{"id":38794,"date":"2020-12-17T21:06:49","date_gmt":"2020-12-17T21:06:49","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/"},"modified":"2020-12-17T21:06:49","modified_gmt":"2020-12-17T21:06:49","slug":"ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/","title":{"rendered":"Ethical power supplier People&#8217;s Energy hacked, 250,000 customers&#8217; personal info accessed"},"content":{"rendered":"<p>Renewable electricity and gas supplier People\u2019s Energy has told its 250,000-plus customers that a \u201cgap\u201d in the security of its IT system was exploited by digital burglars.<\/p>\n<p>The British company\u2019s co-founders Karin Sode and David Pike wrote to customers on Thursday morning to confirm that \u201cyesterday People\u2019s Energy was affected by a cyber security data breach.\u201d<\/p>\n<p>\u201cNo financial information, bank account details, or People\u2019s Energy online account passwords have been compromised for any domestic customers. However, some personal detailed were accessed,\u201d the email, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/peoplesenergy.co.uk\/about\/blog\/security-data-breach-advice\">mirrored<\/a> on its website, stated.<\/p>\n<p>This data included member names, home addresses, email addresses, telephone numbers, dates of birth, People\u2019s Energy account numbers, tariff details, and meter identification numbers.<\/p>\n<p>\u201cWe have identified how our systems were accessed and the gap in our security has been closed. We\u2019e also working with a dedicated security team to add further protection to our systems,\u201d the email continues.<\/p>\n<p>Unfortunately, 15 small-business customers did have financial data accessed in the database hack. Bank accounts details and sort codes were pilfered, the company <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.bbc.com\/news\/technology-55350995\">told<\/a> the BBC, but they had all been warned directly by phone.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/16\/trump.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"trump\"><\/p>\n<h2 title=\"And no, we\u2019re not going to prosecute the bloke who found out\">Dutch officials say Donald Trump really did protect his Twitter account with MAGA2020! password<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/12\/17\/trump_twitter_hacking\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The police, Brit data regulator the Information Commissioner\u2019s Office, and energy watchdog Ofgem were informed of the break-in, and the co-founders said they are following advice given.<\/p>\n<p>\u201cWe would ask you and all our members (customers) to be cautious, as it possible that someone might try to contact you with the details they have accessed,\u201d the energy biz warned.<\/p>\n<p>Potential phishing scams are the most obvious possible consequence that spring to mind.<\/p>\n<p>Founded in August 2017, People\u2019s Energy buys wholesale leccy from renewable sources, and biomethane from food and farm waste, that it then resells onto consumers.<\/p>\n<p>Pike said <a target=\"_blank\" href=\"https:\/\/bdaily.co.uk\/articles\/2020\/11\/25\/peoples-energy-reaches-a-quarter-of-a-million-customers\" rel=\"noopener noreferrer\">last month<\/a> that it had amassed more than 250,000 customers. The company is aiming to provide energy to one million homes across the UK by 2024.<\/p>\n<p>People\u2019s Energy is registered as a Community Interest Company and vowed to return <a target=\"_blank\" href=\"https:\/\/peoplesenergy.co.uk\/about\/blog\/an-update-on-our-profits-back-commitment\" rel=\"noopener noreferrer\">75 per cent of its profits<\/a> to customers, which it also refers to as members. It has not yet been able to do this. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/12\/17\/peoples_energy_hacked\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Financial info swiped for 15 small-biz clients, too Renewable electricity and gas supplier People\u2019s Energy has told its 250,000-plus customers that a \u201cgap\u201d in the security of its IT system was exploited by digital burglars.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38795,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ethical power supplier People&#039;s Energy hacked, 250,000 customers&#039; personal info accessed 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical power supplier People&#039;s Energy hacked, 250,000 customers&#039; personal info accessed 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-17T21:06:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ethical power supplier People&#8217;s Energy hacked, 250,000 customers&#8217; personal info accessed\",\"datePublished\":\"2020-12-17T21:06:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/\"},\"wordCount\":378,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/\",\"name\":\"Ethical power supplier People's Energy hacked, 250,000 customers' personal info accessed 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg\",\"datePublished\":\"2020-12-17T21:06:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethical power supplier People&#8217;s Energy hacked, 250,000 customers&#8217; personal info accessed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethical power supplier People's Energy hacked, 250,000 customers' personal info accessed 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/","og_locale":"en_US","og_type":"article","og_title":"Ethical power supplier People's Energy hacked, 250,000 customers' personal info accessed 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-17T21:06:49+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ethical power supplier People&#8217;s Energy hacked, 250,000 customers&#8217; personal info accessed","datePublished":"2020-12-17T21:06:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/"},"wordCount":378,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/","url":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/","name":"Ethical power supplier People's Energy hacked, 250,000 customers' personal info accessed 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg","datePublished":"2020-12-17T21:06:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ethical-power-supplier-peoples-energy-hacked-250000-customers-personal-info-accessed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ethical power supplier People&#8217;s Energy hacked, 250,000 customers&#8217; personal info accessed"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38794"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38794\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38795"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}