{"id":55437,"date":"2024-02-26T13:21:32","date_gmt":"2024-02-26T13:21:32","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35580\/Fox-News-Hacker-Was-Just-Journalist-Doing-His-Job-Claim-Lawyers.html"},"modified":"2024-02-26T13:21:32","modified_gmt":"2024-02-26T13:21:32","slug":"fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/","title":{"rendered":"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers"},"content":{"rendered":"<p><span class=\"label\">in brief<\/span> A Florida journalist has been arrested and charged with breaking into protected computer systems in a case his lawyers say was less &#8220;hacking,&#8221; more &#8220;good investigative journalism.&#8221;&nbsp;<\/p>\n<p>Tim Burke was arrested on Thursday and <a target=\"_blank\" href=\"https:\/\/www.tampabay.com\/news\/tampa\/2024\/02\/22\/tim-burke-fox-news-indicted-tucker-carlson-federal-charges\/\" rel=\"nofollow noopener\">charged<\/a> with one count of conspiracy, six counts of accessing a protected computer without authorization, and seven counts of intercepting or disclosing wire, oral or electronic communications for his supposed role in the theft of unedited video streams from Fox News.<\/p>\n<p>Among the videos allegedly stolen from Fox by Burke were unaired antisemitic remarks by rapper Kanye West, and others. Burke accessed the footage using compromised credentials, and then altered recordings to mask their origin, the indictment claims.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Burke&#8217;s lawyers countered the charges, asserting he engaged in no hacking and committed no crimes; he merely followed a link to the feeds without ever being asked to input any credentials.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>&#8220;While we, like anyone else, condemn computer hacking, we emphatically insist that the facts of this case will demonstrate that there was, in fact, no hacking whatsoever,&#8221; Burke&#8217;s lawyers told the Tampa Bay Times. They further argued that publishing his findings is protected by the first amendment since Burke was acting as a journalist.<\/p>\n<p>The Electronic Frontier Foundation (EFF) agrees, saying in a statement yesterday that it wants the US Justice Department to explain how what Burke did was an actual violation of the Computer Fraud and Abuse Act (CFAA), as the indictment alleges.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;The law remains vague, too often allowing prosecutors and private parties to claim that individuals knew or should have known what they were doing was unauthorized, even when no technical barrier prevented them from accessing a server or website,&#8221; the EFF <a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2024\/02\/justice-department-even-following-its-own-policy-cybercrime-prosecution-journalist\" rel=\"nofollow noopener\">said<\/a>.&nbsp;<\/p>\n<p>What Burke did may be permissible under the Justice Department&#8217;s <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/05\/20\/cfaa_rule_change\/\" rel=\"noopener\">decision not to prosecute<\/a> good faith violations of the CFAA too, though as we noted in previous coverage if access was in any way unauthorized the good faith exception wouldn&#8217;t apply.<\/p>\n<div class=\"boxout\" readability=\"9.5391705069124\">\n<h3 class=\"crosshead\">Critical vulnerabilities of the week<\/h3>\n<p>There weren&#8217;t that many to report this past week, aside from a few vulnerabilities in ICS products, which isn&#8217;t exactly a shock \u2013 flaws in those things are everywhere.<\/p>\n<ul>\n<li>CVSS 9.8 \u2013 <a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-24-051-03\" rel=\"nofollow noopener\">CVE-2023-21554<\/a>: Several models of Mitsubishi electrical discharge machines are subject to a vulnerability in Microsoft Message Queueing services that could allow an attacker to tamper with devices, execute remote code and the like.<\/li>\n<li>CVSS-9.8 \u2013 <a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-24-051-02\" rel=\"nofollow noopener\">Multiple CVEs<\/a>: The Ethercat plugin for Zeek network security monitoring software contains OOB read\/write vulnerabilities in GitHub commits d78dda6 and prior. This could be used to trigger RCE.&nbsp;<\/li>\n<li>CVSS 9.4 \u2013 <a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-24-051-01\" rel=\"nofollow noopener\">Multiple CVEs<\/a>: Commend WS203VICM video door stations running software versions 1.7 and prior are weakly encoding passwords, improperly controlling access and are vulnerable to argument injection.<\/li>\n<\/ul>\n<\/div>\n<h3 class=\"crosshead\">Apple&#8217;s app approval process fails again, leading to crypto theft<\/h3>\n<p>It&#8217;s apparently faster for a scammer to create a spoof app and get it through Apple&#8217;s App Store approval process than it is for legitimate devs nowadays, a case in point being what happened to Rabby Wallet this past week.