{"id":4927,"date":"2018-07-01T19:19:34","date_gmt":"2018-07-01T19:19:34","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=133235"},"modified":"2018-07-01T19:19:34","modified_gmt":"2018-07-01T19:19:34","slug":"bug-bounty-programs-turn-attention-to-data-abuse","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/","title":{"rendered":"Bug Bounty Programs Turn Attention to Data Abuse"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>More companies \u2013 particularly social media firms \u2013 may follow Facebook\u2019s footsteps in turning to bug bounty programs to scout out any data privacy abuse on their platforms, experts say.<\/p>\n<p>On the heels of Facebook\u2019s Cambridge-Analytica scandal in March, the social media giant launched a \u201cData Abuse Bounty Program\u201d in an attempt to crackdown on data misuse by third-party app developers.<\/p>\n<p>This past week, the program was put to good use after a bounty hunter working through the program spotted a popular Facebook app that was exposing the personal data \u2013 including private information, friends, posts and photos \u2013 of millions.<\/p>\n<p>\u201cI think that\u2019s an extension of the idea of crowdsourcing as a way to get work done.\u201d Casey Ellis, CEO of BugCrowd, told Threatpost. \u201cWhat we\u2019re focused on in bug bounty is mostly the identification of vulnerabilities in code, but what Facebook did with the privacy bounty after Cambridge Analytica, was mostly to use people that have this critical hacker-mindset to solve this issue that they have.\u201d<a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/29152908\/bug-bounty.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-133238 alignleft\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/29152908\/bug-bounty-300x132.png\" alt=\"\" width=\"300\" height=\"132\"\/><\/a><\/p>\n<p>Facebook in March first made the announcement it was expanding its bug bounty program: \u201cFacebook\u2019s bug bounty program will expand so that people can also report to us if they find misuses of data by app developers. We are beginning work on this and will have more details as we finalize the program updates in the coming weeks,\u201d wrote Ime Archibong, VP of platform partnerships at Facebook, at the time in a\u00a0<a href=\"https:\/\/developers.facebook.com\/blog\/post\/2018\/03\/26\/facebook-platform-changes\/\">post on the Facebook for Developers blog.<\/a><\/p>\n<p>Facebook said that it hopes the program will incentivize anyone to report apps collecting user data and passing it off to malicious parties to be exploited.<\/p>\n<p>In an outline of its data abuse bug bounty program, Facebook said it is looking for any situation where a third-party app currently or formerly operating on Facebook collected data from users and then bought, sold, disclosed, transferred, or used Facebook user data in any manner prohibited by its data privacy policies. Should malicious apps be found, Facebook said it would result in termination of the application from the platform.<\/p>\n<p>\u201cIt\u2019s an interesting development as an extension to data use and privacy,\u201d Amit Elazari, an expert in the policies and legalese surrounding bug\u00a0bounty programs, told Threatpost.<\/p>\n<p>The program seems to be working in drawing in interested white hat hackers, at least for Inti De Ceukelaire, who published a <a href=\"https:\/\/medium.com\/@intideceukelaire\/this-popular-facebook-app-publicly-exposed-your-data-for-years-12483418eff8\">post\u00a0<\/a>on his findings through the bug bounty program on Wednesday.<\/p>\n<p>Ceukelaire said that he found that 120 million users\u2019 data was exposed on a quiz app owned by Nametests.com. The ethical hacker noticed the website would fetch his personal information and display it on the webpage, nametests[.]com\/appconfig_user. The data\u00a0was then available for other sites to swipe it, he said.<a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/29152854\/bug-bounty-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-133237 alignleft\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/29152854\/bug-bounty-2-300x214.png\" alt=\"\" width=\"300\" height=\"214\"\/><\/a><\/p>\n<p>The researcher said he reported the flaw to Facebook\u2019s Data Abuse program on April 22, and noticed the issue was fixed June 25. Ceukelaire said at his request,\u00a0Facebook\u00a0donated\u00a0$8,000\u00a0to the Freedom of the Press Foundation as part of their\u00a0Data Abuse Bounty Program.<\/p>\n<p>\u201cI have mixed feelings about this one. I am glad both Facebook and NameTests cooperated and resolved the issue,\u201d he said. \u201cOn the other hand, we cannot accept that the information of hundreds of millions of users could have been leaked out so easily. We can and must do better.\u201d<\/p>\n<p>Craig Young, computer security researcher for Tripwire, said \u201cit\u2019s possible that this could be the start of a trend toward more policy-oriented bug bounties from social media platforms.