{"id":46247,"date":"2022-04-13T14:43:15","date_gmt":"2022-04-13T14:43:15","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33320\/Account-Takeover-Poised-To-Surpass-Malware-As-The-No.-1-Security-Concern.html"},"modified":"2022-04-13T14:43:15","modified_gmt":"2022-04-13T14:43:15","slug":"account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/","title":{"rendered":"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern"},"content":{"rendered":"<div>\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/02\/GettyImages-828896246-1024x685.jpg\" alt class=\"wp-image-211558\"><figcaption>Account takeover is set to surpass malware as the No. 1 security concern, according to research. Pictured: A woman is silhouetted against a projection of a password log-in dialog box on Aug. 9, 2017, in London. (Photo by Leon Neal\/Getty Images)<\/figcaption><\/figure>\n<\/div>\n<p><em><strong>Note:<\/strong> Part 1 of 2 on account takeover, which has been cited numerous times in financial industry research as the fastest-growing, most pervasive and\/or most concerning fraud type. Part 2 deals with prescriptive advice for <a href=\"https:\/\/www.scmagazine.com\/analysis\/cybercrime\/how-bank-customers-can-reduce-the-risk-from-account-takeover-fraud\" target=\"_blank\" rel=\"noreferrer noopener\">mitigating account takeover risk<\/a>.<\/em><\/p>\n<p>As most researchers and financial executives can attest, virtually all types of fraud have dramatically risen over the past two years. However, attackers taking over legitimate financial accounts have become even more of a favorite with cybercriminals than most fraud schemes.<\/p>\n<p>Many major recent research reports have pointed out that <a rel=\"noreferrer noopener\" href=\"https:\/\/www.perimeterx.com\/solutions-by-threat\/account-takeover\/\" target=\"_blank\">account takeover<\/a> (ATO), a form of identity theft where bad actors access legitimate bank accounts, change the account information and passwords, and hijack a real customer\u2019s account, has skyrocketed since last year. According to Javelin Research\u2019s annual &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/t.nylas.com\/t1\/316\/g1k6zuvqa8er4ji6zvc3zoyo\/2\/e02b00becca3ca1a0bf97a0e256857379ec3823a45b3bf0cddd64317be053645\" target=\"_blank\">Identity Fraud Study: The Virtual Battleground<\/a>&#8221; report, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/analysis\/identity-and-access\/identity-fraud-skyrockets-as-hackers-stick-to-pre-pandemic-techniques\" target=\"_blank\">account takeover increased<\/a> by 90% to an estimated $11.4 billion in 2021 when compared with 2020 \u2014 representing roughly one-quarter of all identity fraud losses last year.<\/p>\n<p>Like many types of financial fraud, cyber thieves are betting on the fact that if they attempt to seize a large number of legitimate accounts, eventually they will get a payoff.<\/p>\n<p>\u201cAccount takeovers are a numbers game,\u201d said Gal Diskin, co-founder and chief technology officer for Authomize. \u201cThe more accounts that an organization has, the bigger their risk that some of them will be compromised.\u201d<\/p>\n<p>Account takeovers often piggyback off of previous attacks, making these crimes a way for hackers to make the most out of stolen information. Diskin pointed out that account takeovers most commonly happen when a password is \u201ctaken from another data leak and reused for different accounts. But there are a variety of risky scenarios that can lead to compromise.\u201d<\/p>\n<p>In its most recent <a rel=\"noreferrer noopener\" href=\"https:\/\/feedzai.com\/pressrelease\/feedzais-financial-crime-report-223-increase-in-online-fraud-attack-rates\/\" target=\"_blank\">quarterly financial crime report<\/a>, Feedzai, a cyber-risk management provider to the financial industry, cited the growing threat from account takeover, which topped the list of top fraud scams last year, rising from fourth place in 2020.<\/p>\n<p>CyberEdge Group, also released research just last week that corroborates the same findings about ATO. In its 2022 <a rel=\"noreferrer noopener\" href=\"https:\/\/www.perimeterx.com\/resources\/reports\/2022-cyberthreat-defense-report\/\" target=\"_blank\">&#8220;Cyberthreat Defense Report<\/a>,&#8221; which surveyed 1,200 IT security personnel worldwide, account takeover was one of the two most pervasive and expanding threats (along with malware).<\/p>\n<p>The CyberEdge research also predicts this type of pernicious fraud will continue to rise this year and beyond.<\/p>\n<p>\u201cATO attacks are poised to overtake malware as the number one concern,\u201d according to the CyberEdge Group research, adding that concerns for ATO and credential stuffing saw the biggest increase of any risk for IT security respondents.<\/p>\n<p>\u201cMalware is still perceived as the most important threat, but account takeover and credential abuse attacks moved up from fourth place last year to number two this year&#8230; [and] ATO will take over the top spot in the next year or two,\u201d the CyberEdge report predicted.<\/p>\n<p>Aside from being efficient, relatively easy and popular among cyber criminals, account takeover can be a jumping-off point to even more<em> <\/em>fraud incidents.<\/p>\n<p>\u201cAccount takeover fraud poses a variety of risks to financial institutions because fraudsters will often weaponize a compromised bank account to perpetrate more fraud,\u201d according to Mike Bosserman, chief revenue officer at MANTL, which helps banks and credit unions develop digital account opening platforms.&nbsp;&nbsp;<\/p>\n<p>For example, criminals will use the stolen bank account to fund a new<em> <\/em>bank account they open online for criminal activities, Bosserman said.<\/p>\n<p>\u201cFailing to catch a fraudster during the account opening process can lead to significant financial losses down the road for financial institutions,&#8221; he said.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33320\/Account-Takeover-Poised-To-Surpass-Malware-As-The-No.-1-Security-Concern.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46248,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9963],"class_list":["post-46247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarepasswordidentity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Account Takeover Poised To Surpass Malware As The No. 1 Security Concern 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-13T14:43:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/02\/GettyImages-828896246-1024x685.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern\",\"datePublished\":\"2022-04-13T14:43:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/\"},\"wordCount\":629,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg\",\"keywords\":[\"headline,malware,password,identity theft\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/\",\"name\":\"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg\",\"datePublished\":\"2022-04-13T14:43:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg\",\"width\":1024,\"height\":685},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,password,identity theft\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarepasswordidentity-theft\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/","og_locale":"en_US","og_type":"article","og_title":"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-04-13T14:43:15+00:00","og_image":[{"url":"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/02\/GettyImages-828896246-1024x685.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern","datePublished":"2022-04-13T14:43:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/"},"wordCount":629,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg","keywords":["headline,malware,password,identity theft"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/","url":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/","name":"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg","datePublished":"2022-04-13T14:43:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/04\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern.jpg","width":1024,"height":685},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/account-takeover-poised-to-surpass-malware-as-the-no-1-security-concern\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,password,identity theft","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarepasswordidentity-theft\/"},{"@type":"ListItem","position":3,"name":"Account Takeover Poised To Surpass Malware As The No. 1 Security Concern"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46247"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46248"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}