{"id":38243,"date":"2020-11-17T15:09:41","date_gmt":"2020-11-17T15:09:41","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31767\/Mudge-Has-Been-Named-Twitters-Security-Chief.html"},"modified":"2020-11-17T15:09:41","modified_gmt":"2020-11-17T15:09:41","slug":"mudge-has-been-named-twitters-security-chief","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/","title":{"rendered":"Mudge Has Been Named Twitter&#8217;s Security Chief"},"content":{"rendered":"<p>Twitter has hired legendary hacker <a target=\"_blank\" href=\"https:\/\/twitter.com\/dotmudge\" rel=\"noopener noreferrer\">Peiter &#8220;Mudge&#8221; Zatko<\/a> as head of security.<\/p>\n<p>Under the newly created role, Mudge will take responsibility for everything from incident response to ensuring the &#8220;integrity&#8221; of the platform. <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.cnbc.com\/2020\/11\/16\/twitter-names-famed-hacker-mudge-as-head-of-security.html\">Speaking to CNBC<\/a>, he described his remit as including &#8220;information security, site integrity, physical security, platform integrity \u2013 which starts to touch on abuse and manipulation of the platform \u2013 and engineering.&#8221;<\/p>\n<p>Mudge will report directly to CEO Jack Dorsey, who also heads payments biz Square, and will take over the helm after a 45-to-60-day review.<\/p>\n<p>The hire comes mere months <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/07\/17\/twitter_blue_tick_hack_latest\/\" rel=\"noopener noreferrer\">after a major security incident<\/a> in which unauthorised third parties accessed the Twitter accounts of 130 celebrities including Elon Musk, Bill Gates, former US president Barack Obama, and current President-elect Joe Biden.<\/p>\n<p>The hackers used the accounts to promote a Bitcoin scam that asked members of the public to send cryptocurrency to a specific wallet in order to receive double the amount back. The coordinated nature of the attack forced the microblogging site to temporarily suspend &#8220;verified&#8221; accounts belonging to public figures.<\/p>\n<p>Twitter has since confirmed that the culprits were able to access the site&#8217;s internal account management tools following a successful social-engineering attack.<\/p>\n<div class=\"CaptionedImage Border Center\" readability=\"9\"><a href=\"https:\/\/regmedia.co.uk\/2018\/06\/14\/l0pht_white_house_1998.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/06\/14\/l0pht_white_house_1998.jpg?x=648&amp;y=348&amp;infer_y=1\" alt=\"Mr L0pht goes to Washington [source: Chris Wysopal]\" title=\"L0pht in the White House press room 1998\" height=\"348\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">L0pht in the White House press room, 1998, Mudge right of centre (Photo \u00a9 via Chris Wysopal)<\/p>\n<\/div>\n<p>Mudge is known for his affiliations with hacker collectives L0pht, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2018\/06\/18\/l0pht_chris_wysopal_interview\/\" rel=\"noopener noreferrer\">which appeared before Congress in 1998<\/a> on the subject of &#8220;Weak Computer Security in Government&#8221;, and The Cult of the Dead Cow, which previously included one-time US presidential candidate Beto O&#8217;Rourke as a member.<\/p>\n<p>One of his earliest accomplishments was the creation of L0phtcrack, an iconic tool for cracking Windows passwords that exposed inadequacies in early Windows security. This was <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2005\/11\/25\/symantec_l0phtcrack_export_controversy\/\" rel=\"noopener noreferrer\">subsequently acquired by Symantec<\/a> before returning to its <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2009\/05\/27\/l0phtcrack_returns\/\" rel=\"noopener noreferrer\">original ownership in 2009<\/a>. It has since switched hands again, this time to password security startup Terahack.<\/p>\n<p>In later life, Mudge transitioned from the anarchic hacker scene of the early 1990s to the more formal world of industry and government, with stints at BBN Technologies, Google (via its Motorola Mobility subsidiary), and DARPA, where he was responsible for the creation of at least three Department of Defense cybersecurity programmes. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31767\/Mudge-Has-Been-Named-Twitters-Security-Chief.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38244,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8445],"class_list":["post-38243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackertwitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mudge Has Been Named Twitter&#039;s Security Chief 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mudge Has Been Named Twitter&#039;s Security Chief 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T15:09:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/mudge-has-been-named-twitters-security-chief.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mudge Has Been Named Twitter&#8217;s Security Chief\",\"datePublished\":\"2020-11-17T15:09:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/\"},\"wordCount\":372,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/mudge-has-been-named-twitters-security-chief.jpg\",\"keywords\":[\"headline,hacker,twitter\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/\",\"name\":\"Mudge Has Been Named Twitter's Security Chief 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/mudge-has-been-named-twitters-security-chief.jpg\",\"datePublished\":\"2020-11-17T15:09:41+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/mudge-has-been-named-twitters-security-chief.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/mudge-has-been-named-twitters-security-chief.jpg\",\"width\":\"648\",\"height\":\"348\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-has-been-named-twitters-security-chief\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,twitter\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackertwitter\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mudge Has Been Named Twitter&#8217;s Security Chief\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mudge Has Been Named Twitter's Security Chief 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/","og_locale":"en_US","og_type":"article","og_title":"Mudge Has Been Named Twitter's Security Chief 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-17T15:09:41+00:00","og_image":[{"width":648,"height":348,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/mudge-has-been-named-twitters-security-chief.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mudge Has Been Named Twitter&#8217;s Security Chief","datePublished":"2020-11-17T15:09:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/"},"wordCount":372,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/mudge-has-been-named-twitters-security-chief.jpg","keywords":["headline,hacker,twitter"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/","url":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/","name":"Mudge Has Been Named Twitter's Security Chief 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/mudge-has-been-named-twitters-security-chief.jpg","datePublished":"2020-11-17T15:09:41+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/mudge-has-been-named-twitters-security-chief.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/mudge-has-been-named-twitters-security-chief.jpg","width":"648","height":"348"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mudge-has-been-named-twitters-security-chief\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,twitter","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackertwitter\/"},{"@type":"ListItem","position":3,"name":"Mudge Has Been Named Twitter&#8217;s Security Chief"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38243"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38244"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}