{"id":48735,"date":"2022-10-04T11:53:00","date_gmt":"2022-10-04T11:53:00","guid":{"rendered":"http:\/\/b9c22066-6502-4162-8b94-cc223dd76e03"},"modified":"2022-10-04T11:53:00","modified_gmt":"2022-10-04T11:53:00","slug":"victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/","title":{"rendered":"Victims of these online crooks lacked a key security feature. Don&#8217;t make the same mistake"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/2e5ef7fce2a0a2bbfb8bc85e56c3e028b0745ed3\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=768\" alt=\"a-woman-looking-concerned-while-using-a-laptop-in-an-office\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a9bb8e51e8d0fa73b3b6822a2602ebb81abadd99\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1024\" alt=\"a-woman-looking-concerned-while-using-a-laptop-in-an-office\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\" alt=\"a-woman-looking-concerned-while-using-a-laptop-in-an-office\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\" alt=\"a-woman-looking-concerned-while-using-a-laptop-in-an-office\" height=\"800.7550731477112\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty\/LaylaBird<\/span><\/figcaption><\/figure>\n<p>There has been a big rise in business email compromise (BEC) attacks \u2013 and most victims work at organisations that weren&#8217;t using multi-factor authentication (MFA) to secure their accounts.<\/p>\n<p>BEC attacks are one of the most lucrative forms of cyber crime: according to the FBI,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/fbi-email-fraud-keeps-getting-worse-heres-how-to-protect-yourself\/\" rel=\"follow\">the combined total lost is over $43 billion and counting<\/a>, with attacks reported in at least 177 countries.<\/p>\n<p>These attacks are relatively simple for cyber criminals to carry out \u2013 all they need is access to an email account and some patience as they <a href=\"https:\/\/www.zdnet.com\/article\/your-biggest-cyber-crime-threat-has-almost-nothing-to-do-with-technology\/\" rel=\"follow\">try to trick victims into making financial transfers under false presences<\/a>. This commonly involves sending messages to employees, purportedly from their boss or a colleague, that suggest a payment \u2013 often very large \u2013 must be made quickly in order to secure an important business deal.<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-cyber-crime-threat-is-also-the-one-that-nobody-wants-to-talk-about\/\" rel=\"follow\">The biggest cyber-crime threat is also the one that nobody wants to talk about<\/a><\/p>\n<p>More advanced BEC attacks hack into a company account and use a legitimate email address to make the payment request.&nbsp;<\/p>\n<p>It&#8217;s even been known for <a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-type-of-phishing-is-growing-fast-because-hackers-are-seeing-big-paydays\/\" rel=\"follow\">scammers to monitor inboxes for long periods of time<\/a>, only choosing to strike when a real business transaction is about to be made \u2013 at which point they cut in and direct the payment to their own account.<\/p>\n<p>With money to be made in this way, cyber criminals are increasingly turning towards BEC campaigns and businesses are falling victim. According to cybersecurity analysts at&nbsp;<a href=\"https:\/\/arcticwolf.com\/uk\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Arctic Wolf<\/a>, the number of BEC attacks to which they have responded doubled between January-March and April-June \u2013 and these attacks accounted for over a third of all incidents investigated.<\/p>\n<p>There was a common theme among many of the victims: according to incident responders, 80% of the organisations that fell victim to BEC attacks didn&#8217;t have MFA in place.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">Multi-factor authentication<\/a> provides an extra layer of security for email accounts and <a href=\"https:\/\/www.zdnet.com\/article\/why-cloud-security-matters-and-why-you-cant-ignore-it\/\" rel=\"follow\">cloud application suites<\/a>, requiring the user to verify that it really was them who logged into the account, helping to protect against unauthorised intrusions \u2013 even if the attacker has the correct username and password.<\/p>\n<p>Organisations that ignore MFA are leaving themselves open to BEC campaigns and other cyberattacks \u2013 <a href=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" rel=\"follow\">despite repeated recommendations from cybersecurity agencies<\/a> that it should be applied. So, why aren&#8217;t they using it?<\/p>\n<p>&#8220;MFA requires careful planning and coordination to implement successfully, ensuring that organizations can continue to operate without disruption. Because users require training in how to use the MFA system, this may be difficult for some organisations,&#8221; Adrian Korn, manager of threat intelligence research at Arctic Wolf Labs, told ZDNET.&nbsp;<\/p>\n<p>&#8220;In addition, configuring and testing a new MFA deployment across an organisation can place a heavy burden on already strained IT departments,&#8221; he added.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/the-scary-future-of-the-internet-how-the-tech-of-tomorrow-will-pose-even-bigger-cybersecurity-threats\/\" rel=\"follow\">The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats<\/a><\/p>\n<p>Despite these potential restraints, applying MFA to all user accounts is one of the most significant things organisations can do to help protect their employees and their network from cyberattacks \u2013 if they&#8217;re set up correctly.