{"id":43683,"date":"2021-11-01T14:00:00","date_gmt":"2021-11-01T14:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/understanding-the-human-communications-attack-surface"},"modified":"2021-11-01T14:00:00","modified_gmt":"2021-11-01T14:00:00","slug":"understanding-the-human-communications-attack-surface","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/","title":{"rendered":"Understanding the Human Communications Attack Surface"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>We have seen a growing number of vulnerability disclosures, proof-of-concept exploits, and real-world incidents exploiting human communications beyond emails in channels such as Slack, Microsoft Teams, and Zoom. These cloud-based channels are not only a viable attack vector but an increasingly attractive one for criminals to exploit human communications, given the unique insider access they can provide. Our research has concluded that the kill chain targeting human communications can be mapped to the <a href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\" target=\"_blank\" rel=\"noopener\">cyber kill chain<\/a> used to breach enterprises.<\/p>\n<p>As remote work has come to rely on new communication tools above and beyond email \u2014 tools that have become more integral to corporate workforces \u2014 attacks will continue to grow. Businesses must understand the full attack surface that targets communications in order to put in place the proper security strategy.<\/p>\n<p><strong>Recon, Weaponization, and Delivery of Exploits Using Communications<br \/><\/strong>Adversaries use communication platforms to conduct reconnaissance and gather valuable intelligence that is then used to compromise victims through convincing social engineering attack campaigns that involve various techniques like phishing and pretexting. One common tactic to watch is the use of<a href=\"https:\/\/www.darkreading.com\/application-security\/attacks-leveraging-open-redirects-on-google-meet-doubleclick-surged-last-quarter\" target=\"_blank\" rel=\"noopener\">open redirect URLs<\/a> (where the domain is for a legitimate site but the body of the URL includes a query to send victims to another site listed in the parameter of the link). In another recent campaign, criminals used<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/26\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/\" target=\"_blank\" rel=\"noopener\">fake Zoom meeting invites<\/a> to steal credentials.<\/p>\n<p>Malicious actors also have access to an abundance of stolen credentials in the Dark Web, which can be used in<a href=\"https:\/\/owasp.org\/www-community\/attacks\/Credential_stuffing\" target=\"_blank\" rel=\"noopener\">credential stuffing<\/a> attacks on collaboration app accounts, where the likelihood of employee password reuse is high. Additionally,<a href=\"https:\/\/www.vice.com\/en\/article\/n7b3jm\/genesis-market-buy-cookies-slack\" target=\"_blank\" rel=\"noopener\">user cookies for Slack<\/a> and compromised accounts are readily available for purchase in the Dark Web, in sites such as Genesis. These sites can sell any number of accounts in a botnet, where the cookies and device fingerprints remain intact and are otherwise undetectable as they operate in the enterprise infrastructure, allowing for targeted attacks on those enterprises and creating breaches. This is how a malicious actor gained access to<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/report-details-how-gaming-giant-ea-was-hacked\" target=\"_blank\" rel=\"noopener\">Electronic Arts&#8217; Slack channel<\/a>, which was the entry point for a significant data breach.<\/p>\n<p>Configuration errors by both the platforms and users frequently put corporate data at risk. These misconfigurations include insecure default settings and permissions, such as<a href=\"https:\/\/itwire.com\/security\/attackers-may-exploit-misconfigured-salesforce-communities,-varonis-warns.html\" target=\"_blank\" rel=\"noopener\">Salesforce Communities<\/a>, which has led to widespread accidental public exposure of data by users, or Slack&#8217;s previously reported problem, which allowed anyone to<a href=\"https:\/\/blog.originprotocol.com\/security-alert-slack-user-info-leaked-2ec5b32d760d\" target=\"_blank\" rel=\"noopener\">create an API key<\/a> and subsequently scrape contact information from public channels.<\/p>\n<p>Organizations also routinely make mistakes when it comes to managing privacy settings and proper deployments, leaving <a href=\"https:\/\/www.nextgov.com\/cio-briefing\/2016\/05\/watchdog-18f-caused-data-breach-using-slack\/128288\/\" target=\"_blank\" rel=\"noopener\">them vulnerable<\/a> to data leaks and attacks. In many cases, these third-party platforms make public sharing a default setting, or they have complicated or obscure security practices that must be adhered to in order to avoid a public exposure, which makes it relatively easy for companies to trip themselves up. The recent case of Microsoft Power Apps, in which more than<a href=\"https:\/\/www.darkreading.com\/application-security\/38m-records-exposed-via-microsoft-power-apps-misconfiguration\" target=\"_blank\" rel=\"noopener\">38 million sensitive records<\/a> were exposed by major companies and state and local governments because of the service&#8217;s<a href=\"https:\/\/www.upguard.com\/breaches\/power-apps\" target=\"_blank\" rel=\"noopener\">abstruse security guidelines<\/a>, is a clear example of these risks.<\/p>\n<p>It may also be difficult for companies to automate restrictive security settings for their full workforce because services like Slack require the individual user to manually adjust key settings, such as establishing a waiting room to approve meeting attendees. <\/p>\n<p><strong>Focus on Human Communications<br \/><\/strong>Once attackers have breached accounts, an adversary can target its employees, IT team, and executives through social engineering attacks to steal access information such as credentials, VPN tokens, and other information.