{"id":32691,"date":"2020-01-09T14:57:13","date_gmt":"2020-01-09T14:57:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30830\/Amazon-Fires-Four-Employees-For-Abusing-Ring-Access.html"},"modified":"2020-01-09T14:57:13","modified_gmt":"2020-01-09T14:57:13","slug":"amazon-fires-four-employees-for-abusing-ring-access","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/","title":{"rendered":"Amazon Fires Four Employees For Abusing Ring Access"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/01\/09\/10f0e106-e381-48a1-a215-fc8ac264fb6e\/thumbnail\/770x578\/7b0dc366e5e11b090759d021f99767b7\/ring-door-view-cam-261.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Amazon has revealed that it fired four employees over the past four years for improperly accessing video data from users&#8217; Ring security door bells.&nbsp;<\/p>\n<p>The company has detailed the sackings in its response to questions from five Democratic senators in a November letter to Amazon following the <a href=\"https:\/\/www.zdnet.com\/article\/amazon-fixes-ring-video-doorbell-wi-fi-security-vulnerability\/\">disclosure of Wi-Fi security flaws in Ring devices a month earlier<\/a>.&nbsp;<\/p>\n<p>Ring has faced several controversies over privacy and security in recent months. Reports last year suggested that Ring workers in Ukraine could view users&#8217; videos without their knowledge. And in <a href=\"https:\/\/www.zdnet.com\/article\/hackers-keep-dumping-ring-credentials-online-for-the-giggles\/\">December hackers dumped thousands of Ring user credentials online<\/a>.&nbsp;<\/p>\n<p><strong>SEE:<\/strong> <a href=\"http:\/\/www.zdnet.com\/topic\/digital-transformation-a-cxos-guide\/\"><strong>Digital transformation: A CXO&#8217;s guide<\/strong><\/a> <strong>(ZDNet special report) |<\/strong> <a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/digital-transformation-a-cxo-s-guide\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong>Download the report as a PDF<\/strong><\/a> <strong>(TechRepublic)<\/strong><\/p>\n<p>Ring security was again in the spotlight last month after someone used compromised login credentials to remotely access a Ring device and shout obscenities at an eight-year-old girl in Mississippi.&nbsp;<\/p>\n<p>Privacy advocates have also criticized Ring for its partnerships with dozens of US police departments in which citizens are offered free door bells in exchange for agreeing to provide video footage as part of a public-safety and surveillance program.&nbsp; &nbsp;<\/p>\n<p>On top of these issues, Ring has been criticized for not requiring users to enable two-factor authentication and failing to alert users when a new device connects to an account.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The five senators questioned Ring about its video data retention and deletion practices, account security measures, and employee access to stored data.&nbsp;<\/p>\n<p>Ring sent its response to the senators on Monday as it <a href=\"https:\/\/www.zdnet.com\/article\/ces-2020-ring-will-add-privacy-and-security-control-center-to-mobile-app-this-month-adds-new-hardware-to-its-lineup\/\">unveiled new a privacy and security Control Center in its mobile app<\/a>, allowing users to manage connected devices, third-party service connections, and opt out of receiving video requests from local police departments. The company now also requires two-factor authentication but only for new products.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.cnet.com\/news\/senator-criticizes-rings-new-security-measures-calls-for-company-to-go-further\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">According to ZDNet sister site CNET<\/a>, Ring told the senators that it had also started notifying people when new devices access their account and when passwords have been compromised.<\/p>\n<p><strong>SEE:<\/strong> <a href=\"https:\/\/www.zdnet.com\/product\/ring-smart-lighting-bridge\/\"><strong>Ring Smart Lighting review: Convenient and affordable home security products<\/strong><\/a><\/p>\n<p>US senator Ron Wyden was not impressed that Ring is only enabling two-factor authentication for new devices.&nbsp;<\/p>\n<p>&#8220;Requiring two-factor for new accounts is a step in the right direction, but there are millions of consumers who already have a Ring camera in their homes who remain needlessly vulnerable to hackers,&#8221; Wyden said.&nbsp;<\/p>\n<p>&#8220;Amazon needs to go further \u2013 by protecting all Ring devices with two-factor authentication.&#8221;<\/p>\n<p>Ring instead is leaving it up to existing customers to decide whether to enable two-factor authentication. Ring CEO Jamie Siminoff <a href=\"https:\/\/www.cnet.com\/news\/ring-ceo-on-security-lapses-seeing-that-made-me-cry\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">told CNET<\/a> that enabling the additional security measure requires that users be logged out and that the company didn&#8217;t want to force logouts.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30830\/Amazon-Fires-Four-Employees-For-Abusing-Ring-Access.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32692,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8376],"class_list":["post-32691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyamazon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Amazon Fires Four Employees For Abusing Ring Access 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amazon Fires Four Employees For Abusing Ring Access 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-09T14:57:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/amazon-fires-four-employees-for-abusing-ring-access.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Amazon Fires Four Employees For Abusing Ring Access\",\"datePublished\":\"2020-01-09T14:57:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/amazon-fires-four-employees-for-abusing-ring-access.jpg\",\"keywords\":[\"headline,privacy,amazon\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/\",\"name\":\"Amazon Fires Four Employees For Abusing Ring Access 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/amazon-fires-four-employees-for-abusing-ring-access.jpg\",\"datePublished\":\"2020-01-09T14:57:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/amazon-fires-four-employees-for-abusing-ring-access.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/amazon-fires-four-employees-for-abusing-ring-access.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/amazon-fires-four-employees-for-abusing-ring-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,amazon\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyamazon\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Amazon Fires Four Employees For Abusing Ring Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amazon Fires Four Employees For Abusing Ring Access 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/","og_locale":"en_US","og_type":"article","og_title":"Amazon Fires Four Employees For Abusing Ring Access 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-09T14:57:13+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/amazon-fires-four-employees-for-abusing-ring-access.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Amazon Fires Four Employees For Abusing Ring Access","datePublished":"2020-01-09T14:57:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/"},"wordCount":462,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/amazon-fires-four-employees-for-abusing-ring-access.jpg","keywords":["headline,privacy,amazon"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/","url":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/","name":"Amazon Fires Four Employees For Abusing Ring Access 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/amazon-fires-four-employees-for-abusing-ring-access.jpg","datePublished":"2020-01-09T14:57:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/amazon-fires-four-employees-for-abusing-ring-access.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/amazon-fires-four-employees-for-abusing-ring-access.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/amazon-fires-four-employees-for-abusing-ring-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,amazon","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyamazon\/"},{"@type":"ListItem","position":3,"name":"Amazon Fires Four Employees For Abusing Ring Access"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32691"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32692"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}