{"id":39549,"date":"2021-02-11T17:45:00","date_gmt":"2021-02-11T17:45:00","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/7-things-we-know-so-far-about-the-solarwinds-attacks\/d\/d-id\/1340134"},"modified":"2021-02-11T17:45:00","modified_gmt":"2021-02-11T17:45:00","slug":"7-things-we-know-so-far-about-the-solarwinds-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/","title":{"rendered":"7 Things We Know So Far About the SolarWinds Attacks"},"content":{"rendered":"<header><\/header>\n<p><span class=\"strong black\">Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign.<\/span><\/p>\n<div>\n<div><span class=\"smaller blue\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" alt=\"Previous\"><\/p>\n<p>1 of 8<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/7-things-we-know-so-far-about-the-solarwinds-attacks\/d\/d-id\/1340134?image_number=2\" title=\"Next\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-black-right.png\" alt=\"Next\"><\/a><\/span><\/div>\n<\/div>\n<p>Nearly two months after news surfaced about software updates from SolarWinds being used to distribute a backdoor Trojan called Sunburst\/Solorigate to some 18,000 organizations worldwide, troubling questions remain about the scope and impact of the breach.<\/p>\n<p>The campaign, which the US government and others have described as a <a href=\"https:\/\/www.darkreading.com\/risk\/fbi-cisa-nsa-and-odni-cite-russia-in-joint-statement-on-serious-solarwinds-attacks\/d\/d-id\/1339829\" target=\"_blank\" rel=\"noopener noreferrer\">highly sophisticated espionage operation<\/a> by a Russia-backed group, has raised broad fears of sensitive data being stolen from several US government agencies and large companies.<\/p>\n<p>In addition, there are considerable fears that the attackers may have gained deep, persistent, and almost undetectable access on networks belonging to numerous organizations in sectors including manufacturing, industrial, construction, and logistics. Some believe it will take months for victims to ensure they have truly eradicated the threat from their networks.<\/p>\n<p>The incident has resurfaced old concerns over supply chain vulnerabilities and some new ones over the ability of even the best security tools and controls to detect highly targeted attacks. The fact that some of the campaign&#8217;s victims include top technology firms such as <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/microsoft-confirms-its-network-was-breached-with-tainted-solarwinds-updates\/d\/d-id\/1339769\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> and security vendors like <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/nation-state-hackers-breached-fireeye-stole-its-red-team-tools\/d\/d-id\/1339652\" target=\"_blank\" rel=\"noopener noreferrer\">FireEye<\/a> has not helped.<\/p>\n<p>On Tuesday, concerns over the breach prompted members of the US Senate Intelligence Committee to send a <a href=\"https:\/\/www.rubio.senate.gov\/public\/_cache\/files\/6343aa03-2d75-415e-a23d-ac5f55898edc\/5C215EA0B7E90E1D51F736DABF05E9AF.hainesnakasonewraywales-ssci-09feb21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">letter<\/a> to leaders of the intelligence community asking for a more coordinated response at the federal level. The letter, signed by Sens. Mark Werner (D-Va.) and Marco Rubio (R-Fla.), expressed concern over the &#8220;disjointed and disorganized&#8221; US response to the incident so far and called for the appointment of a &#8220;clear leader&#8221; to head the effort going forward.<\/p>\n<p>&#8220;The threat our country still faces from this incident needs clear leadership to develop and guide a unified strategy for recovery,&#8221; the two lawmakers wrote, noting the fact that numerous federal agencies and thousands of private-sector entities had been impacted.<\/p>\n<p>Here is a recap of what is known \u2014 and unknown \u2014 about the campaign to date.<\/p>\n<p><span class=\"italic\">Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1912\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<div>\n<div><span class=\"smaller blue\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" alt=\"Previous\"><\/p>\n<p>1 of 8<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/7-things-we-know-so-far-about-the-solarwinds-attacks\/d\/d-id\/1340134?image_number=2\" title=\"Next\"><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-black-right.png\" alt=\"Next\"><\/a><\/span><\/div>\n<\/div>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/7-things-we-know-so-far-about-the-solarwinds-attacks\/d\/d-id\/1340134?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two months after the news first broke, many questions remain about the sophisticated cyber-espionage campaign. Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/7-things-we-know-so-far-about-the-solarwinds-attacks\/d\/d-id\/1340134?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-39549","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Things We Know So Far About the SolarWinds Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Things We Know So Far About the SolarWinds Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-11T17:45:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"7 Things We Know So Far About the SolarWinds Attacks\",\"datePublished\":\"2021-02-11T17:45:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\",\"name\":\"7 Things We Know So Far About the SolarWinds Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"datePublished\":\"2021-02-11T17:45:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage\",\"url\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\",\"contentUrl\":\"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Things We Know So Far About the SolarWinds Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Things We Know So Far About the SolarWinds Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/","og_locale":"en_US","og_type":"article","og_title":"7 Things We Know So Far About the SolarWinds Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-11T17:45:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"7 Things We Know So Far About the SolarWinds Attacks","datePublished":"2021-02-11T17:45:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/","name":"7 Things We Know So Far About the SolarWinds Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","datePublished":"2021-02-11T17:45:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#primaryimage","url":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png","contentUrl":"https:\/\/img.deusm.com\/informationweek\/slideshow-arrow-gray-left.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/7-things-we-know-so-far-about-the-solarwinds-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Things We Know So Far About the SolarWinds Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39549"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39549\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}