{"id":4685,"date":"2018-06-28T14:41:46","date_gmt":"2018-06-28T14:41:46","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=133188"},"modified":"2018-06-28T14:41:46","modified_gmt":"2018-06-28T14:41:46","slug":"ticketmaster-chat-feature-leads-to-credit-card-breach","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/","title":{"rendered":"Ticketmaster Chat Feature Leads to Credit-Card Breach"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/28100959\/ticketmaster1.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Tens of thousands of people have been caught up in a data breach at Ticketmaster UK, which exposed credit-card and personal information for UK and some international customers.<\/p>\n<p>Customers in North America are not affected.<\/p>\n<p>The ticket-selling giant said that on Saturday it found malware within a customer chat function for its websites, hosted by <a href=\"https:\/\/www.inbenta.com\/en\/inbenta-and-the-ticketmaster-data-breach\/\" target=\"_blank\" rel=\"noopener\">Inbenta Technologies.<\/a>\u00a0Worryingly, the malicious code was found to be accessing an array of information, including name, address, email address, telephone number, payment details and Ticketmaster login details.<\/p>\n<p>The malware managed to stay under the radar for months as well, Ticketmaster said.\u00a0The breach affects those who purchased, or attempted to purchase, event tickets between September 2017 and June 23 of this year. About 5 percent of its customer base is affected, the company noted, which according to the BBC\u2019s <a href=\"https:\/\/www.bbc.com\/news\/technology-44628874\" target=\"_blank\" rel=\"noopener\">calculations<\/a> works out to 40,000 or so victims.<\/p>\n<p>Ticketmaster has since disabled the feature, which was running on Ticketmaster International, Ticketmaster UK, GETMEIN! and TicketWeb websites. It also said in a <a href=\"https:\/\/security.ticketmaster.co.uk\/\" target=\"_blank\" rel=\"noopener\">website notice<\/a> that \u201cforensic teams and security experts are working around the clock to understand how the data was compromised,\u201d and said that it has notified the affected customers.<\/p>\n<p>The reality is that all businesses today rely on a complex cyber supply chain \u2013 including the use of free, open-source software, custom third-party components or simple commercial off-the-shelf applications, according to Tamulyn Takakura, product marketing manager at Prevoty.<\/p>\n<p>\u201cToday, companies are forced to assume security risk from their suppliers, because it\u2019s impractical to mandate a consistent level of security across an organization\u2019s technology supply chain,\u201d Takakura told Threatpost. \u201cUnlike the automotive industry, where there are only so many suppliers for vehicle parts, the application supply chain is fluid, and it isn\u2019t always apparent who the supplier is.\u201d<\/p>\n<p>Hackers are aware that this means the supply chain is low-hanging fruit for network infiltration \u2013 as seen perhaps most infamously in the Target breach, where the company\u2019s HVAC system <a href=\"https:\/\/threatpost.com\/hvac-integrators-billing-connection-led-to-target-breach\/104135\/\" target=\"_blank\" rel=\"noopener\">proved to be the weak link<\/a>.<\/p>\n<p>\u201cIn an ideal world, any company that creates applications should empower developers to code with security best practices in mind throughout the entire software development life cycle (SDLC), and provide proper training and even security certifications,\u201d said Jeannie Warner, security manager at leading application security provider WhiteHat Security, via email. \u201cEvery plugin which interacts with a transactional site deserves a security review in the decision process (code vs. buy). Hackers are finding that smaller companies that create useful plugin software are even easier to hack than the main site, due to the lack of rigor often found in smaller development shops without a mature SDLC.\u201d<\/p>\n<p>The chat vector in particular may sound familiar: In April <a href=\"https:\/\/threatpost.com\/delta-sears-breaches-blamed-on-malware-attack-against-a-third-party-chat-service\/131023\/\" target=\"_blank\" rel=\"noopener\">it was revealed<\/a> that the credit-card information of hundreds of thousands of Best Buy, Delta Air Lines and Sears Holdings customers was compromised thanks to a shared third-party provider, [24]7.ai, which provided online chat services to collect payment information.<\/p>\n<p>Some researchers aren\u2019t as forgiving of the security breakdown as Takakura. \u201cFool me once, shame on you. Fool me twice, shame on me,\u201d Pravin Kothari, CEO at CipherCloud, said via email, referring to the [24]7.ai incident. \u201cTicketmaster\u2019s website security was compromised by a malware-laden chatbot which they had installed on quite a few of the Ticketmaster websites worldwide. This is <em>deja vu<\/em> all over again.\u201d<\/p>\n<p>He added, \u201cLesson learned? Think carefully about installing third-party web services and giving them access to your cloud infrastructure, until your security operations center team has a chance to thoroughly audit their security; and, evaluate the risk of integrating their services with your own critical cloud infrastructure.\u201d<\/p>\n<p>Warner noted that there are best practices that can help clear up the third-party supplier security morass, including getting together with internal stakeholders to agree on acceptable vendor security standards.