{"id":44540,"date":"2021-12-22T14:03:13","date_gmt":"2021-12-22T14:03:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32936\/The-Cybersecurity-Stories-Vice-Was-Jealous-Of-In-2021.html"},"modified":"2021-12-22T14:03:13","modified_gmt":"2021-12-22T14:03:13","slug":"the-cybersecurity-stories-vice-was-jealous-of-in-2021","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/","title":{"rendered":"The Cybersecurity Stories Vice Was Jealous Of In 2021"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/61ba6551c246590094fd1dfb\/lede\/1639670281110-newspapers.jpeg?crop=1xw:0.8428xh;0xw,0.0802xh&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/61ba6551c246590094fd1dfb\/lede\/1639670281110-newspapers.jpeg?crop=1xw:0.8428xh;0xw,0.0802xh&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/61ba6551c246590094fd1dfb\/lede\/1639670281110-newspapers.jpeg?crop=1xw:0.8428xh;0xw,0.0802xh&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"newspapers\"><\/picture><\/div>\n<p>Image:&nbsp;twohumans\/Getty Images<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"93.216777408638\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>We have finally gotten to the end of 2021, the year that was supposed to be better than 2020 but ended up being kinda the same and now ends with the looming threat of yet another COVID variant. Not everything about this year sucked though. As usual, there was a lot of cyber. And there were a lot of good cybersecurity stories that we were jealous of, so much so that we wished we had written them ourselves.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p>Here&#8217;s the annual Motherboard\u2019s Cyber Jealousy list.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.bloomberg.com\/features\/2021-hushpuppi-gucci-influencer\/\" target=\"_blank\" rel=\"noopener\">The Fall Of The Billionaire Gucci Master<\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By Evan Ratliff<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35.187096774194\"><\/p>\n<p>Ramon Abbas, aka Hushpuppi, used to be a celebrity in his homeland Nigeria. Living in Dubai, he showed off his wealth and luxurious lifestyle to more than 2 million Instagram followers. That was before the FBI accused him of stealing millions of dollars from countless companies around the world with targeted and complex phishing campaigns known as \u201cbusiness email compromise,\u201d or BEC. In this profile, Evan Ratliff\u2014the author of the must-read book <em><a href=\"https:\/\/www.penguinrandomhouse.com\/books\/549566\/the-mastermind-by-evan-ratliff\/9781984885159\/\" target=\"_blank\" rel=\"noopener\"><span>The Mastermind<\/span><\/a><\/em>\u2014paints a vivid portrait of the man behind the influencer and hacker, and delivers a thorough explainer of BEC scams and how dangerous they are.&nbsp;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0.81818181818182\"><\/p>\n<p><strong><a href=\"https:\/\/www.technologyreview.com\/2021\/05\/06\/1024621\/china-apple-spy-uyghur-hacker-tianfu\/\" target=\"_blank\" rel=\"noopener\">How China turned a prize-winning iPhone hack against the Uyghurs<\/a>&nbsp;<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><strong>By Patrick Howell O&#8217;Neill<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37\"><\/p>\n<p>In August of 2019, Google revealed that someone was hacking iPhones \u201cen masse\u201d using five different zero-days, which the company\u2019s researchers caught in the wild. One of those, as&nbsp; Patrick Howell O&#8217;Neill reveals in this deep dive, was showcased at Tianfu Cup, a Chinese hacking competition. This revelation means some exploits shown at Chinese conferences then get repurposed by the government. In this case, to target Uyghurs, a muslim minority that has been systematically oppressed by the central government in Beijing.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.technologyreview.com\/2021\/03\/26\/1021318\/google-security-shut-down-counter-terrorist-us-ally\/\" target=\"_blank\" rel=\"noopener\">Google\u2019s Top Security Teams Unilaterally Shut Down A Counterterrorism Operation<\/a><\/strong><a href=\"https:\/\/www.technologyreview.com\/2021\/03\/26\/1021318\/google-security-shut-down-counter-terrorist-us-ally\/\" target=\"_blank\" rel=\"noopener\">&nbsp;<\/a><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><strong>By Patrick Howell O&#8217;Neill<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37.315315315315\"><\/p>\n<p>In one of the year\u2019s most shocking scoops, this story\u2014also by Patrick Howell O&#8217;Neill\u2014revealed that Google\u2019s premier cybersecurity research team, <a href=\"https:\/\/www.vice.com\/en\/article\/59nyqb\/how-google-changed-the-secretive-market-for-the-most-dangerous-hacks-in-the-world\"><span>Project Zero<\/span><\/a>, had shut down an anti-terrorist espionage operation led by a Western government. Something like this does not happen very often. Tech and cybersecurity companies usually don\u2019t interfere with Western cyberoperations. Google defended itself saying its Project Zero researchers \u201cdon\u2019t perform attribution,\u201d but the article highlights how that may be a half truth, given that another Google team, the Threat Analysis Group or TAG, which also was involved in this research, does do attribution.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0.71052631578947\"><\/p>\n<p><strong><a href=\"https:\/\/www.reuters.com\/technology\/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03\/\" target=\"_blank\" rel=\"noopener\">U.S. State Department Phones Hacked With Israeli Company Spyware &#8211; Sources<\/a>&nbsp;<\/strong><\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><strong>By Christopher Bing and Joseph Menn<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.399598393574\"><\/p>\n<p>This year has been filled with revelation of abuses by customers of the infamous Israeli spyware seller NSO Group. Over the summer, several news organizations working with Amnesty International and French NGO Forbidden stories detailed a series of cases where NSO customers used the company\u2019s tools to go after dissidents, journalists, and even heads of state. But in this case, the victims were American diplomats abroad, a shocking case that may explain <a href=\"https:\/\/www.vice.com\/en\/article\/dypzjq\/us-sanctions-could-cut-off-nso-from-tech-it-relies-on\"><span>why the US government blocklisted NSO<\/span><\/a>.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-13\/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline Paid Hackers Nearly $5 Million in Ransom<\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p><strong>By William Turton, Michael Riley, and Jennifer Jacobs<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>The ransomware attack on Colonial Pipeline, the operator of the largest gas pipeline in the United States, was perhaps the most influential and talked about cyberattack of the year. It caused gas shortages and long lines at stations, and pushed ransomware to the forefront as a national security issue. One of the most shocking details of this story was the fact that the company chose to pay the hackers the ransom, in this case $5 million. Perhaps we wouldn\u2019t know this crucial detail if it wasn\u2019t for this scoop by a team of Bloomberg reporters.