{"id":32211,"date":"2019-12-04T23:47:09","date_gmt":"2019-12-04T23:47:09","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30736\/OAuth-Vulnerability-Threatens-Azure-Accounts.html"},"modified":"2019-12-04T23:47:09","modified_gmt":"2019-12-04T23:47:09","slug":"oauth-vulnerability-threatens-azure-accounts","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/","title":{"rendered":"OAuth Vulnerability Threatens Azure Accounts"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"wysiwyg\">\n<p>There is a vulnerability in specific Microsoft OAuth 2.0 applications that could let an attacker gain access and control of a victim\u2019s Azure account.<\/p>\n<p>The flaw was found by Cyberark researchers who noticed that many white-listed OAuth applications, at least 54, automatically trust domains and sub-domains that are not registered by Microsoft so anyone can do so. These apps are essentially given \u201capproved\u201d status by default and can ask for an access_token.<\/p>\n<p>\u201cThe combination of these two factors makes it possible to produce an action with the user\u2019s permissions \u2013 including gaining access to Azure resources, AD resources and more,\u201d a <a href=\"https:\/\/www.cyberark.com\/threat-research-blog\/blackdirect-microsoft-azure-account-takeover\/\">Cyberark report stated<\/a><\/p>\n<p>To initiate a takeover an attacker would have to convince the target to click on a link or visit a compromised website. From here there are two paths an attacker can take to gain control.<\/p>\n<p>The link clicking method sees the creation of a crafted link for Microsoft OAuth Web flow with the vulnerable Microsoft applications; then sets the application_id to match the vulnerable OAuth application; followed by setting the redirect_uri param to the controlled white-listed domains. The attacker than changes the resource to the one he wants to get access to on behalf of the user.<\/p>\n<p>When the victim clicks on the crafted link and microsoftonline.com redirects him to the attacker\u2019s domain with the access token and the Javascript running in the domain sends API requests with the stolen access token.<\/p>\n<p>To steps involved when using a malicious website is basically the same, but with a few added steps. After setting the redirect_uri parameter to the controlled, white-listed domains the threat actor sets the resource parameter to the desired resource that he wants to get access to on behalf of the user.<\/p>\n<p>The attacker than places an iframe in a website with the src attribute set to the crafted link so when the victim browses through the ifram redirects the person to the attacker\u2019s fake website with the newly created access token. Then, as with the link method, the Javascript running in the domain sends API requests with the stolen access token.<\/p>\n<p>\u201cWhile OAuth 2.0 is an excellent solution for authorization, if misused or misconfigured, it could have a tremendous impact, allowing for over-privileged third-party applications or the eventual account takeover by malicious attackers,\u201d Cyberark said.<\/p>\n<p>The company has a free and automatic scanning tool for anyone to discover similar vulnerable applications in their Azure environment at <a href=\"https:\/\/black.direct\/\">https:\/\/black.direct\/<\/a><\/p>\n<p>Cyberark also has several recommendations to mitigate the vulnerability.<\/p>\n<ul>\n<li>Make sure that all the trusted redirect URIs configured in the application are under your ownership.<\/li>\n<li>Remove unnecessary redirect URIs.<\/li>\n<li>Make sure the permissions that the OAuth application asks for are the least privileged one it needs.<\/li>\n<li>Disable non-used applications.<\/li>\n<\/ul>\n<\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p><a href=\"https:\/\/www.scmagazine.com\/tag\/vulnerabilities\/\" class=\"button -secondary\">Vulnerabilities<\/a><\/section>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30736\/OAuth-Vulnerability-Threatens-Azure-Accounts.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[235],"class_list":["post-32211","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinemicrosoftflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OAuth Vulnerability Threatens Azure Accounts 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OAuth Vulnerability Threatens Azure Accounts 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-04T23:47:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"OAuth Vulnerability Threatens Azure Accounts\",\"datePublished\":\"2019-12-04T23:47:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/\"},\"wordCount\":469,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/07\\\/cloud_storage_thumb_426539_426540.jpg\",\"keywords\":[\"headline,microsoft,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/\",\"name\":\"OAuth Vulnerability Threatens Azure Accounts 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/07\\\/cloud_storage_thumb_426539_426540.jpg\",\"datePublished\":\"2019-12-04T23:47:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scmagazine.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/07\\\/cloud_storage_thumb_426539_426540.jpg\",\"contentUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/07\\\/cloud_storage_thumb_426539_426540.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oauth-vulnerability-threatens-azure-accounts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemicrosoftflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OAuth Vulnerability Threatens Azure Accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OAuth Vulnerability Threatens Azure Accounts 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/","og_locale":"en_US","og_type":"article","og_title":"OAuth Vulnerability Threatens Azure Accounts 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-04T23:47:09+00:00","og_image":[{"url":"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"OAuth Vulnerability Threatens Azure Accounts","datePublished":"2019-12-04T23:47:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/"},"wordCount":469,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg","keywords":["headline,microsoft,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/","url":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/","name":"OAuth Vulnerability Threatens Azure Accounts 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg","datePublished":"2019-12-04T23:47:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#primaryimage","url":"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg","contentUrl":"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/07\/cloud_storage_thumb_426539_426540.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/oauth-vulnerability-threatens-azure-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflaw\/"},{"@type":"ListItem","position":3,"name":"OAuth Vulnerability Threatens Azure Accounts"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32211"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32211\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}