{"id":7537,"date":"2018-07-25T17:02:58","date_gmt":"2018-07-25T17:02:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29164\/Apache-Vulnerabilities-Spotted-In-OpenWhisk-And-Tomcat.html"},"modified":"2018-07-25T17:02:58","modified_gmt":"2018-07-25T17:02:58","slug":"apache-vulnerabilities-spotted-in-openwhisk-and-tomcat","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/","title":{"rendered":"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.scmagazine.com\/images\/2017\/03\/06\/patch2_1173908.jpg?format=jpg&amp;zoom=1&amp;quality=70&amp;anchor=middlecenter&amp;mode=pad\" alt=\"The vulnerability can be leveraged to leak sensitive action input data during subsequent executions.\" title=\"The vulnerability can be leveraged to leak sensitive action input data during subsequent executions.\" border=\"0\"\/><\/div>\n<p>The vulnerability can be leveraged to leak sensitive action input data during subsequent executions.<\/p>\n<p>PureSec researchers discovered an action mutability weakness vulnerability in Apache OpenWhisk which could allow a remote attacker to overwrite the source code of the action being executed and influence subsequent executions of the same function in the same container.<\/p>\n<p>OpenWhisk is a cloud-first distributed event-based programming service, serverless, open source cloud platform that executes functions in response to events at any scale that provides a programming model to upload event handlers to a cloud service and register the handlers to respond to the various events, according to the <a href=\"https:\/\/www.puresec.io\/hubfs\/Apache%20OpenWhisk%20PureSec%20Security%20Advisory.pdf\">security advisory<\/a>.<\/p>\n<p>The vulnerability can be leveraged to leak sensitive action input data during subsequent executions, potentially of different end-users and to execute rogue logic in parallel to the action&#8217;s original logic in subsequent executions, potentially of different end-users.<\/p>\n<p>\u00a0\u201cServerless is currently at the forefront of cloud-based computing, and while hosted OpenWhisk options, such as IBM Cloud Functions, allow businesses to share some of the security responsibility with\u00a0the\u00a0provider, this latest vulnerability with OpenWhisk demonstrates an even greater need for defense in depth,\u201d Matt Chiodi, Vice President of Cloud Security at RedLock said.<\/p>\n<p>\u00a0 \u201cWith serverless, most of the underlying platform is obscured from the user and this is a major positive from a security perspective as it means no more OS patching.\u201d<\/p>\n<p>Chiodi added that security teams now need to shift their focus to permissions, application libraries, and data security and that any type of information disclosure related to this type of vulnerability can be mitigated, to a certain extent, by limiting the permissions granted to the compromised function.<\/p>\n<p>James Lerud, head of the Behavioral Research Team at Verodin wasn&#8217;t too surprised by the vulnerability as OpenWhisk is a fairly new project that is under active development.<\/p>\n<p>\u201cThese types of discoveries are essential to the healthy development of opensource projects. Fortunately, the vulnerability was responsibly disclosed by the Puresec Team and quickly fixed by OpenWhisk contributors,\u201d Lerud said. \u201cAnyone considering using a \u2018serverless&#8217; architecture should fully understand and accept the security concerns involved; many traditional controls such as an IDS\/IPS may not be applicable to such an architecture.\u201d<\/p>\n<p>Notified Apache of the OpenWhisk vulnerability and provided the advisory and code fix recommendations to the project. As a result, 2 CVEs were assigned to this weakness: CVE-2018-11756 and CVE-2018-11757.<\/p>\n<p>Apache also recently released security updates for Apache Tomcat to address vulnerabilities that could allow A remote attacker could exploit one of these vulnerabilities to obtain sensitive information.<\/p>\n<p>Apache Tomcat versions 9.0.0.M9 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86 were affected. These updates have since been addressed and officials recommend users apply the updates as soon as possible.\u00a0<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29164\/Apache-Vulnerabilities-Spotted-In-OpenWhisk-And-Tomcat.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7538,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2291],"class_list":["post-7537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflawapache"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache Vulnerabilities Spotted In OpenWhisk And Tomcat 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-25T17:02:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat\",\"datePublished\":\"2018-07-25T17:02:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg\",\"keywords\":[\"headline,flaw,apache\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/\",\"name\":\"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg\",\"datePublished\":\"2018-07-25T17:02:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg\",\"width\":700,\"height\":379},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,apache\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawapache\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/","og_locale":"en_US","og_type":"article","og_title":"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-25T17:02:58+00:00","og_image":[{"width":700,"height":379,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat","datePublished":"2018-07-25T17:02:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/"},"wordCount":462,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg","keywords":["headline,flaw,apache"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/","url":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/","name":"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg","datePublished":"2018-07-25T17:02:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat.jpg","width":700,"height":379},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apache-vulnerabilities-spotted-in-openwhisk-and-tomcat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,apache","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawapache\/"},{"@type":"ListItem","position":3,"name":"Apache Vulnerabilities Spotted In OpenWhisk And Tomcat"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=7537"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/7538"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=7537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=7537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=7537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}