{"id":55508,"date":"2024-03-06T00:00:00","date_gmt":"2024-03-06T00:00:00","guid":{"rendered":"urn:uuid:a9c6df21-1a1f-d73d-2c95-ef41a039e2a2"},"modified":"2024-03-06T00:00:00","modified_gmt":"2024-03-06T00:00:00","slug":"ai-auctions-collectibles-taylor-swift-jordan-bots","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/","title":{"rendered":"AI Auctions: Collectibles, Taylor Swift, Jordan Bots"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-auctions:Large?qlt=80\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"cyber crime,web,expert perspective,privacy &amp; risks,cyber threats,endpoints,iot,articles, news, reports\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2024-03-06\"> <meta property=\"article:tag\" content=\"artificial intelligence (ai)\"> <meta property=\"article:section\" content=\"expert perspective\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/c\/ai-auctions.html\"> <title>AI Auctions: Collectibles, Taylor Swift, Jordan Bots<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\">\n<link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendmicro\/clientlibs\/trendmicro-core-2\/clientlibs\/header-footer.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/c\/ai-auctions.html\"><br \/>\n<meta property=\"og:title\" content=\"AI Auctions: Collectibles, Taylor Swift, Jordan Bots\"><br \/>\n<meta property=\"og:description\" content=\"Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/ai-auctions.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"AI Auctions: Collectibles, Taylor Swift, Jordan Bots\"><br \/>\n<meta name=\"twitter:description\" content=\"Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/ai-auctions.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"50.02574002574\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layers *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1191977076\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"9.7222222222222\">\n<div class=\"article-details\" role=\"heading\" readability=\"38.888888888889\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Artificial Intelligence (AI)<\/p>\n<p class=\"article-details__description\">Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia.<\/p>\n<p class=\"article-details__author-by\">By: David Chow <time class=\"article-details__date\">March 06, 2024<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-lg-8 col-lg-push-2\"> <\/p>\n<div class=\"richText\" readability=\"43.298417132216\">\n<div readability=\"33.081936685289\">\n<p>In our last discussion, we laid the groundwork for understanding AI, ML, and RPA. This time, let&#8217;s dive deeper into practical applications, starting with my initial forays into RPA in 2002, and leading up to significant events such as the <a href=\"https:\/\/www.bbc.com\/news\/entertainment-arts-64384304\" target=\"_blank\" rel=\"noopener\">Taylor Swift ticketing fiasco<\/a> that drew attention from the US Congress.<\/p>\n<p><span class=\"body-subhead-title\"><span>Early Adventures with RPA Bots<\/span><\/span><\/p>\n<p>My journey began in the early 2000s, as a memorabilia collector facing the challenge of acquiring rare items affordably. This led to experimenting with RPA, where my brother and I developed a bot that went beyond conventional search engine capabilities.<\/p>\n<p><span class=\"body-subhead-title\"><span>Creating a Custom RPA Bot<\/span><\/span><\/p>\n<p>This bot was engineered to outmaneuver online retailers. Unlike standard search engines that rely on meta tags or indexes, our bot was designed to detect and access hidden product pages using a predictive algorithm. It would silently crawl these pages, searching for specified terms without opening a browser. Hits were logged in a TXT file for review. This lightweight, low-resource bot exemplified the potential of RPA in streamlining specific tasks.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\" readability=\"6\">\n<figure class=\"image-figure\" readability=\"2\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/24\/c\/navigating-ai-world--collectible,-taylor-swift-tickets,-jordan-bots\/homer-and-the-collector.jpg\" alt=\"Muumuu Homer and the Collector from Kendrick's shelf\"> <\/p>\n<p><figcaption>Muumuu Homer and the Collector from Kendrick&#8217;s shelf<\/figcaption><\/p>\n<\/figure><\/div>\n<div>\n<div class=\"richText\" readability=\"46.812047399605\">\n<div readability=\"39.420671494404\">\n<p><span class=\"body-subhead-title\"><span>The Rise of Retail Bots<\/span><\/span><\/p>\n<p>Over time, the landscape saw the emergence of niche-targeted bots, although these lacked the advanced features of AI or ML. Two prominent examples are the <a href=\"https:\/\/queue-it.com\/blog\/how-do-sneaker-bots-work\/\" target=\"_blank\" rel=\"noopener\">Sneaker Bot<\/a> and the <a href=\"https:\/\/builtin.com\/gaming\/free-ps5-bot\" target=\"_blank\" rel=\"noopener\">PlayStation 5 Bot<\/a> which automated the process of monitoring and purchasing limited release products.<\/p>\n<p><span class=\"body-subhead-title\"><span>The Taylor Swift Eras Tour Ticket Debacle<\/span><\/span><\/p>\n<p>The Taylor Swift ticket situation highlighted a significant issue in the online ticketing industry. <a href=\"https:\/\/queue-it.com\/blog\/scalping-bots\/\" target=\"_blank\" rel=\"noopener\">Scalper bots<\/a> were programmed to buy large quantities of concert tickets the moment they became available online. These bots could bypass CAPTCHA tests and simulate human buying behavior, making them hard to detect. They were capable of executing multiple transactions simultaneously, which overwhelmed ticketing systems, leading to rapid sellouts and site crashes. This not only deprived genuine fans of purchasing opportunities but also inflated the secondary market prices as scalpers resold tickets at exorbitant rates.