{"id":599,"date":"2018-05-14T19:19:25","date_gmt":"2018-05-14T19:19:25","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=131915"},"modified":"2018-05-14T19:19:25","modified_gmt":"2018-05-14T19:19:25","slug":"gdpr-phishing-scam-targets-apple-accounts-financial-data-2","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/","title":{"rendered":"GDPR Phishing Scam Targets Apple Accounts, Financial Data"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>A phishing campaign targeting Apple users is attempting to trick victims into updating their\u00a0profiles under the guise it\u2019s a part of proactive security hardening prepping for the introduction of General Data Protection Regulation (GDPR) policies\u00a0set to go into effect on May 25.\u00a0The phishing campaign\u2019s objective is to con victims into disclosing Apple account credentials in order to scoop up personal details \u2013 including credit card and Apple account information.<\/p>\n<p>This scam is one of many taking advantage of the impending introduction of EU\u00a0<a href=\"https:\/\/threatpost.com\/new-eu-privacy-laws-will-complicate-b2b-data-sharing\/126518\/\">GDPR policies<\/a>.<\/p>\n<p>\u201cOn April 30, we detected a new Apple ID phishing scam using a known social engineering tactic \u2014threatening to suspend a service to pressure users into divulging personal details,\u201d wrote\u00a0Trend Micro researchers in a <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-phishing-scam-uses-aes-encryption-and-goes-after-apple-ids\/\">blog post<\/a> about the scam last week. \u201cMultisite login details, like an Apple ID and corresponding password, are valuable because they can give an attacker access to all the applications linked to that account.\u201d<\/p>\n<p>The phishing email purports to be a legitimate email from Apple. The email notifies victims that their Apple account has been \u201climited\u201d due to unusual activity and urges them to update their payment details via a link.<\/p>\n<p>The link opens to a fake Apple website that looked like the legitimate website in most respects \u2013 even containing the same background image as the real Apple site \u2013 but with a different URL.<\/p>\n<p>Researchers said that the malicious website was offline at the time of its report.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/11130158\/apple-phishing.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-131916 alignleft\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/11130158\/apple-phishing-300x187.png\" alt=\"\" width=\"300\" height=\"187\"\/><\/a>From there, users were prompted enter their Apple IDs and passwords. When users put in their information, the website offers a standard message telling them their account has been locked, and offering a button to unlock it.<\/p>\n<p>The \u201cUnlock Account Now\u201d button is linked to a malicious site that collects user data. This site asks for a slew of personal information like name, date of birth, address, and credit card details.<\/p>\n<p>In addition to looking legitimate, this website appeared to be more sophisticated than most phishing sites due in part to the web directory permissions being set correctly, researchers noted: \u201cMalicious actors usually use free hosting sites for their phishing scams since they expect them to have short lifespans, and they don\u2019t put any effort into securing web server files,\u201d they said in the post. \u201cBecause of this, it is typically easy to obtain information from phishing attacks and related sites; sometimes even the stolen data is accessible. In this case, the web directory permissions were set correctly, so we were not able to access that information.\u201d<\/p>\n<p>After all personal and account information fields were filled in, the site informed victims they would be logged out for security reasons and forwarded the user to the legitimate Apple website.<\/p>\n<p><strong>Strengths \u2013 And Mistakes<\/strong><\/p>\n<p>Like many phishing emails, the initial emails sent to users had big red flags \u2013 including, most notably, the fact that the emails were sent to some victims who were not using Apple products.<\/p>\n<p>\u201cIt was sent to a person who was not using Apple products, and if there was suspicious activity why would a customer need to update payment details? Upon checking, we also saw that the button linked to a site that is not related to the Apple domain name,\u201d said researchers.<\/p>\n<p>However, beyond that the campaign did show worrisome sophisticated measures \u2013 including the tricks listed above surrounding the legitimate-looking Apple spoof website. And beyond that, the bad actors used other sophisticated methods \u2013 including encrypting the spoof site using Advanced Encryption Standard (AES) \u2013 allowing it to bypass some anti-phishing tools embedded in antivirus solutions.<\/p>\n<p>\u201cUsing AES for this kind of obfuscation is unusual for a phishing scam because\u2026 usually these malicious actors are more concerned with operations rather than security or evasion,\u201d said the researchers.<\/p>\n<p> READ MORE <a href=\"https:\/\/threatpost.com\/gdpr-phishing-scam-targets-apple-accounts-financial-data\/131915\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A phishing scam fooled victims by claiming to be Apple and scooping up personal details \u2013 including financial information and Apple account information. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":600,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[313,420,312,188,355,421,422,19,69],"class_list":["post-599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-apple","tag-apple-id","tag-gdpr","tag-phishing","tag-social-engineering","tag-spoof-website","tag-spoofing","tag-vulnerabilities","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GDPR Phishing Scam Targets Apple Accounts, Financial Data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GDPR Phishing Scam Targets Apple Accounts, Financial Data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-14T19:19:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"187\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"GDPR Phishing Scam Targets Apple Accounts, Financial Data\",\"datePublished\":\"2018-05-14T19:19:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\"},\"wordCount\":629,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png\",\"keywords\":[\"Apple\",\"Apple ID\",\"GDPR\",\"Phishing\",\"Social Engineering\",\"spoof website\",\"Spoofing\",\"Vulnerabilities\",\"Web Security\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\",\"name\":\"GDPR Phishing Scam Targets Apple Accounts, Financial Data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png\",\"datePublished\":\"2018-05-14T19:19:25+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png\",\"width\":300,\"height\":187},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/apple\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"GDPR Phishing Scam Targets Apple Accounts, Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GDPR Phishing Scam Targets Apple Accounts, Financial Data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/","og_locale":"en_US","og_type":"article","og_title":"GDPR Phishing Scam Targets Apple Accounts, Financial Data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-14T19:19:25+00:00","og_image":[{"width":300,"height":187,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"GDPR Phishing Scam Targets Apple Accounts, Financial Data","datePublished":"2018-05-14T19:19:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/"},"wordCount":629,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png","keywords":["Apple","Apple ID","GDPR","Phishing","Social Engineering","spoof website","Spoofing","Vulnerabilities","Web Security"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/","url":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/","name":"GDPR Phishing Scam Targets Apple Accounts, Financial Data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png","datePublished":"2018-05-14T19:19:25+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/gdpr-phishing-scam-targets-apple-accounts-financial-data.png","width":300,"height":187},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/gdpr-phishing-scam-targets-apple-accounts-financial-data-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/apple\/"},{"@type":"ListItem","position":3,"name":"GDPR Phishing Scam Targets Apple Accounts, Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=599"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/599\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/600"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}