\u201d<\/p>\n<p>\u201c[The program] really makes a lot of sense to me,\u201d he said. \u201cBy expanding their bounty program to include data misuse by app developers, Facebook may have found a way to mobilize their community to self-police. It will be interesting to see if this if spurs new bug bounty participation including people less technical than the typical bug hunter.\u201d<\/p>\n<p>Ellis, for his part, told Threatpost he sees the program extension as an emerging trend for other social media website in the future, particularly as data privacy becomes a bigger issue.<\/p>\n<p>\u201cThat\u2019s a new idea and I think it will ramp up slowly but I do see that growing over time as well,\u201d Ellis said.<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/bug-bounty-programs-turn-attention-to-data-abuse\/133235\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More companies \u2013 particularly social media firms \u2013 may follow Facebook\u2019s footsteps in turning to bug bounty programs to scout out any data privacy abuse on their platforms, experts say. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4928,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[35,1684,1685,101,4,1686,18,1687,69],"class_list":["post-4927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-bug-bounty","tag-bug-bounty-program","tag-cambridge-analytic","tag-data-privacy","tag-facebook","tag-facebook-app","tag-hacks","tag-malicious-app","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bug Bounty Programs Turn Attention to Data Abuse 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bug Bounty Programs Turn Attention to Data Abuse 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-01T19:19:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/bug-bounty-programs-turn-attention-to-data-abuse.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"132\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Bug Bounty Programs Turn Attention to Data Abuse\",\"datePublished\":\"2018-07-01T19:19:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/bug-bounty-programs-turn-attention-to-data-abuse.png\",\"keywords\":[\"bug bounty\",\"bug bounty program\",\"Cambridge analytic\",\"Data Privacy\",\"Facebook\",\"facebook app\",\"Hacks\",\"malicious app\",\"Web Security\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/\",\"name\":\"Bug Bounty Programs Turn Attention to Data Abuse 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/bug-bounty-programs-turn-attention-to-data-abuse.png\",\"datePublished\":\"2018-07-01T19:19:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/bug-bounty-programs-turn-attention-to-data-abuse.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/bug-bounty-programs-turn-attention-to-data-abuse.png\",\"width\":300,\"height\":132},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-bounty-programs-turn-attention-to-data-abuse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"bug bounty\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/bug-bounty\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bug Bounty Programs Turn Attention to Data Abuse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bug Bounty Programs Turn Attention to Data Abuse 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/","og_locale":"en_US","og_type":"article","og_title":"Bug Bounty Programs Turn Attention to Data Abuse 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-01T19:19:34+00:00","og_image":[{"width":300,"height":132,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/bug-bounty-programs-turn-attention-to-data-abuse.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Bug Bounty Programs Turn Attention to Data Abuse","datePublished":"2018-07-01T19:19:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/"},"wordCount":707,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/bug-bounty-programs-turn-attention-to-data-abuse.png","keywords":["bug bounty","bug bounty program","Cambridge analytic","Data Privacy","Facebook","facebook app","Hacks","malicious app","Web Security"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/","url":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/","name":"Bug Bounty Programs Turn Attention to Data Abuse 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/bug-bounty-programs-turn-attention-to-data-abuse.png","datePublished":"2018-07-01T19:19:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/bug-bounty-programs-turn-attention-to-data-abuse.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/bug-bounty-programs-turn-attention-to-data-abuse.png","width":300,"height":132},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bug-bounty-programs-turn-attention-to-data-abuse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"bug bounty","item":"https:\/\/www.threatshub.org\/blog\/tag\/bug-bounty\/"},{"@type":"ListItem","position":3,"name":"Bug Bounty Programs Turn Attention to Data Abuse"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4927"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4927\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4928"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}