<\/p>\n<p>Rabby, a cryptocurrency wallet that&#8217;s still undergoing App Store approval, had an impersonator make it into the App Store, with subsequent <a target=\"_blank\" href=\"https:\/\/discussions.apple.com\/thread\/255482851?answerId=260185331022&amp;sortBy=best#260185331022\" rel=\"nofollow noopener\">reports<\/a> by a number of people who reported having their accounts emptied after installing the fake app. Rabby was forced to take to social media to say that a fake app was out there, and <a target=\"_blank\" href=\"https:\/\/twitter.com\/Rabby_io\/status\/1758476458559738181\" rel=\"nofollow noopener\">restating<\/a> that the real Rabby Wallet is still under review.&nbsp;<\/p>\n<p>This is the second time this month that we&#8217;ve reported on fake iOS apps making it through the approval process and fooling iPhone users \u2013 not a great look for a supposedly safe, locked-down ecosystem like Apple&#8217;s.<\/p>\n<p>Just like in the previous case with <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/02\/08\/lastpass_lookalike_apple_app_store\/\" rel=\"noopener\">LastPass<\/a>, keep an eye on the developer name, reviews, and the like when downloading anything.<\/p>\n<h3 class=\"crosshead\">EV chargers pulled from UK shelves for not meeting cybersecurity requirements<\/h3>\n<p>The UK Office for Product Safety and Standards (OPSS) has told EV charger maker Wallbox to stop selling its Copper SB car chargers because they don&#8217;t comply with UK cybersecurity laws, The Telegraph <a target=\"_blank\" href=\"https:\/\/www.telegraph.co.uk\/news\/2024\/02\/21\/car-charger-withdrawn-hackers-could-attack-national-grid\/\" rel=\"nofollow noopener\">reported<\/a>.<\/p>\n<p>According to the outlet, the concern was over the possibility that Copper SB chargers, which can be controlled with a smartphone app, could potentially be exploited to turn them all on at the same time, causing a sudden drain on the power grid.<\/p>\n<p>Wallbox was granted a temporary waiver to continue selling the products until June, at which time the devices will be taken off the market because Wallbox &#8220;cannot implement the Cybersecurity requirements in full on this product because of a hardware and operating system limitation,&#8221; the company <a target=\"_blank\" href=\"https:\/\/assets.publishing.service.gov.uk\/media\/64b69f3361adff000d01b2b0\/evscp-undertaking-wallbox-04.pdf\" rel=\"nofollow noopener\">told<\/a> [PDF] the OPSS.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>We note, as did the Telegraph and Wallbox, that there&#8217;s no evidence of a flaw in Copper SB hardware that could cause a grid stress attack \u2013 merely that the hardware can&#8217;t be secured up to modern UK standards. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35580\/Fox-News-Hacker-Was-Just-Journalist-Doing-His-Job-Claim-Lawyers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1647],"class_list":["post-55437","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinehackerprivacydata-loss"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-26T13:21:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers\",\"datePublished\":\"2024-02-26T13:21:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/\"},\"wordCount\":831,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"keywords\":[\"headline,hacker,privacy,data loss\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/\",\"name\":\"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2024-02-26T13:21:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,data loss\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacydata-loss\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/","og_locale":"en_US","og_type":"article","og_title":"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-02-26T13:21:32+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers","datePublished":"2024-02-26T13:21:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/"},"wordCount":831,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","keywords":["headline,hacker,privacy,data loss"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/","url":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/","name":"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2024-02-26T13:21:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZdyvEo9c1zPGDnTHhO9z@gAAANg&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fox-news-hacker-was-just-journalist-doing-his-job-claim-lawyers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,data loss","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-loss\/"},{"@type":"ListItem","position":3,"name":"Fox News Hacker Was Just Journalist Doing His Job, Claim Lawyers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55437"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55437\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}