker,privacy,data loss,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/\",\"name\":\"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg\",\"datePublished\":\"2019-10-03T14:13:22+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,data loss,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacydata-losscryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/","og_locale":"en_US","og_type":"article","og_title":"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-03T14:13:22+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016","datePublished":"2019-10-03T14:13:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/"},"wordCount":319,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg","keywords":["headline,hacker,privacy,data loss,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/","url":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/","name":"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg","datePublished":"2019-10-03T14:13:22+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/zendesk-clocks-10000-accounts-accessed-by-miscreants-prior-to-november-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,data loss,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-losscryptography\/"},{"@type":"ListItem","position":3,"name":"Zendesk Clocks 10,000 Accounts Accessed By Miscreants Prior To November, 2016"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29469"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29470"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}