<\/p>\n<p>Since these platforms don&#8217;t adequately scan for malicious content, attackers can upload malware directly to the cloud channel and then deliver it to other users as a legitimate-looking file attachment. They can also share malicious links that will lead employees to external sites that will harvest their credentials or infect them with malware.<\/p>\n<p>Criminals are also using collaboration apps as a means for carrying out attacks outside of these platforms. By<a href=\"https:\/\/blog.talosintelligence.com\/2021\/04\/collab-app-abuse.html\" target=\"_blank\" rel=\"noopener\">hosting malware on a collaboration platform such as Slack or Discord<\/a>, an attacker can deliver malicious links to employees via phishing emails that are likely to bypass traditional malware detection tools while also catching the recipients off-guard. Similarly, attackers are also using cloud-based platforms like<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/attackers-find-new-way-to-exploit-google-docs-for-phishing-\/d\/d-id\/1341342\" target=\"_blank\" rel=\"noopener\">Google Drive<\/a> to spoof legitimate shared documents and host malicious redirect links in<a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/08\/15\/new-google-drive-warning-for-business-users-after-hackers-launch-devious-attack-report\/?sh=63a608489ee5\" target=\"_blank\" rel=\"noopener\">targeted phishing attacks<\/a>.<\/p>\n<p><strong>How to Manage These Risks<br \/><\/strong>It&#8217;s important for companies to recognize that new and old threats that exist in email are migrating to other communications platforms like Slack, Teams, and Zoom. Attackers have developed their own kill chain (similar to the cyber kill chain) and repeat a common step-by-step process to breach organizations via these cloud-based communications channels. Companies also have the opportunity to understand their risk level by inspecting their own communication traffic. <\/p>\n<p>Attackers can gain access to these private communication channels through various means, so companies should prepare for business communication compromise, invoice fraud, and credential- and access-stealing attacks by extending their layered defense strategy to these new modes of communications. <\/p>\n<p>Organizations should have and enforce strict policies \u2014 and conduct regular security awareness training \u2014 to reduce the risk of data theft, credential theft, and accidental data exposure inside these corporate communications channels. This should include forbidding and monitoring the sharing of sensitive information (such as account credentials), uploading files, or circulating links and inspecting files and links to evaluate if they are compromised. Companies should also restrict user behavior through the app&#8217;s permission settings, and they should make sure that privacy settings are always enabled when these are available. <\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/understanding-the-human-communications-attack-surface\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies should recognize that collaboration platforms aren&#8217;t isolated, secure channels where traditional threats don&#8217;t exist.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/understanding-the-human-communications-attack-surface\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-43683","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding the Human Communications Attack Surface 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the Human Communications Attack Surface 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Understanding the Human Communications Attack Surface\",\"datePublished\":\"2021-11-01T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/\"},\"wordCount\":919,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e3aff50b2938855\\\/613217d9242b480228096806\\\/BreachLock.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/\",\"name\":\"Understanding the Human Communications Attack Surface 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e3aff50b2938855\\\/613217d9242b480228096806\\\/BreachLock.jpeg\",\"datePublished\":\"2021-11-01T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e3aff50b2938855\\\/613217d9242b480228096806\\\/BreachLock.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt8e3aff50b2938855\\\/613217d9242b480228096806\\\/BreachLock.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/understanding-the-human-communications-attack-surface\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Human Communications Attack Surface\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding the Human Communications Attack Surface 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the Human Communications Attack Surface 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-01T14:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Understanding the Human Communications Attack Surface","datePublished":"2021-11-01T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/"},"wordCount":919,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/","url":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/","name":"Understanding the Human Communications Attack Surface 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg","datePublished":"2021-11-01T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt8e3aff50b2938855\/613217d9242b480228096806\/BreachLock.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/understanding-the-human-communications-attack-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding the Human Communications Attack Surface"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43683"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43683\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}