{"id":50990,"date":"2023-03-13T14:10:08","date_gmt":"2023-03-13T14:10:08","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34413\/GitHub-To-Roll-Out-2FA-For-All-Contributors-March-13.html"},"modified":"2023-03-13T14:10:08","modified_gmt":"2023-03-13T14:10:08","slug":"github-to-roll-out-2fa-for-all-contributors-march-13","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/","title":{"rendered":"GitHub To Roll Out 2FA For All Contributors March 13"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/12\/121622_github.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>GitHub will begin its official rollout of two-factor authentication for developers who contribute code on the platform, starting March 13.&nbsp;&nbsp;<\/p>\n<p>The step comes under a plan announced last May to make 2FA mandatory for all contributors by the end of 2023. If successful, the requirement could help to better secure the accounts of over 100 million users, protecting them from <a href=\"https:\/\/www.scmagazine.com\/news\/third-party-risk\/secrets-surge-10-million-github-human-error-drives-exposure\" target=\"_blank\" rel=\"noreferrer noopener\">software supply chain attacks<\/a> and other threats levied at the platform.&nbsp;&nbsp;<\/p>\n<p>&#8220;Over the course of the next year, we&#8217;ll be reaching out to groups of developers and administrators, starting with smaller groups on March 13, to notify them of their 2FA enrollment requirement,&#8221; GitHub wrote in <a href=\"https:\/\/github.blog\/2023-03-09-raising-the-bar-for-software-security-github-2fa-begins-march-13\/\" target=\"_blank\" rel=\"noreferrer noopener\">a blog post<\/a> on Thursday. &#8220;This gradual rollout will let us make sure developers are able to successfully onboard, and make adjustments as needed before we scale to larger groups as the year progresses.&#8221;&nbsp;&nbsp;<\/p>\n<p>If selected, developers will be notified via email and have 45 days to configure 2FA on their accounts. During this time, accounts can be kept as usual, except for occasional reminders.&nbsp;&nbsp;<\/p>\n<p>Users who are not selected in the early enrollment group but would like to set up 2FA can <a href=\"https:\/\/docs.github.com\/en\/authentication\/securing-your-account-with-two-factor-authentication-2fa\" target=\"_blank\" rel=\"noreferrer noopener\">click here<\/a> to enroll.&nbsp;&nbsp;<\/p>\n<p><strong>SMS now, passkeys<\/strong> <strong>later<\/strong><\/p>\n<p>Along with setting next Monday as the official start day, GitHub added that it will support SMS text messages as a second factor, while testing FIDO Alliance passkeys internally to improve the security posture.&nbsp;&nbsp;<\/p>\n<p>While SMS is deemed less secure than other second factors in the security community, some experts still praised GitHub&#8217;s decision to keep it.&nbsp;<\/p>\n<p>&#8220;It is true that SMS 2FA can be easily phished by hackers as it relies on knowledge-based credentials. But GitHub recognizes these risks and strongly recommends using security keys and TOTPS wherever possible for greater security &#8212; [and] will continue to offer SMS for 2FA &#8212; which is better than removing the option entirely,&#8221; said Andrew Shikiar, executive director of the FIDO alliance.&nbsp;<\/p>\n<p>Timothy De Block, application security engineering practice lead at GuidePoint Security, added that SMS also adds a measure of convenience, particularly regarding account recovery.&nbsp;&nbsp;<\/p>\n<p>&#8220;If a phone is lost, wiped, or dropped in the toilet, the authentication app is no longer synced with the authentication mechanism of their account. And if users do not have backup codes, it will be difficult to recover the account. But with SMS, they just need to get a new phone with the same number,&#8221; said Block.&nbsp;<\/p>\n<p>GitHub&#8217;s support of SMS starkly contrasts with that of Twitter, which <a href=\"https:\/\/www.scmagazine.com\/analysis\/identity-and-access\/what-should-musk-do-to-better-secure-twitter-users-after-2fa-goes-away\" target=\"_blank\" rel=\"noreferrer noopener\">eliminated the function<\/a> a month ago for non-subscribers.&nbsp;&nbsp;<\/p>\n<p>Regarding passkeys, the platform did not specify their deployment timeline but said they have already tested them internally.&nbsp;&nbsp;<\/p>\n<p>Security experts speak highly of passkey, with many viewing it as a long-term solution to defend against software supply chain attacks.&nbsp;&nbsp;<\/p>\n<p>&#8220;Passkeys change the paradigm of how people are typically authenticating online today by replacing the password &#8212; a fundamentally flawed first factor &#8212; with an un-phishable primary factor for user authentication that is built into virtually every modern computing device today,&#8221; said Shikiar. &#8220;Many attacks on Cloud Service Providers (CSPs) and the software supply chain can be tied back to weak authentication and\/or compromised credentials. The primary attack vector is removed by implementing passkeys, which greatly reduces the risk of hackers carrying out scalable attacks.&#8221;&nbsp;&nbsp;<\/p>\n<p>&#8220;The rise of passkeys has also seen the adoption of novel methods, such as password-less authentication with email and One-time-use Code\/Magic links that offer both high security and convenience while ensuring the login flow is predictable for end users. With improved adoption, I expect it to become mainstream soon,&#8221; added Debrup Ghosh, staff product manager at Synopsys.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34413\/GitHub-To-Roll-Out-2FA-For-All-Contributors-March-13.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50991,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6638],"class_list":["post-50990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemicrosoftpassword"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GitHub To Roll Out 2FA For All Contributors March 13 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GitHub To Roll Out 2FA For All Contributors March 13 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-13T14:10:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/12\/121622_github.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"GitHub To Roll Out 2FA For All Contributors March 13\",\"datePublished\":\"2023-03-13T14:10:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/\"},\"wordCount\":637,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg\",\"keywords\":[\"headline,microsoft,password\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/\",\"name\":\"GitHub To Roll Out 2FA For All Contributors March 13 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg\",\"datePublished\":\"2023-03-13T14:10:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg\",\"width\":1500,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/github-to-roll-out-2fa-for-all-contributors-march-13\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,password\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemicrosoftpassword\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"GitHub To Roll Out 2FA For All Contributors March 13\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GitHub To Roll Out 2FA For All Contributors March 13 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/","og_locale":"en_US","og_type":"article","og_title":"GitHub To Roll Out 2FA For All Contributors March 13 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-13T14:10:08+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/12\/121622_github.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"GitHub To Roll Out 2FA For All Contributors March 13","datePublished":"2023-03-13T14:10:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/"},"wordCount":637,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg","keywords":["headline,microsoft,password"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/","url":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/","name":"GitHub To Roll Out 2FA For All Contributors March 13 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg","datePublished":"2023-03-13T14:10:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/github-to-roll-out-2fa-for-all-contributors-march-13.jpg","width":1500,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/github-to-roll-out-2fa-for-all-contributors-march-13\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,password","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftpassword\/"},{"@type":"ListItem","position":3,"name":"GitHub To Roll Out 2FA For All Contributors March 13"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50990"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50990\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50991"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}