{"id":33490,"date":"2020-02-24T13:20:11","date_gmt":"2020-02-24T13:20:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/"},"modified":"2020-02-24T13:20:11","modified_gmt":"2020-02-24T13:20:11","slug":"samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/","title":{"rendered":"Samsung cops to data breach after unsolicited &#8216;1\/1&#8217; Find my Mobile push notification"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/03\/03\/samsung_galaxy_note_edge_3.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Samsung has admitted that what it calls a &#8220;small number&#8221; of users could indeed read other people&#8217;s personal data following last week&#8217;s unexplained Find my Mobile notification.<\/p>\n<p>Several <em>Register<\/em> readers wrote in to tell us that, after last Thursday&#8217;s <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/02\/21\/samsung_find_my_phone_notification_questions\/\" rel=\"noopener noreferrer\">mystery push notification<\/a>, they found strangers&#8217; personal data displayed to them.<\/p>\n<p>Many readers, assuming Samsung had been hacked, logged into its website to change their passwords. Now the company has admitted that a data breach did occur.<\/p>\n<p>A spokeswoman told <em>The Register<\/em>: &#8220;A technical error resulted in a small number of users being able to access the details of another user. As soon as we became of aware of the incident, we removed the ability to log in to the store on our website until the issue was fixed.&#8221;<\/p>\n<p>She added: &#8220;We will be contacting those affected by the issue with further details.&#8221;<\/p>\n<p>From the not-insignificant number of emails <em>El Reg<\/em> received about the website snafu, it remains to be seen whether Samsung&#8217;s definition of &#8220;small number&#8221; is the same as that of the rest of the world.<\/p>\n<p>Of potentially greater concern is the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/02\/20\/samsung_push_notification_1_1_personal_data\/\" rel=\"noopener noreferrer\">mystery 1\/1 push notification<\/a> from Find my Mobile, a baked-in app on stock Samsung Android distributions. Although the firm brushed off the worldwide notification as something to do with unspecified internal testing, many of those who wrote to <em>El Reg<\/em> said they had disabled the app. Stock apps cannot be uninstalled unless one effectively wipes the phone and installs a new operating system \u2013 unlocking the bootloader and reformatting with a new third-party, customised ROM.<\/p>\n<p>Samsung did not answer our questions as to how a &#8220;disabled&#8221; app was able to receive and display push notifications. Nor did it say what other functions this &#8220;disabled&#8221; app was capable of executing. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/02\/24\/samsung_data_breach_find_my_mobile\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tight-lipped chaebol still won&#8217;t talk about the dodgy app, though Samsung has admitted that what it calls a &#8220;small number&#8221; of users could indeed read other people&#8217;s personal data following last week&#8217;s unexplained Find my Mobile notification.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33491,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-33490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Samsung cops to data breach after unsolicited &#039;1\/1&#039; Find my Mobile push notification 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Samsung cops to data breach after unsolicited &#039;1\/1&#039; Find my Mobile push notification 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-24T13:20:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"438\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Samsung cops to data breach after unsolicited &#8216;1\\\/1&#8217; Find my Mobile push notification\",\"datePublished\":\"2020-02-24T13:20:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/\"},\"wordCount\":319,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/\",\"name\":\"Samsung cops to data breach after unsolicited '1\\\/1' Find my Mobile push notification 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg\",\"datePublished\":\"2020-02-24T13:20:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg\",\"width\":648,\"height\":438},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Samsung cops to data breach after unsolicited &#8216;1\\\/1&#8217; Find my Mobile push notification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Samsung cops to data breach after unsolicited '1\/1' Find my Mobile push notification 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/","og_locale":"en_US","og_type":"article","og_title":"Samsung cops to data breach after unsolicited '1\/1' Find my Mobile push notification 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-02-24T13:20:11+00:00","og_image":[{"width":648,"height":438,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Samsung cops to data breach after unsolicited &#8216;1\/1&#8217; Find my Mobile push notification","datePublished":"2020-02-24T13:20:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/"},"wordCount":319,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/","url":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/","name":"Samsung cops to data breach after unsolicited '1\/1' Find my Mobile push notification 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg","datePublished":"2020-02-24T13:20:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/02\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification.jpg","width":648,"height":438},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/samsung-cops-to-data-breach-after-unsolicited-1-1-find-my-mobile-push-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Samsung cops to data breach after unsolicited &#8216;1\/1&#8217; Find my Mobile push notification"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33490"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33490\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33491"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}