{"id":51864,"date":"2023-05-11T21:43:00","date_gmt":"2023-05-11T21:43:00","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains-"},"modified":"2023-05-11T21:43:00","modified_gmt":"2023-05-11T21:43:00","slug":"juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/","title":{"rendered":"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Hampshire, UK \u2013 11th May 2023:<\/strong> A new study from <a href=\"https:\/\/www.juniperresearch.com\/home?utm_campaign=other_blackberrycybersecurity_technology_security_may23&amp;utm_source=roxhill&amp;utm_medium=pr\" target=\"_blank\" rel=\"noopener\">Juniper Research<\/a>, the foremost experts in cybersecurity markets, has found that the total cost of software supply chain cyberattacks to businesses will exceed $80.6 billion globally by 2026, up from $45.8 billion in 2023. This growth of 76% reflects increasing risks from absent software supply chain security processes, and the rising complexity of software supply chains overall.<\/p>\n<p>The new study, <a href=\"https:\/\/www.juniperresearch.com\/whitepapers\/vulnerable-software-supply-chains-problem?utm_campaign=other_blackberrycybersecurity_technology_security_may23&amp;utm_source=roxhill&amp;utm_medium=pr\" target=\"_blank\" rel=\"noopener\">Vulnerable Software Supply Chains Are a Multi-billion Dollar Problem<\/a>, highlights the need for greater emphasis on the software elements of the supply chain as a critical security vulnerability. The study analysed how both shifts in wider cybersecurity processes, and the mindset around the management of the software supply chain are needed to address these risks.<\/p>\n<p>&#8220;The software supply chain has been neglected over the years as a source of risk, leading to a situation where organisations face significant issues, if they cannot change the way they operate,&#8221; said Nick Maynard, report author and Head of Research at Juniper Research. &#8220;As software supply chains become more complex, the problem becomes exponentially more complicated, requiring immediate attention to resolve, through regulations, SBOMs (Software Bills of Materials), embedded security, and cybersecurity solutions.&#8221;<\/p>\n<p><a href=\"https:\/\/www.blackberry.com\/us\/en\" target=\"_blank\" rel=\"noopener\">BlackBerry<\/a>, a seasoned security vendor, commented on the study. &#8220;Enhancing the security of software supply chains is critical for national security and for building a trusted digital world,&#8221; said Arvind Raman, CISO, BlackBerry. &#8220;BlackBerry welcomes this study from Juniper Research, which outlines why software supply chain security practices must be adopted by all industries, and we are pleased to be recognised for our best-in-class security solutions that address this market need. BlackBerry has long been a champion of built-in security and a pioneer of cybersecurity, which is why we have earned the trust of organisations around the world.&#8221;<\/p>\n<p>The study also examines the importance of software supply chains across several verticals, including, financial services, government, automotive, and healthcare, making the study vital reading for key stakeholders in those high-risk industries.<\/p>\n<p><a href=\"https:\/\/www.juniperresearch.com\/whitepapers\/vulnerable-software-supply-chains-problem?utm_campaign=other_blackberrycybersecurity_technology_security_may23&amp;utm_source=roxhill&amp;utm_medium=pr\" target=\"_blank\" rel=\"noopener\">The study can be viewed here.<\/a><\/p>\n<p><strong>About Juniper Research<\/strong><\/p>\n<p><a href=\"https:\/\/www.juniperresearch.com\/home?utm_campaign=other_blackberrycybersecurity_technology_security_may23&amp;utm_source=roxhill&amp;utm_medium=pr\" target=\"_blank\" rel=\"noopener\">Juniper Research<\/a> provides research and analytical services to the global hi-tech communications sector; providing consultancy, analyst reports, and industry commentary.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains-\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New data shows cyberattacks targeting software supply chains will cost the global economy $80.6 billion annually by 2026.Read More <a href=\"https:\/\/www.darkreading.com\/operations\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains-\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51864","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-11T21:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains\",\"datePublished\":\"2023-05-11T21:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/\"},\"wordCount\":365,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/\",\"name\":\"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2023-05-11T21:43:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/","og_locale":"en_US","og_type":"article","og_title":"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-11T21:43:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains","datePublished":"2023-05-11T21:43:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/"},"wordCount":365,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/","url":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/","name":"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2023-05-11T21:43:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/juniper-research-study-reveals-staggering-cost-of-vulnerable-software-supply-chains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51864"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51864\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}