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.wired.com\/story\/women-cybersecurity-nsa-cyber-command\/\" target=\"_blank\" rel=\"noopener\">The Opportunities\u2014and Obstacles\u2014for Women at NSA and Cyber Command<\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>Lily Hay Newman<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37\"><\/p>\n<p>Cybersecurity is very unfriendly, to say the least, toward women. There\u2019s sexual harassment at conferences, gatekeeping, and salary disparity. So it\u2019s more important than ever to highlight these issues giving voices to the women in the industry. Lily Hay Newman does that here, speaking on the record with three women at the NSA, who talk about the hurdles and problems they had to face, and how the industry and the intelligence community have evolved.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.wsj.com\/articles\/ransomware-hackers-hospital-first-alleged-death-11633008116\" target=\"_blank\" rel=\"noopener\">A Hospital Hit by Hackers, a Baby in Distress: The Case of the First Alleged Ransomware Death<\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p><strong>By Kevin Poulsen, Robert McMillan,and Melanie Evans<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"40\"><\/p>\n<p>For years, rivers and rivers of ink have been spilled speculating about the day a cyberattack would result in loss of life. For years, it was just a theoretical scenario, one that sounded unlikely. How could hackers kill someone? This story shows that, perhaps, that red line has already been crossed. This is the story of Nicko Silar, a child who was born at an Alabama hospital that was in the midst of a disruptive ransomware attack. His mom has since sued the hospital, alleging that it failed to take care of her child, who died nine months after being born due to complications that arose at birth, when hospital staff was overwhelmed, and key devices did not work as normal.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0.93103448275862\"><\/p>\n<p><strong><a href=\"https:\/\/www.bbc.com\/news\/technology-59297187\" target=\"_blank\" rel=\"noopener\">Evil Corp: &#8216;My hunt for the world&#8217;s most wanted hackers&#8217;<\/a><\/strong>&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\"><\/p>\n<p><strong>By Joe Tidy<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>Ransomware was <em>the<\/em> cybersecurity story of the year. But ransomware stories seldom have a face. In this at times bizarre story, a BBC reporter travelled to Russia with the goal of actually meeting hackers working for ransomware gangs in person. He didn\u2019t succeed, but he got awfully close, meeting a hacker\u2019s dad, who defended his son. Joe Tidy and his colleagues at the BBC certainly deserve credit for their persistence and for thinking outside of the box.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"0\"><\/p>\n<p><strong><a href=\"https:\/\/www.thedailybeast.com\/hacker-risks-jail-to-out-middlebury-college-employee-for-alleged-child-porn\" target=\"_blank\" rel=\"noopener\">Hacker Risks Jail to Out Middlebury College Employee for Alleged Child Porn<\/a><\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p><strong>By Shannon Vavra and Seamus Hughes<\/strong><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>There are very few feel good stories in the world of cyber. This is one of them. A hacker came across a stash of child exploitation material owned by a college employee\u2014by hacking into his computer. The hacker was then faced by a quandary: should they report the man and risk getting arrested for hacking into their computer? Or just pretend they never saw what they saw? The hacker chose to call law enforcement. In the end, the hacker got immunity from the prosecutors, and the college employee got arrested.&nbsp;&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"19.105882352941\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32936\/The-Cybersecurity-Stories-Vice-Was-Jealous-Of-In-2021.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44541,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9792],"class_list":["post-44540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarerussiacybercrimedata-lossfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Cybersecurity Stories Vice Was Jealous Of In 2021 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cybersecurity Stories Vice Was Jealous Of In 2021 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-22T14:03:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Cybersecurity Stories Vice Was Jealous Of In 2021\",\"datePublished\":\"2021-12-22T14:03:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/\"},\"wordCount\":1125,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg\",\"keywords\":[\"headline,hacker,malware,russia,cybercrime,data loss,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/\",\"name\":\"The Cybersecurity Stories Vice Was Jealous Of In 2021 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg\",\"datePublished\":\"2021-12-22T14:03:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,russia,cybercrime,data loss,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarerussiacybercrimedata-lossfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Cybersecurity Stories Vice Was Jealous Of In 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cybersecurity Stories Vice Was Jealous Of In 2021 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"The Cybersecurity Stories Vice Was Jealous Of In 2021 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-22T14:03:13+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Cybersecurity Stories Vice Was Jealous Of In 2021","datePublished":"2021-12-22T14:03:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/"},"wordCount":1125,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg","keywords":["headline,hacker,malware,russia,cybercrime,data loss,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/","url":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/","name":"The Cybersecurity Stories Vice Was Jealous Of In 2021 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg","datePublished":"2021-12-22T14:03:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/the-cybersecurity-stories-vice-was-jealous-of-in-2021.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-cybersecurity-stories-vice-was-jealous-of-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,russia,cybercrime,data loss,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarerussiacybercrimedata-lossfraud\/"},{"@type":"ListItem","position":3,"name":"The Cybersecurity Stories Vice Was Jealous Of In 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44540"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44540\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44541"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}