<\/p>\n<p><span class=\"body-subhead-title\"><span>Combating Bots in Online Retail<\/span><\/span><\/p>\n<p>Online retailers and ticketing companies have implemented combination of various strategies to combat bot activities:<\/p>\n<ol>\n<li><b><i>CAPTCHA Tests<\/i>:<\/b> These are challenges that are easy for humans but difficult for bots, like identifying objects in images or solving puzzles. This helps in filtering out automated bot traffic.<\/li>\n<li><b><i>Purchase Limits<\/i>:<\/b> Retailers set limits on the number of items a customer can buy in a single transaction, which discourages bulk buying by bots.<\/li>\n<li><b><i>Advanced User Verification<\/i>:<\/b> Utilizing two-factor authentication (2FA) during purchases adds an extra layer of security, making it harder for bots to complete transactions.<\/li>\n<li><b><i>Analyzing Purchasing Behavior<\/i>:<\/b> Retailers monitor for patterns typical of bots, such as high-speed transactions and repeated buying patterns, to identify and block suspicious activities.<\/li>\n<li><b><i>IP Address Tracking<\/i>:<\/b> Multiple purchases from the same IP address are flagged or blocked, as this is often a sign of bot activity.<\/li>\n<li><b><i>Machine Learning Algorithms<\/i>:<\/b> These algorithms are employed to dynamically identify and block bot activities by learning and adapting to new bot strategies.<\/li>\n<li><b><i>Regularly Updating Security Protocols<\/i>:<\/b> Continuous updates to security measures are crucial to stay ahead of evolving bot strategies.<\/li>\n<li><b><i>Delayed Release of Inventory<\/i>:<\/b> Some retailers release their inventory in waves to prevent bots from buying up everything at once.<\/li>\n<li><b><i>Hidden URLs<\/i>:<\/b> Retailers sometimes use undisclosed URLs for high-demand products, only revealing them to genuine customers.<\/li>\n<li><b><i>Browser Fingerprinting<\/i>:<\/b> This technique identifies and tracks users based on their browser and device characteristics, helping to differentiate between genuine customers and bots.<\/li>\n<\/ol>\n<p><span class=\"body-subhead-title\"><span>Looking Ahead<\/span><\/span><\/p>\n<p>Next, I will explore the application of AI, ML, and RPA in solving complex business challenges, drawing from my experiences at the Department of Housing and Urban Development. We&#8217;ll delve into how these technologies can transform organizational processes, tackle legacy technology issues, and drive mission-critical objectives.<\/p>\n<p>For more resources about AI, click <a href=\"https:\/\/www.trendmicro.com\/en_us\/research.html?category=trend-micro-research:threats\/artificial-intelligence-ai\">here<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/c\/ai-auctions.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55509,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9521,9511,9508,9522,9514,9536,9535],"class_list":["post-55508","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-expert-perspective","tag-trend-micro-research-iot","tag-trend-micro-research-privacyrisks","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-06T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-auctions:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AI Auctions: Collectibles, Taylor Swift, Jordan Bots\",\"datePublished\":\"2024-03-06T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/\"},\"wordCount\":684,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Expert Perspective\",\"Trend Micro Research : IoT\",\"Trend Micro Research : Privacy&amp;Risks\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/\",\"name\":\"AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg\",\"datePublished\":\"2024-03-06T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg\",\"width\":788,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-auctions-collectibles-taylor-swift-jordan-bots\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI Auctions: Collectibles, Taylor Swift, Jordan Bots\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/","og_locale":"en_US","og_type":"article","og_title":"AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-06T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-auctions:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AI Auctions: Collectibles, Taylor Swift, Jordan Bots","datePublished":"2024-03-06T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/"},"wordCount":684,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Expert Perspective","Trend Micro Research : IoT","Trend Micro Research : Privacy&amp;Risks","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/","url":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/","name":"AI Auctions: Collectibles, Taylor Swift, Jordan Bots 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg","datePublished":"2024-03-06T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/ai-auctions-collectibles-taylor-swift-jordan-bots.jpg","width":788,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ai-auctions-collectibles-taylor-swift-jordan-bots\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"AI Auctions: Collectibles, Taylor Swift, Jordan Bots"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55508"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55508\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55509"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}