{"id":48225,"date":"2022-08-30T19:58:14","date_gmt":"2022-08-30T19:58:14","guid":{"rendered":"http:\/\/51921038-4e4e-44eb-887c-5ecc524d8e5e"},"modified":"2022-08-30T19:58:14","modified_gmt":"2022-08-30T19:58:14","slug":"googles-new-bug-bounty-program-targets-open-source-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","title":{"rendered":"Google&#8217;s new bug bounty program targets open source vulnerabilities"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/\" alt=\"shutterstock-2091644743.jpg\" height=\"480\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Shutterstock<\/span><\/figcaption><\/figure>\n<p>Google on Tuesday announced it&#8217;s launching a new bug bounty program that focuses specifically on open source software. Bug hunters can earn anywhere from $100 to upwards of $31,000 via the new <a href=\"https:\/\/bughunters.google.com\/about\/rules\/6521337925468160\/google-open-source-software-vulnerability-reward-program-rules\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Open Source Software Vulnerability Rewards Program (OSS VRP)<\/a>, depending on the severity of the vulnerability they find.&nbsp;<\/p>\n<p>The new program tackles a major problem in the software community &#8212; a spike in supply chain compromises. Citing a report from the software firm Sonatype, Google notes that attacks targeting the open source supply chain <a href=\"https:\/\/www.sonatype.com\/hubfs\/Q3%202021-State%20of%20the%20Software%20Supply%20Chain-Report\/SSSC-Report-2021_0913_PM_2.pdf?hsLang=en-us\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">grew 650%<\/a> year-over-year in 2021. Even single vulnerabilities, like the severe <a href=\"https:\/\/www.zdnet.com\/article\/log4j-zero-day-flaw-what-you-need-to-know-and-how-to-protect-yourself\/\" rel=\"follow\">Log4j vulnerability<\/a> that was discovered in December 2021, can wreak widespread havoc.&nbsp;<\/p>\n<p>Google&#8217;s new program encourages bug hunters to look for issues in up-to-date versions of open source software (including repository settings) stored in the public repositories of Google-owned GitHub organizations (such as <a href=\"https:\/\/github.com\/google\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Google<\/a>,<a href=\"https:\/\/github.com\/googleapis\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> GoogleAPIs<\/a> and<a href=\"https:\/\/github.com\/GoogleCloudPlatform\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> GoogleCloudPlatform<\/a>). It also focuses on those projects&#8217; third-party dependencies.&nbsp;<\/p>\n<p>The top awards will go to vulnerabilities found in the most sensitive projects that Google maintains, including<a href=\"https:\/\/github.com\/bazelbuild\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Bazel<\/a>,<a href=\"https:\/\/github.com\/angular\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Angular<\/a>,<a href=\"https:\/\/github.com\/golang\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Golang<\/a>,<a href=\"https:\/\/github.com\/protocolbuffers\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Protocol buffers<\/a> and<a href=\"https:\/\/fuchsia.dev\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Fuchsia<\/a>. Google is also encouraging bug hunters to look for problems that could have the greatest impact on the supply chain, which could include design issues that cause product vulnerabilities or security issues like leaked credentials.<\/p>\n<p>Rewards will range from $100 to $31,337, depending on the severity of the vulnerability and the project&#8217;s importance. &#8220;The larger amounts will also go to unusual or particularly interesting vulnerabilities, so creativity is encouraged,&#8221; Google added in its blog post.&nbsp;<\/p>\n<p>The OSS VRP is part of the <a href=\"https:\/\/www.zdnet.com\/article\/software-supply-chain-security-google-touts-its-10bn-investment-and-zero-trust-work\/\" rel=\"follow\">$10 billion that Google has committed<\/a> to spending on US cybersecurity. Google made the commitment last year following a <a href=\"https:\/\/www.zdnet.com\/article\/after-log4j-white-house-worries-about-the-next-big-open-source-flaw\/\" rel=\"follow\">meeting at the White House<\/a>, where the Biden administration stressed that potential vulnerabilities in open source software are a national security concern. <\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new program tackles a major problem in the software community &#8212; a spike in digital supply chain compromises.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48225","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google&#039;s new bug bounty program targets open source vulnerabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google&#039;s new bug bounty program targets open source vulnerabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-30T19:58:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google&#8217;s new bug bounty program targets open source vulnerabilities\",\"datePublished\":\"2022-08-30T19:58:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\"},\"wordCount\":312,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\",\"name\":\"Google's new bug bounty program targets open source vulnerabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\",\"datePublished\":\"2022-08-30T19:58:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google&#8217;s new bug bounty program targets open source vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google's new bug bounty program targets open source vulnerabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Google's new bug bounty program targets open source vulnerabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-30T19:58:14+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google&#8217;s new bug bounty program targets open source vulnerabilities","datePublished":"2022-08-30T19:58:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/"},"wordCount":312,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","url":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","name":"Google's new bug bounty program targets open source vulnerabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","datePublished":"2022-08-30T19:58:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/","contentUrl":"https:\/\/www.zdnet.com\/article\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/googles-new-bug-bounty-program-targets-open-source-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google&#8217;s new bug bounty program targets open source vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48225"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}