<\/p>\n<p>&#8220;Organisations should plan their MFA deployments out well in advance to account for technical hiccups they may encounter. In addition, organisations should take time to ensure that MFA configurations are tested ahead of prime time and that users are well-trained on how to use the new MFA platform of choice,&#8221; said Korn.&nbsp;<\/p>\n<p>There different methods which organisations can use to provide staff with MFA. One of the most common is by using <a href=\"https:\/\/www.zdnet.com\/article\/protect-yourself-how-to-choose-the-right-two-factor-authenticator-app\/\" rel=\"follow\">identity and access management software or authenticator app<\/a>s to help manage account security by requiring login attempts to be verified by with the use of an alert sent to smartphone mobile application. Only after the push alert or code has been accepted will the user be able to login to their account.<\/p>\n<p>Another way of providing users with MFA is by providing them with a <a href=\"https:\/\/www.zdnet.com\/article\/yubikey-hands-on-hardware-based-2fa-is-more-secure-but-watch-out-for-these-gotchas\/\" rel=\"follow\">hardware key<\/a> which must be plugged into the device being used to login to the account before it can be accessed.&nbsp;<\/p>\n<p>But while MFA does help to prevent cyberattacks, it isn&#8217;t infallible and <a href=\"https:\/\/www.zdnet.com\/article\/hackers-are-attempting-to-steal-millions-of-dollars-from-businesses-by-bypassing-multi-factor-authentication\/\" rel=\"follow\">determined cyber criminals are finding ways to bypass it<\/a>. &nbsp;<\/p>\n<p>With BEC attacks using social engineering to trick people into thinking they&#8217;re doing the right thing, it&#8217;s also important for organisations to train their employees to detect when a request \u2013 even if it comes from a legitimate account \u2013 could be suspicious.&nbsp;<\/p>\n<p>&#8220;Users should be trained to recognise suspicious financial requests. If something feels off, users should heed that instinct and inquire further. Urgent financial requests should be validated through additional means before finalising major transactions,&#8221; said Korn.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These scammers are gaining access to real accounts that they&#8217;re using to dupe victims into sending payments. One change could help to stop it.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48735","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Victims of these online crooks lacked a key security feature. Don&#039;t make the same mistake 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Victims of these online crooks lacked a key security feature. Don&#039;t make the same mistake 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T11:53:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Victims of these online crooks lacked a key security feature. Don&#8217;t make the same mistake\",\"datePublished\":\"2022-10-04T11:53:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/66152c82180d31b45f9f44c82607b435eda96393\\\/2022\\\/09\\\/29\\\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\\\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/\",\"name\":\"Victims of these online crooks lacked a key security feature. Don't make the same mistake 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/66152c82180d31b45f9f44c82607b435eda96393\\\/2022\\\/09\\\/29\\\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\\\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-10-04T11:53:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/66152c82180d31b45f9f44c82607b435eda96393\\\/2022\\\/09\\\/29\\\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\\\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/66152c82180d31b45f9f44c82607b435eda96393\\\/2022\\\/09\\\/29\\\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\\\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Victims of these online crooks lacked a key security feature. Don&#8217;t make the same mistake\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Victims of these online crooks lacked a key security feature. Don't make the same mistake 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/","og_locale":"en_US","og_type":"article","og_title":"Victims of these online crooks lacked a key security feature. Don't make the same mistake 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-04T11:53:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Victims of these online crooks lacked a key security feature. Don&#8217;t make the same mistake","datePublished":"2022-10-04T11:53:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/"},"wordCount":793,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/","url":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/","name":"Victims of these online crooks lacked a key security feature. Don't make the same mistake 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200","datePublished":"2022-10-04T11:53:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/66152c82180d31b45f9f44c82607b435eda96393\/2022\/09\/29\/9bd6c8a1-50d6-4e45-bd95-aa18fbf24197\/a-woman-looking-concerned-while-using-a-laptop-in-an-office.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/victims-of-these-online-crooks-lacked-a-key-security-feature-dont-make-the-same-mistake\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Victims of these online crooks lacked a key security feature. Don&#8217;t make the same mistake"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48735"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48735\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}