{"id":51604,"date":"2023-04-24T14:37:08","date_gmt":"2023-04-24T14:37:08","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34544\/GhostToken-Vuln-Could-Permanently-Expose-Data-Of-Google-Users.html"},"modified":"2023-04-24T14:37:08","modified_gmt":"2023-04-24T14:37:08","slug":"ghosttoken-vuln-could-permanently-expose-data-of-google-users","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/","title":{"rendered":"GhostToken Vuln Could Permanently Expose Data Of Google Users"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/042123_google_workspace.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A zero-day vulnerability dubbed \u201cGhostToken\u201d could let threat actors gain unremovable access to a victim&#8217;s Google account by converting an authorized third-party app into a malicious trojan, leaving a victim&#8217;s personal data exposed indefintely.&nbsp;<\/p>\n<p>In an April 20 <a href=\"https:\/\/astrix.security\/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts\/\">blog post<\/a>, Astrix\u2019s Security Research Group, explained that by exploiting GhostToken, attackers can hide their malicious app from the victim\u2019s Google account&nbsp;<a href=\"https:\/\/myaccount.google.com\/permissions\">application management page<\/a>. Because it\u2019s the only place Google users can see their apps and revoke access, the exploit makes the malicious app unremovable from the Google account.<\/p>\n<p>On the other hand, the attacker can use a refresh token they receive when they take over the victim\u2019s account to access the victim\u2019s account and then hide the app again to restore its unremovable state. Since these applications are hidden from the victim\u2019s view, the victim remains in the dark. They are prevented from even knowing their account has been hacked \u2014 and even if they do suspect it \u2014 the only step they can take is to set up a new Google account.<\/p>\n<p>The Astrix researchers said any <a href=\"https:\/\/services.google.com\/fh\/files\/blogs\/gcat_threathorizons_full_apr2023.pdf\">Google<\/a> account is a potential target of GhostToken. It\u2019s significant because this includes Google Workspace&#8217;s 3 billion&nbsp;users. Astrix first published news about the GhostToken zero-day on June 19, 2022, and Google released a patch earlier this month on April 7. As per Astrix\u2019s coordination efforts with Google, the patch included adding tokens of OAuth applications in a \u201cpending deletion\u201d state to the user\u2019s app management screen.<\/p>\n<p>While security researchers can consider this new from a \u201cknown attack technique\u201d perspective, the abused feature it leverages has been there for a while, said Mike Parkin, senior technical engineer at Vulcan Cyber.<\/p>\n<p>\u201cIt&#8217;s not related to the <a href=\"https:\/\/www.scmagazine.com\/news\/vulnerability-management\/google-patches-another-zero-day-exploiting-chrome-browser\">recent zero-day attacks reported<\/a> in Chrome,\u201d said Parkin.&nbsp;\u201cThis is an issue with how Google&#8217;s ecosystem handles third-party authorizations and has already been corrected.&nbsp;The \u2018permanent and unremovable\u2019 claims were a bit hyperbolic as a fix was obvious and easily implemented.\u201d<\/p>\n<p>Of course, depending on the permissions victims assign the malicious app, attackers can potentially read the victim\u2019s private correspondences in Gmail, gain access to personal Google Drive and Google Photos files, view planned events on Google calendar, track the victim\u2019s location via Google Maps, and grant access to the victim\u2019s Google Cloud Platform services.&nbsp;<\/p>\n<p>Craig Burland, chief information security officer at Inversion6, added that the disclosure from Astrix should help cybersecurity teams bring focus to cloud security and specifically third-party integrations. Burland said the cloud ecosystem offers a wealth of integrations that can add or enhance capabilities: everything from simple mail-merge to full-blown analytics are just a few clicks away.<\/p>\n<p>\u201cBut there\u2019s another side to that coin,\u201d said Burland. \u201cCyber teams are already struggling to efficiently and effectively manage third-party risk as organizations lob 300-question surveys at each other in desperation. Cloud integrations bypass all of that governance and cut straight to the heart, boosting productivity and also inviting risk. So, who looks to see what\u2019s integrated with your cloud application? Who checks what rights and permissions have been granted? What personal data has been exposed?\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34544\/GhostToken-Vuln-Could-Permanently-Expose-Data-Of-Google-Users.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51605,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5076],"class_list":["post-51604","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacydata-lossflawgoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GhostToken Vuln Could Permanently Expose Data Of Google Users 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GhostToken Vuln Could Permanently Expose Data Of Google Users 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T14:37:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/042123_google_workspace.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"GhostToken Vuln Could Permanently Expose Data Of Google Users\",\"datePublished\":\"2023-04-24T14:37:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg\",\"keywords\":[\"headline,privacy,data loss,flaw,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\",\"name\":\"GhostToken Vuln Could Permanently Expose Data Of Google Users 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg\",\"datePublished\":\"2023-04-24T14:37:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,data loss,flaw,google\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacydata-lossflawgoogle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"GhostToken Vuln Could Permanently Expose Data Of Google Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GhostToken Vuln Could Permanently Expose Data Of Google Users 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/","og_locale":"en_US","og_type":"article","og_title":"GhostToken Vuln Could Permanently Expose Data Of Google Users 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-24T14:37:08+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/042123_google_workspace.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"GhostToken Vuln Could Permanently Expose Data Of Google Users","datePublished":"2023-04-24T14:37:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg","keywords":["headline,privacy,data loss,flaw,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/","url":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/","name":"GhostToken Vuln Could Permanently Expose Data Of Google Users 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg","datePublished":"2023-04-24T14:37:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/ghosttoken-vuln-could-permanently-expose-data-of-google-users.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ghosttoken-vuln-could-permanently-expose-data-of-google-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,data loss,flaw,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacydata-lossflawgoogle\/"},{"@type":"ListItem","position":3,"name":"GhostToken Vuln Could Permanently Expose Data Of Google Users"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51604"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51604\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51605"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}