{"id":3219,"date":"2018-06-16T10:30:41","date_gmt":"2018-06-16T10:30:41","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/"},"modified":"2018-06-16T10:30:41","modified_gmt":"2018-06-16T10:30:41","slug":"scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/","title":{"rendered":"Scammers ahoy! International police operation harpoons 74 email whaling suspects"},"content":{"rendered":"<p>Police have carried out a worldwide wave of arrests that have seen 74 people detained and over $16m in purloined funds seized by suspected whalers, or business email compromise (BEC) fraudsters.<\/p>\n<p>Over the past few years the FBI has been targeting BEC fraud, a social-engineering scam to convince companies and individuals to change the wiring address for invoices and contracts, redirecting the money to a criminal&#8217;s bank account. Such scams have <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/05\/05\/email_scammers_hit_businesses_5bn\/\">netted over $5bn<\/a> in the last five years and the reported incidents are still increasing.<\/p>\n<p>Or maybe not so much after today. The swoop, part of the FBI&#8217;s <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.fbi.gov\/news\/stories\/international-bec-takedown-061118\">Operation WireWire<\/a>, saw 42 people arrested in the US, 29 in Nigeria and three in Canada, Mauritius and Poland. In addition, $2.4m in funds were seized and police were able to recover an extra $14m from fraudulent wire transfers.<\/p>\n<p>&#8220;Fraudsters can rob people of their life&#8217;s savings in a matter of minutes,&#8221; <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.justice.gov\/opa\/pr\/74-arrested-coordinated-international-enforcement-operation-targeting-hundreds-individuals\">said<\/a> US Attorney General Jeff Sessions. &#8220;These are malicious and morally repugnant crimes. We will continue to go on offense against fraudsters so that the American people can have safety and peace of mind.&#8221;<\/p>\n<p>Among those arrested were accused money mules, who funnel funds around the world in exchange for a cut of the proceeds, and what the FBI describes as members of &#8220;international criminal organizations,&#8221; that have targeted US businesses. High net-worth individuals, the elderly and home owners were also targeted.<\/p>\n<p>The rewards for criminals can be immense. In 2016 the city of El Paso, Texas, was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/11\/04\/el_paso_loses_32m_to_email_scammers\/\">forced to admit<\/a> it had lost $3.2m of city funds to a BEC scam, after bogus invoices were filed for work done on a $97m streetcar project in its downtown district. Just over half the funds were later recovered, but the city still lost hundreds of thousands of dollars.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/05\/05\/accounting_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"accounting\"\/><\/p>\n<h2 title=\"Gawd, and we thought El Reg hacks' martini expense claims were bad\">Fake invoice scammers slurp $5bn+ from corp beancounters \u2013 FBI<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2017\/05\/05\/email_scammers_hit_businesses_5bn\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>\u201cThis operation demonstrates the FBI\u2019s commitment to disrupt and dismantle criminal enterprises that target American citizens and their businesses,\u201d said FBI Director Christopher Wray.<\/p>\n<p>\u201cWe will continue to work together with our law enforcement partners around the world to end these fraud schemes and protect the hard-earned assets of our citizens. The public we serve deserves nothing less.\u201d<\/p>\n<p>While the arrests won&#8217;t stop BEC scammers, the arrests do look like a major win. It remains to be seen how many of the arrests were of the instigators of any fraud rather than money mules who just handle the cash and who are thus relatively easy pickings. But it does look as though law enforcement is at last getting to grips with the issue. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/11\/fbi_fraud_arrests\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Major win against business email compromise losses Police have carried out a worldwide wave of arrests that have seen 74 people detained and over $16m in purloined funds seized by suspected whalers, or business email compromise (BEC) fraudsters.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3220,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-3219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Scammers ahoy! International police operation harpoons 74 email whaling suspects 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scammers ahoy! International police operation harpoons 74 email whaling suspects 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-16T10:30:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Scammers ahoy! International police operation harpoons 74 email whaling suspects\",\"datePublished\":\"2018-06-16T10:30:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/\"},\"wordCount\":455,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/\",\"name\":\"Scammers ahoy! International police operation harpoons 74 email whaling suspects 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg\",\"datePublished\":\"2018-06-16T10:30:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Scammers ahoy! International police operation harpoons 74 email whaling suspects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scammers ahoy! International police operation harpoons 74 email whaling suspects 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/","og_locale":"en_US","og_type":"article","og_title":"Scammers ahoy! International police operation harpoons 74 email whaling suspects 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-16T10:30:41+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Scammers ahoy! International police operation harpoons 74 email whaling suspects","datePublished":"2018-06-16T10:30:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/"},"wordCount":455,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/","url":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/","name":"Scammers ahoy! International police operation harpoons 74 email whaling suspects 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg","datePublished":"2018-06-16T10:30:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/scammers-ahoy-international-police-operation-harpoons-74-email-whaling-suspects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Scammers ahoy! International police operation harpoons 74 email whaling suspects"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3219"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3220"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}