{"id":40077,"date":"2021-03-19T15:20:26","date_gmt":"2021-03-19T15:20:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32121\/Swiss-Hacker-Indicted-After-Claiming-Credit-For-Breaching-Nissan-Intel.html"},"modified":"2021-03-19T15:20:26","modified_gmt":"2021-03-19T15:20:26","slug":"swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/","title":{"rendered":"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"ArticleBody-byline-container-3H6dy\">\n<p class=\"Byline-byline-1sVmo ArticleBody-byline-10B7D\">By <a class=\"TextLabel__text-label___3oCVw TextLabel__black-to-orange___23uc0 TextLabel__serif___3lOpX Byline-author-2BSir\" href=\"https:\/\/www.reuters.com\/journalists\/paresh-dave\" target=\"_blank\" rel=\"noopener noreferrer\">Paresh Dave<\/a><\/p>\n<div class=\"ArticleBody-read-time-and-social-2VOIr\">\n<p class=\"TextLabel__text-label___3oCVw TextLabel__gray___1V4fk TextLabel__small-all-caps-spaced-out___3O9H4 ReadTime-read-time-1s3CG ArticleBody-read-time-29pGN\">3 Min Read<\/p>\n<\/div>\n<\/div>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">(Reuters) &#8211; A Swiss computer hacker who has claimed credit for helping steal or distribute proprietary data from Nissan Motor Co, Intel Corp and most recently security camera startup Verkada was indicted on Thursday, U.S. prosecutors announced.<\/p>\n<figure class=\"WithCaption-container-Aau3d WithCaption-outside-2Jvzs\" readability=\"4\">\n<p><figcaption>FILE PHOTO: A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS\/Kacper Pempel\/Illustration\/File Photo<\/figcaption><\/p>\n<\/figure>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Till Kottmann, 21, remains in Lucerne and has been notified about the pending charges, the U.S. attorney\u2019s office in Seattle said in a statement.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Kottmann did not immediately respond to a request for comment following the announcement of the indictment, which came after midnight in Lucerne.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Kottmann over the last year allegedly working with a group accessed internal files belonging to at least eight parties, including six unnamed companies, the Washington State Department of Transportation and an undisclosed federal agency, according to the indictment.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">\u201cKottmann, and others, accessed protected computers, including \u2018git\u2019 and source code repositories as well as internal infrastructure, through use of stolen access keys, credentials and exploits,\u201d the indictment said.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">It added Kottmann overall hacked dozens of businesses and government agencies and purportedly published leaked data from over 100 entities.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">In social media posts and on a website, Kottmann allegedly shared some of the information and took credit for breaches, the document said.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Dates and descriptions in the indictment related to two of the alleged hacks match Kottmann\u2019s past statements about Intel and Nissan.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Intel declined to comment. Nissan and Verkada did not immediately respond to requests for comment.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">This month, Kottmann shared with Reuters recordings of live and archived surveillance footage Kottmann obtained from inside a Tesla factory, an Alabama jail and other facilities by gaining access to Verkada\u2019s administrative system.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Prosecutors accused Kottmann of wire fraud, aggravated identity theft and conspiracy to commit computer fraud and abuse.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">It was not immediately clear if or when Kottmann would be brought to the U.S. to face charges. Swiss authorities raided Kottmann\u2019s residence last week.<\/p>\n<div readability=\"5.7211538461538\">\n<div class=\"Attribution-attribution-Y5JpY\" readability=\"8\">\n<p>Reporting by Paresh Dave; additional reporting by Joseph Menn; Editing by Leslie Adler and Michael Perry<\/p>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32121\/Swiss-Hacker-Indicted-After-Claiming-Credit-For-Breaching-Nissan-Intel.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9283],"class_list":["post-40077","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerswitzerlandintel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-19T15:20:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel\",\"datePublished\":\"2021-03-19T15:20:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/\"},\"wordCount\":371,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800\",\"keywords\":[\"headline,hacker,switzerland,intel\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/\",\"name\":\"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800\",\"datePublished\":\"2021-03-19T15:20:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800\",\"contentUrl\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,switzerland,intel\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerswitzerlandintel\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/","og_locale":"en_US","og_type":"article","og_title":"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-19T15:20:26+00:00","og_image":[{"url":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel","datePublished":"2021-03-19T15:20:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/"},"wordCount":371,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800","keywords":["headline,hacker,switzerland,intel"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/","url":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/","name":"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800","datePublished":"2021-03-19T15:20:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#primaryimage","url":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800","contentUrl":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210319&amp;t=2&amp;i=1555423048&amp;r=LYNXMPEH2I00T&amp;w=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/swiss-hacker-indicted-after-claiming-credit-for-breaching-nissan-intel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,switzerland,intel","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerswitzerlandintel\/"},{"@type":"ListItem","position":3,"name":"Swiss Hacker Indicted After Claiming Credit For Breaching Nissan, Intel"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40077"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40077\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}