<\/p>\n<p>\u201cEstablish controls that third-party vendors must meet before they can be deployed in the organization,\u201d she advised. \u201cAsk for Attestation letters or other certification reviews before employing plugins on any transactional website.\u201d<\/p>\n<p>Communicating those security standards to vendors and then establishing a timeline for compliance would be next on the to-do list; and form there, processes should be put in place to monitor the security status of third-party vendors at regular intervals.<\/p>\n<p>\u201cSecurity is a process \u2013 but a trusted website partner needs to be as secure as your own internal standards,\u201d she said.<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/ticketmaster-chat-feature-leads-to-credit-card-breach\/133188\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name, address, email address, telephone number, payment details and Ticketmaster login details were potentially compromised for tens of thousands of customers. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4686,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[1651,486,207,211,18,1652,28,1653,5,481,1039,1633,69],"class_list":["post-4685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-chat","tag-credit-card","tag-data-breach","tag-featured","tag-hacks","tag-inbenta","tag-malware","tag-payment-information","tag-privacy","tag-supply-chain","tag-third-party","tag-ticketmaster","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ticketmaster Chat Feature Leads to Credit-Card Breach 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ticketmaster Chat Feature Leads to Credit-Card Breach 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-28T14:41:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/ticketmaster-chat-feature-leads-to-credit-card-breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1598\" \/>\n\t<meta property=\"og:image:height\" content=\"882\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ticketmaster Chat Feature Leads to Credit-Card Breach\",\"datePublished\":\"2018-06-28T14:41:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/\"},\"wordCount\":729,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ticketmaster-chat-feature-leads-to-credit-card-breach.png\",\"keywords\":[\"Chat\",\"credit card\",\"data breach\",\"Featured\",\"Hacks\",\"inbenta\",\"Malware\",\"payment information\",\"Privacy\",\"supply chain\",\"third party\",\"Ticketmaster\",\"Web Security\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/\",\"name\":\"Ticketmaster Chat Feature Leads to Credit-Card Breach 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ticketmaster-chat-feature-leads-to-credit-card-breach.png\",\"datePublished\":\"2018-06-28T14:41:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ticketmaster-chat-feature-leads-to-credit-card-breach.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ticketmaster-chat-feature-leads-to-credit-card-breach.png\",\"width\":1598,\"height\":882},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ticketmaster-chat-feature-leads-to-credit-card-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chat\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/chat\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ticketmaster Chat Feature Leads to Credit-Card Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ticketmaster Chat Feature Leads to Credit-Card Breach 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/","og_locale":"en_US","og_type":"article","og_title":"Ticketmaster Chat Feature Leads to Credit-Card Breach 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-28T14:41:46+00:00","og_image":[{"width":1598,"height":882,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/ticketmaster-chat-feature-leads-to-credit-card-breach.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ticketmaster Chat Feature Leads to Credit-Card Breach","datePublished":"2018-06-28T14:41:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/"},"wordCount":729,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/ticketmaster-chat-feature-leads-to-credit-card-breach.png","keywords":["Chat","credit card","data breach","Featured","Hacks","inbenta","Malware","payment information","Privacy","supply chain","third party","Ticketmaster","Web Security"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/","url":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/","name":"Ticketmaster Chat Feature Leads to Credit-Card Breach 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/ticketmaster-chat-feature-leads-to-credit-card-breach.png","datePublished":"2018-06-28T14:41:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/ticketmaster-chat-feature-leads-to-credit-card-breach.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/ticketmaster-chat-feature-leads-to-credit-card-breach.png","width":1598,"height":882},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ticketmaster-chat-feature-leads-to-credit-card-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Chat","item":"https:\/\/www.threatshub.org\/blog\/tag\/chat\/"},{"@type":"ListItem","position":3,"name":"Ticketmaster Chat Feature Leads to Credit-Card Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4685"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4685\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4686"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}