{"id":29475,"date":"2019-10-04T04:59:11","date_gmt":"2019-10-04T04:59:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/"},"modified":"2019-10-04T04:59:11","modified_gmt":"2019-10-04T04:59:11","slug":"egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/","title":{"rendered":"Egyptian government caught tracking opponents and activists through phone apps"},"content":{"rendered":"<p>The Egyptian government has been targeting and tracking citizens in a sophisticated spying program that allows it to read emails, log contacts and record their location, according to a <a target=\"_blank\" href=\"https:\/\/research.checkpoint.com\/the-eye-on-the-nile\/\" rel=\"noopener noreferrer\">new report<\/a> by Check Point.<\/p>\n<p>A wide range of Egyptian citizens, ranging from journalists to politicians, activists and lawyers, have been targeted in the program, the security organization claims, with most of the spying done through apps downloaded onto their smartphones.<\/p>\n<p>Check Point has identified 33 individuals that were specifically targeted and encouraged to download apps that offered useful services but whose real intent was to bug the phone.<\/p>\n<p>Secure Mail was a Gmail add-on that promised greater security but which prodded users to provide their password, which was then used to compromise their accounts. Another, iLoud200%, offered a smart storage solution that would free up storage space on your phone but which bypassed privacy settings and sent location details to outside servers. Another app, IndexY, offered a callerID service but stored and transmitted call logs.<\/p>\n<p>These apps were available through the official Google Play store, giving victims a degree of confidence that they were legitimate but also demonstrating that the apps are sufficiently sophisticated to get past Google\u2019s security review. Each app was also designed and promoted to minimize uncertainty: it would make sense for a Caller ID app, for example, to have access to call logs and contacts.<\/p>\n<p>The data that was pulled off the devices was sent to a range of domain names that included names like \u201csecure\u201d and \u201cverify\u201d as a way of masking their true identity, but Check Point was able to draw connections between the domains, IP addresses and their administration.<\/p>\n<h3 class=\"crosshead\"><span>Directory<\/span><\/h3>\n<p>Those behind the system screwed up on one of the domains &#8211; maillogin.live &#8211; and left its directory accessible online, which the researchers downloaded and reviewed, giving more details over how the spying operation was being conducted.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/11\/28\/china_hacker.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"china hacker\"><\/p>\n<h2 title=\"China is 'remaking the world in its techno-dystopian image'\">Great. Global internet freedoms take another dive as censorship and fake news proliferate<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/11\/02\/internet_freedom_report_2018\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The researchers believe that may also have uncovered a secure messaging channel on Telegram that advertised itself as supporting protestors of the current Egyptian military administration but is likely under the control of the intelligence services.<\/p>\n<p>Check Point was unable to find definitive proof that it was the Egyptian intelligence services behind the operation but considering those targeted, the clear intent and purpose of the apps, the structure and data downloaded and a number of clues &#8211; such as a server registered to the government\u2019s IT ministry and a hardcoded location that corresponds to the HQ of Egypt\u2019s main spy agency &#8211; it is almost certain that it was a government-sponsored activity.<\/p>\n<p>\u201cWe discovered a list of victims that included handpicked political and social activists, high-profile journalists and members of non-profit organizations in Egypt,\u201d the company wrote in a <a target=\"_blank\" href=\"https:\/\/research.checkpoint.com\/the-eye-on-the-nile\/\" rel=\"noopener noreferrer\">lengthy post<\/a> outlining its findings. \u201cThe information we gathered from our investigation suggested that the perpetrators are Arabic speakers, and well familiar with the Egyptian ecosystem. Because the attack might be government-backed, it means that we are looking at what might be a surveillance operation of a country against its own citizens or of another government that screens some other attack using this noisy one.\u201d<\/p>\n<p>In recent months, ongoing tensions within Egypt have grown and the government has arrested a number of prominent opposition leaders in response to growing anti-government protests. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7801\/your-guide-to-becoming-truly-data-driven-with-unrivalled-data-analytics-performance?td=wptl1858\">Your Guide to Becoming Truly Data-Driven with Unrivalled Data Analytics Performance<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/04\/egypt_smartphone_spying\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intelligence services developed system, says security outfit The Egyptian government has been targeting and tracking citizens in a sophisticated spying program that allows it to read emails, log contacts and record their location, according to a new report by Check Point.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29476,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Egyptian government caught tracking opponents and activists through phone apps 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Egyptian government caught tracking opponents and activists through phone apps 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-04T04:59:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Egyptian government caught tracking opponents and activists through phone apps\",\"datePublished\":\"2019-10-04T04:59:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/\"},\"wordCount\":587,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/\",\"name\":\"Egyptian government caught tracking opponents and activists through phone apps 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg\",\"datePublished\":\"2019-10-04T04:59:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Egyptian government caught tracking opponents and activists through phone apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Egyptian government caught tracking opponents and activists through phone apps 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/","og_locale":"en_US","og_type":"article","og_title":"Egyptian government caught tracking opponents and activists through phone apps 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-04T04:59:11+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Egyptian government caught tracking opponents and activists through phone apps","datePublished":"2019-10-04T04:59:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/"},"wordCount":587,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/","url":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/","name":"Egyptian government caught tracking opponents and activists through phone apps 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg","datePublished":"2019-10-04T04:59:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/egyptian-government-caught-tracking-opponents-and-activists-through-phone-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Egyptian government caught tracking opponents and activists through phone apps"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29475"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29476"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}