{"id":39692,"date":"2021-02-22T22:50:00","date_gmt":"2021-02-22T22:50:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/d\/d-id\/1340228"},"modified":"2021-02-22T22:50:00","modified_gmt":"2021-02-22T22:50:00","slug":"cybercrime-groups-more-prolific-focus-on-healthcare-in-2020","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/","title":{"rendered":"Cybercrime Groups More Prolific, Focus on Healthcare in 2020"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header><\/header>\n<p><span class=\"strong black\">Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast.<\/span><\/p>\n<p class>While nation-state operations and espionage claimed the spotlight in 2020, nearly 80% of intrusions involving an attacker at a keyboard were related to cybercrime, security services firm CrowdStrike states in its annual &#8220;Global Threat Report.&#8221;<\/p>\n<p>In fact, cybercriminal groups have moved away from automated attacks and toward intrusions involving manual hacking and targeting large enterprises, a technique known as big-game hunting. For example, the Fin7 group \u2014 known as Carbon Spider in CrowdStrike parlance and Carbanak to some security firms \u2014 historically has compromised point-of-sale terminals and stolen payment-card data in massive breaches but now has adopted big-game hunting techniques and ransomware attacks, CrowdStrike states in the report.<\/p>\n<p>Cybercrime has become so profitable that even traditional nation-state attackers have conducted some financially motivated attacks, says Adam Meyers, CrowdStrike&#8217;s senior vice president of intelligence.<\/p>\n<p>&#8220;They are all seeing that there are dollar signs in big-game hunting and ransomware attacks,&#8221; he says. &#8220;More actors from other places getting involved in such attacks, such as Iranian threat actors who are generating revenue through ransomware.&#8221;<\/p>\n<p>CrowdStrike attributed about half of the attacks to specific actors. Of those, cybercrime \u2014 what CrowdStrike calls eCrime \u2014 made up 79%, while targeted attacks accounted for 21%. In 2019, targeted attacks accounted for significantly more \u2014 31% \u2014 of the attributed attacks.<\/p>\n<p>&#8220;It&#8217;s imperative that these adversary groups, and methods for defending against their TTPs, [garner] a great deal of attention in the coming year,&#8221; the company <a href=\"https:\/\/www.crowdstrike.com\/resources\/reports\/global-threat-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">states in the report<\/a>. &#8220;However, targeted intrusions driven by state-sponsored groups should not be neglected.&#8221;<\/p>\n<p>In <a href=\"https:\/\/www.darkreading.com\/application-security\/ransomware-makes-up-half-of-all-major-incidents\/d\/d-id\/1339667\" target=\"_blank\" rel=\"noopener noreferrer\">a previous report<\/a>, CrowdStrike analyzed the incidents it investigated on behalf of clients, finding that 63% were financially motivated, and 81% of those attacks involved ransomware.<\/p>\n<p>As part of its focus on attributable cybercrime, CrowdStrike has created an eCrime Index (ECX) to track the relative strength of adversaries focused on cybercrime. The company has not yet released the details of how it calculates the numbers, but a chart on the company&#8217;s site indicates <a href=\"https:\/\/adversary.crowdstrike.com\" target=\"_blank\" rel=\"noopener noreferrer\">an approximate eightfold increase in the index since the end of December<\/a>.<\/p>\n<p>The rise in the price of various cryptocurrencies accounts for a significant portion of the steady increase over the past two months, Meyers says.<\/p>\n<p>&#8220;The eCrime Index looks at things like ransom demands, number of ransoms, vulnerability exposures that we are tracking, cryptocurrency exchange rates \u2014 there is a whole slew of different observables that we are bundling together, and we are generating this eCrime Index and tracking it now,&#8221; he says. &#8220;It is kind of an experiment of sorts that we are opening up to the world.&#8221;<\/p>\n<p>Another trend in 2020 is the dominance of healthcare as both a target and a subject for social engineering. COVID-themed phishing became a popular way to turn users into a way into corporate networks. Often, nation-state actors also targeted the healthcare sector as a way of gathering data on government response and to steal information vaccine research, CrowdStrike says.&nbsp;<\/p>\n<p>China, Iran, North Korea, and Russia all targeted vaccine research and the healthcare sector, the company states in the report.&nbsp;<\/p>\n<p>&#8220;The COVID-19 pandemic provided criminal actors with a unique opportunity to use lure content and social engineering techniques capable of targeting each of these components of human behavior,&#8221; the report states. &#8220;As a topic, COVID-19 has global impact, 24-hour news coverage and as of this writing, no clear end in sight.&#8221;<\/p>\n<p>The report also focuses on another major attacker tactic: supply-chain compromises. Attacks on the third-party sources of software became the largest trend by the end of the year, with nation-state attackers using SolarWinds&#8217; Orion network monitoring software to get access to that company&#8217;s customers. CrowdStrike, which calls the attacker Stellar Particle and currently does not attribute the attack to any particular nation-state, highlighted that although such attacks are not new, they are an effective way to turn a compromise of a supplier into access to every customer network.&nbsp;<\/p>\n<p>&#8220;The reality is that your devices are only as secure as the least secure part of the software or development environment that you are running,&#8221; Meyers says. &#8220;If you think about all the software that is updating in the background, and attackers are able to compromise one piece, that is terrifying.&#8221;<\/p>\n<p><span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/d\/d-id\/1340228?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost four of every five attacks attributed in 2020 were conducted by cybercriminal groups, a significant jump from 2019, with attacks on healthcare or using the pandemic rising fast. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/d\/d-id\/1340228?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-39692","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime Groups More Prolific, Focus on Healthcare in 2020 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime Groups More Prolific, Focus on Healthcare in 2020 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-22T22:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cybercrime Groups More Prolific, Focus on Healthcare in 2020\",\"datePublished\":\"2021-02-22T22:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\"},\"wordCount\":772,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\",\"name\":\"Cybercrime Groups More Prolific, Focus on Healthcare in 2020 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\",\"datePublished\":\"2021-02-22T22:50:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage\",\"url\":\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\",\"contentUrl\":\"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime Groups More Prolific, Focus on Healthcare in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime Groups More Prolific, Focus on Healthcare in 2020 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime Groups More Prolific, Focus on Healthcare in 2020 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-22T22:50:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cybercrime Groups More Prolific, Focus on Healthcare in 2020","datePublished":"2021-02-22T22:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/"},"wordCount":772,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/","url":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/","name":"Cybercrime Groups More Prolific, Focus on Healthcare in 2020 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","datePublished":"2021-02-22T22:50:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/dr_staff_125x125.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cybercrime-groups-more-prolific-focus-on-healthcare-in-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercrime Groups More Prolific, Focus on Healthcare in 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39692"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39692\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}