{"id":55050,"date":"2024-01-12T14:20:05","date_gmt":"2024-01-12T14:20:05","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35391\/Prolific-ShinyHunters-Hacker-Jailed-Ordered-To-Repay-5-Million.html"},"modified":"2024-01-12T14:20:05","modified_gmt":"2024-01-12T14:20:05","slug":"prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/","title":{"rendered":"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/11\/1115_handcuffs.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A key member of the ShinyHunters hacking group was sentenced to three years\u2019 imprisonment for his role in the theft and sale of hundreds of millions of records stolen from more than 60 companies.<\/p>\n<p>Sebastien Raoult, a 22-year-old French citizen, was convicted on conspiracy to commit wire fraud and aggravated identity theft charges. As part of his sentence, he was also ordered to pay more than $5 million in restitution by the U.S. District Court in Seattle.<\/p>\n<p>ShinyHunters was a <a href=\"https:\/\/www.scmagazine.com\/news\/shiny-hunters-latest-hit-minted-among-73-1m-records-offered\" target=\"_blank\" rel=\"noreferrer noopener\">prominent threat group<\/a> in 2020 and 2021, responsible for stealing data from dozens of companies in the U.S. and around the world. Its victims included math-problem-solving app <a href=\"https:\/\/www.scmagazine.com\/news\/mathway-breach-latest-caper-for-shiny-hunters\" target=\"_blank\" rel=\"noreferrer noopener\">Mathway<\/a>, meal delivery service <a href=\"https:\/\/www.scmagazine.com\/news\/home-chef-confirms-data-breach-after-eight-million-records-sold-on-dark-web\" target=\"_blank\" rel=\"noreferrer noopener\">Home Chef<\/a> and overdraft protection and cash advance service <a href=\"https:\/\/www.scmagazine.com\/news\/dave-shinyhunters-hack-exposes-7-5-million-user-records\" target=\"_blank\" rel=\"noreferrer noopener\">Dave<\/a>.<\/p>\n<p><a href=\"https:\/\/www.justice.gov\/usao-wdwa\/pr\/member-notorious-international-hacking-crew-sentenced-prison\" target=\"_blank\" rel=\"noreferrer noopener\">According to the Department of Justice<\/a> and records filed in the case, Raoult\u2019s role in the gang included helping craft malicious webpages that masqueraded as the login pages of legitimate businesses. ShinyHunters lured victims to the pages using phishing emails and harvested the credentials that were entered.<\/p>\n<p>The gang used the harvested credentials to break into victims\u2019 accounts to steal corporate data, including additional credentials they used to access company networks and third-party providers, such as cloud storage services.<\/p>\n<p>ShinyHunters then advertised its trove of stolen personally identifiable information and corporate financial data for sale on dark web forums, including RaidForums, EmpireMarket and Exploit.<\/p>\n<p>The gang marketed stolen data from more than 60 companies on the forums between April 2020 and July 2021. It also engaged in ransom activities with some of its victims, threatening to leak or sell stolen sensitive files if money was not paid.<\/p>\n<p>Authorities said ShinyHunters\u2019 crime spree caused an estimated loss to victims of more than $6 million.<\/p>\n<p>Raoult, known online as \u201cSezyo Kaizen,\u201d was arrested in 2022 in Morocco and was extradited to the U.S. in January 2023.<\/p>\n<p>\u201cThe lengths to which Mr. Raoult and his co-conspirators went to steal personal and financial information are remarkably devious, and he played a substantial part in the scheme by creating code and phishing websites,&#8221; said Richard Collodi, special agent in charge of the FBI\u2019s Seattle field office.<\/p>\n<p>Sarah Vogel of the U.S. District Attorney&#8217;s Office in the Western District of Washington said Raoult was motivated by \u201cpure greed.\u201d<\/p>\n<p>\u201cHe sold hacked data. He stole people\u2019s cryptocurrency. He even sold his hacking tools so that he could profit while other hackers attacked additional victims,\u201d Vogel said.<\/p>\n<p>At this week\u2019s sentencing hearing, U.S. District Judge Robert S. Lasnik described Raoult\u2019s offending as \u201cextraordinarily serious \u2026 We\u2019re talking about him robbing people of millions of dollars.\u201d<\/p>\n<p>Speaking to the court, Raoult said: \u201cI understand my mistakes and I want to put that part behind me. No more hacking. I don\u2019t want to disappoint my family again.\u201d<\/p>\n<p>Judge Lasnik said he believed Raoult\u2019s arrest and imprisonment had \u201cgotten through\u201d to the apparently remorseful hacker. However, he urged the young man\u2019s family and friends in the courtroom to \u201ckeep an eye on him\u201d when he returned to France after completing his sentence, to ensure he did not return to a life of crime.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35391\/Prolific-ShinyHunters-Hacker-Jailed-Ordered-To-Repay-5-Million.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55051,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10692],"class_list":["post-55050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerdata-lossfrance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-12T14:20:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/11\/1115_handcuffs.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million\",\"datePublished\":\"2024-01-12T14:20:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/\"},\"wordCount\":528,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg\",\"keywords\":[\"headline,hacker,data loss,france\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/\",\"name\":\"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg\",\"datePublished\":\"2024-01-12T14:20:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg\",\"width\":982,\"height\":653},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,data loss,france\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerdata-lossfrance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/","og_locale":"en_US","og_type":"article","og_title":"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-12T14:20:05+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/11\/1115_handcuffs.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million","datePublished":"2024-01-12T14:20:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/"},"wordCount":528,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg","keywords":["headline,hacker,data loss,france"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/","url":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/","name":"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg","datePublished":"2024-01-12T14:20:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million.jpg","width":982,"height":653},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/prolific-shinyhunters-hacker-jailed-ordered-to-repay-5-million\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,data loss,france","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerdata-lossfrance\/"},{"@type":"ListItem","position":3,"name":"Prolific ShinyHunters Hacker Jailed, Ordered To Repay $5 Million"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55050"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55050\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55051"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}