{"id":53228,"date":"2023-08-14T16:06:38","date_gmt":"2023-08-14T16:06:38","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34899\/Federal-Board-Investigating-Microsoft-Email-Hacks-By-Chinese-Group.html"},"modified":"2023-08-14T16:06:38","modified_gmt":"2023-08-14T16:06:38","slug":"federal-board-investigating-microsoft-email-hacks-by-chinese-group","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/","title":{"rendered":"Federal Board Investigating Microsoft Email Hacks By Chinese Group"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/08\/0814_dhs.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Recent Chinese state-sponsored hacking of Microsoft email users, including leading U.S. officials, will be the focus of a review by the Department of Homeland Security\u2019s Cyber Safety Review Board (CSRB).<\/p>\n<p>Microsoft faced strong criticism last month after it revealed a <a href=\"https:\/\/www.scmagazine.com\/news\/microsoft-blocks-attack-on-cloud-email-accounts-by-chinese-apt-group\" target=\"_blank\" rel=\"noreferrer noopener\">hacking group<\/a> had acquired and used a private encryption key to forge authentication tokens to access the cloud-based email accounts of more than 25 organizations.<\/p>\n<p>Organizations targeted by the threat group, tracked as Storm-0558, reportedly included the U.S. State and Commerce departments, with Secretary of Commerce Gina Raimondo\u2019s email account among those compromised.<\/p>\n<p>In <a href=\"https:\/\/www.dhs.gov\/news\/2023\/08\/11\/department-homeland-securitys-cyber-safety-review-board-conduct-review-cloud\" target=\"_blank\" rel=\"noreferrer noopener\">a statement<\/a> on Friday, the DHS said the CSRB review would focus on approaches government, industry, and cloud service providers (CSPs) should employ to strengthen identity management and authentication in the cloud.<\/p>\n<p>As well as looking into the Storm-0558 attacks, the board would carry out \u201ca broader review of issues relating to cloud-based identity and authentication infrastructure affecting applicable CSPs and their customers,\u201d the DHS said.<\/p>\n<p>\u201cThe Board will develop actionable recommendations that will advance cybersecurity practices for both cloud computing customers and CSPs themselves.\u201d<\/p>\n<p>It will be the CSRB\u2019s third investigation: its first report in 2022 focused on the <a href=\"https:\/\/www.scmagazine.com\/brief\/feds-log4j-security-threat-to-persist\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j security flaw<\/a> and its second, made public last week, covered the <a href=\"https:\/\/www.scmagazine.com\/news\/lapsus-report-recommends-federal-agencies-clamp-down-on-sim-swapping\" target=\"_blank\" rel=\"noreferrer noopener\">Lapsus$ threat group<\/a>.<\/p>\n<p>News of the Microsoft\/CSPs review was welcomed by Sen. Ron Wyden, D-Ore., who <a href=\"https:\/\/www.scmagazine.com\/brief\/federal-probe-into-microsoft-email-hack-sought\">called for the CSRB to investigate<\/a> the Storm-0558 attacks two weeks ago, and accused Microsoft of acting negligently by allowing its encryption methods to be compromised.<\/p>\n<p>But in <a href=\"https:\/\/www.wyden.senate.gov\/news\/press-releases\/wyden-statement-on-cyber-safety-review-board-investigation-of-recent-microsoft-exchange-online-intrusion\" target=\"_blank\" rel=\"noreferrer noopener\">a statement<\/a>, Wyden was also critical of the earlier direction taken by the CSRB, saying its first report should have investigated the SolarWinds campaign, as it was expected to do based on the <a href=\"https:\/\/www.scmagazine.com\/news\/in-eo-federal-security-provides-impetus-for-far-reaching-cyber-implications\" target=\"_blank\" rel=\"noreferrer noopener\">2021 executive order<\/a> signed by President Joe Biden that led to the board\u2019s establishment.<\/p>\n<p>\u201cHad the board studied the 2020 SolarWinds hack, as President Biden originally directed, its findings might have been able to shore up federal cybersecurity in time to stop hackers from exploiting a similar vulnerability in the most recent incident,\u201d Wyden said.<\/p>\n<p>\u201cThe government will only be able to protect federal systems against cyberattacks by getting to the bottom of what went wrong. Ignoring problems is both a waste of taxpayer dollars and a massive gift to America&#8217;s adversaries.\u201d<\/p>\n<p>Rob Silvers, chair of the CSRB and undersecretary of Homeland Security for strategy, policy and plans, has <a href=\"https:\/\/www.scmagazine.com\/analysis\/dhs-official-says-log4j-proved-concept-behind-cyber-review-board-but-mum-on-plans-for-solarwinds\" target=\"_blank\" rel=\"noreferrer noopener\">previously said<\/a> the board pivoted from SolarWinds to Log4j for its first report after discussions with the White House because it was felt that would be a more valuable initial investigation.<\/p>\n<p>The CSRB does not have regulatory or enforcement powers, but is intended to be a body that identifies lessons from major cyber breaches so protections can be put in place.<\/p>\n<p>Commenting on the Microsoft\/CSPs review, Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency (CISA), said the security of cloud environments required a \u201cpersistent focus.&#8221;<\/p>\n<p>\u201cThe Board\u2019s findings and recommendations from this assessment will advance cybersecurity practices across cloud environments and ensure that we can collectively maintain trust in these critical systems,\u201d she said.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34899\/Federal-Board-Investigating-Microsoft-Email-Hacks-By-Chinese-Group.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53229,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10637],"class_list":["post-53228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentemailusachinadata-losscyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Federal Board Investigating Microsoft Email Hacks By Chinese Group 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal Board Investigating Microsoft Email Hacks By Chinese Group 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-14T16:06:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/08\/0814_dhs.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Federal Board Investigating Microsoft Email Hacks By Chinese Group\",\"datePublished\":\"2023-08-14T16:06:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg\",\"keywords\":[\"headline,hacker,government,email,usa,china,data loss,cyberwar\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\",\"name\":\"Federal Board Investigating Microsoft Email Hacks By Chinese Group 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg\",\"datePublished\":\"2023-08-14T16:06:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,email,usa,china,data loss,cyberwar\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentemailusachinadata-losscyberwar\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Federal Board Investigating Microsoft Email Hacks By Chinese Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Federal Board Investigating Microsoft Email Hacks By Chinese Group 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/","og_locale":"en_US","og_type":"article","og_title":"Federal Board Investigating Microsoft Email Hacks By Chinese Group 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-14T16:06:38+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/08\/0814_dhs.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Federal Board Investigating Microsoft Email Hacks By Chinese Group","datePublished":"2023-08-14T16:06:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg","keywords":["headline,hacker,government,email,usa,china,data loss,cyberwar"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/","url":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/","name":"Federal Board Investigating Microsoft Email Hacks By Chinese Group 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg","datePublished":"2023-08-14T16:06:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/federal-board-investigating-microsoft-email-hacks-by-chinese-group.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/federal-board-investigating-microsoft-email-hacks-by-chinese-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,email,usa,china,data loss,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentemailusachinadata-losscyberwar\/"},{"@type":"ListItem","position":3,"name":"Federal Board Investigating Microsoft Email Hacks By Chinese Group"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53228"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53228\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53229"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}