{"id":56203,"date":"2024-05-31T15:39:19","date_gmt":"2024-05-31T15:39:19","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35950\/Okta-Says-Customer-Identity-Cloud-Prone-To-Credential-Stuffing-Attacks.html"},"modified":"2024-05-31T15:39:19","modified_gmt":"2024-05-31T15:39:19","slug":"okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/","title":{"rendered":"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/05\/053024_credential_stuffing.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Okta notified its customers that the cross-origin authentication feature in its Customer Identity Cloud is now prone to being targeted by threat actors conducting <a href=\"https:\/\/www.scmagazine.com\/news\/okta-spots-unprecedented-spike-in-credential-stuffing-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">credential stuffing attacks<\/a>.<\/p>\n<p>In a May 28 <a href=\"https:\/\/sec.okta.com\/articles\/2024\/05\/detecting-cross-origin-authentication-credential-stuffing-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">notification to its customers<\/a>, Okta said it observed endpoints used to support the credential stuffing attacks for \u201ca number\u201d of its customers.<\/p>\n<p>The large identity vendor explained that in this type of attack, threat actors sign-in to online services using large lists of usernames and passwords potentially obtained from previous data breaches, or from phishing or malware campaigns.<\/p>\n<p>Ted Miracco, chief executive officer at Approov, said that frequent admissions of vulnerabilities by identity and access management (IAM) providers like Okta will undoubtedly affect user confidence, but also may accelerate improvements in security practices such as a migration away from passwords and other inadequate technologies across the industry.&nbsp;<\/p>\n<p>\u201cOkta&#8217;s disclosure mirrors how companies like Google handle zero-day vulnerabilities,\u201d said Miracco. \u201cIt should be seen as a responsible move in that transparency about vulnerabilities and proactive communication are critical. However, patching will only partially close the vulnerability, and we need to enforce strong MFA and rate limiting to add extra layers of security beyond just passwords.\u201d<\/p>\n<p>Jason Soroko, senior vice president of product at Sectigo, said in this case, cross-origin authentication lets third-party websites authenticate users without redirecting them. However, it&#8217;s susceptibility to attacks puts user credentials at risk.<\/p>\n<p>\u201cOrganizations must scrutinize tenant logs for unusual login patterns and promptly rotate credentials while considering disabling the vulnerable feature,\u201d explained Soroko. \u201cThe reporting on this incident does seem to mirror a more reactive, rather than proactive, cybersecurity measure. Security teams must treat this with the urgency it deserves.\u201d<\/p>\n<p>Ken Dunham, cyber threat director at Qualys, added that IAM has arguably become the most targeted category by all threat actor types, with credential stuffing as a very common tactic.<\/p>\n<p>Dunham said organizations are highly encouraged to harden IAM apps against multiple tactics of abuse, especially credential stuffing, to ensure multiple layers of proactive controls to lower risk against attack from multiple threat actors eager to intrude and exploit.<\/p>\n<p>\u201cDon&#8217;t let threat actors be your IAM auditor,\u201d said Dunham. \u201cMove beyond complex password basics to harden your authentication of users and accounts to ensure you&#8217;re not the next breach victim in the news.\u201d<\/p>\n<p>Okta offered some recommendations for how to best protect users from credential-stuffing attacks:<\/p>\n<p><strong>Long-term fix:<\/strong> Enroll users in passwordless, phishing-resistant authentication. Use passkeys as the most secure option. Passkeys are included on all Auth0 plans from Okta\u2019s free plan through Enterprise.<\/p>\n<p><strong>Medium-term mitigations:<\/strong> Prevent users from deploying weak passwords. Require a minimum of 12 characters and no parts of the user name. Block passwords found in the Common Password List. &nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35950\/Okta-Says-Customer-Identity-Cloud-Prone-To-Credential-Stuffing-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56204,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3711],"class_list":["post-56203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinepassword"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-31T15:39:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/05\/053024_credential_stuffing.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks\",\"datePublished\":\"2024-05-31T15:39:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg\",\"keywords\":[\"headline,password\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/\",\"name\":\"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg\",\"datePublished\":\"2024-05-31T15:39:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg\",\"width\":1217,\"height\":685},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,password\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinepassword\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-05-31T15:39:19+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/05\/053024_credential_stuffing.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks","datePublished":"2024-05-31T15:39:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/"},"wordCount":467,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg","keywords":["headline,password"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/","name":"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg","datePublished":"2024-05-31T15:39:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/05\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks.jpg","width":1217,"height":685},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/okta-says-customer-identity-cloud-prone-to-credential-stuffing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,password","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinepassword\/"},{"@type":"ListItem","position":3,"name":"Okta Says Customer Identity Cloud Prone To Credential Stuffing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56203"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56204"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}