{"id":7558,"date":"2018-07-26T15:30:37","date_gmt":"2018-07-26T15:30:37","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541718"},"modified":"2018-07-26T15:30:37","modified_gmt":"2018-07-26T15:30:37","slug":"is-chat-putting-your-business-at-risk","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/","title":{"rendered":"Is chat putting your business at risk?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"247\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog8-300x247.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>Now that corporate activities are increasingly taking place outside of the office, technology that enables real-time communication and collaboration among office workers and telecommuters is absolutely essential. Elements like file sharing, video conferencing and cloud access have quickly become imperative.<\/p>\n<p>However, few solutions address the challenges that can come up with geographically dispersed workers like live chat.<\/p>\n<p>Overall, more than <a href=\"http:\/\/globalworkplaceanalytics.com\/telecommuting-statistics\">3.7 million employees work from home<\/a>\u00a0or another location outside of the office at least half of the time, and regular teleworking has increased by 115 percent since 2005. At the same time, interest and use of chat platforms like Slack, Discord and Telegram \u2013 which enable integration through APIs with other systems \u2013 has risen as well.<\/p>\n<p>As chat capabilities become increasingly important and common, it\u2019s worth asking the question: \u201cCould chat be putting my business at risk?\u201d<\/p>\n<h3><strong>State of chat within the current enterprise landscape<\/strong><\/h3>\n<p>According to current industry insights and statistics, chat is being used in more businesses and in more use cases than ever before to support internal as well as external communication:<\/p>\n<table>\n<tbody readability=\"9.5032870708546\">\n<tr readability=\"19.006574141709\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li><strong>Employee productivity:<\/strong> As noted above, more employees are seeking teleworking opportunities, and Global Workplace Analytics found that a rising number of Fortune 1000 companies are adjusting their staff and productivity strategies to support this working style. Now that the typical employee spends 50 to 60 percent of the time away from their desk, solutions that help maintain productivity \u2013 like chat, specifically \u2013 are more critical than ever.<\/li>\n<li><strong>Customer service and experience:<\/strong> According to statistics gathered by Super Office, over <a href=\"https:\/\/www.superoffice.com\/blog\/live-chat-statistics\/\">half of all customers view chat<\/a> as their preferred communication channel, ahead of voice\/video calling, email and even social media. In fact, we\u2019ve reached the point where 77 percent of shoppers won\u2019t make a purchase online if a chat option isn\u2019t available. In this way, supporting the brand\u2019s customer service and experience with chat can result in a 10 percent increase in average order value.<\/li>\n<li><strong>Chat integration:<\/strong> As Entrepreneur contributor Murray Newlands pointed out, there are an array of different ways organizations are making use of solutions like Slack, including through <a href=\"https:\/\/www.entrepreneur.com\/article\/301172\">integrations with other key platforms<\/a>. For example, a system like Slack can be integrated with the company\u2019s Google Suite, providing numerous essential communication, scheduling and collaboration tools from a single, customized interface.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>How hackers are taking advantage of corporate chat communication<\/strong><\/h3>\n<p>Like any enterprise trend, hackers have taken notice of this rising chat use and begun leveraging the most popular platforms for malicious purposes. This strategy isn\u2019t difficult to understand, as chat solutions \u2013 as well as any other communication platform \u2013 are often used to transmit sensitive information that could be utilized by hackers for fraud or other malicious attacks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541719\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7.jpg\" alt=\"\" width=\"800\" height=\"511\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7-300x192.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7-768x491.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7-640x409.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7-440x281.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/07\/blog7-380x243.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>Live chat is especially important for organizations with teleworking employees, but is it worth the security risk?<\/em><\/p>\n<p>Here\u2019s a few trends that have taken hold with cybercriminals in association with chat platforms:<\/p>\n<h3><strong>Command &amp; Control connections<\/strong><\/h3>\n<p>According to Trend Micro\u2019s own research, almost every chat system API \u2013 including Slack, Discord and Telegram \u2013 can all be similarly abused to <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/how-new-chat-platforms-abused-by-cybercriminals\">enable connections with Command &amp; Control servers<\/a> under hackers\u2019 control. In this way, attackers can use a company\u2019s own chat platform as a C&amp;C environment, supporting connections to other infected systems. This opens the door for a variety of other malicious processes, including data theft and malware attacks.<\/p>\n<h3><strong>A platform for malware<\/strong><\/h3>\n<p>Speaking of malicious infections, Trend Micro researchers discovered that chat platforms can also be leveraged to host and serve up malware to victims. Discord, for example, can be utilized by hackers to host malicious samples like file infectors and bitcoin miners for cryptojacking and theft. Cybercriminals have also used Telegram to deliver ransomware samples like TeleCrypt, which encrypt victims\u2019 systems and data in exchange for a monetary ransom.<\/p>\n<p>Overall, all of these instances have one common thread: the abuse of their APIs to enable malware capabilities. As Trend Micro pointed out, this makes it difficult to address the specific flaw.<\/p>\n<p>\u201cWhat makes this particular security issue something for businesses to take note of is that there is currently no way to secure chat platforms from it without killing their functionality,\u201d Trend Micro researchers noted in a blog post. \u201cBlocking the APIs of these chat platforms means rendering them useless, while monitoring traffic for suspicious Discord\/Slack\/Telegram connections is practically futile as there is no discernible difference between those initiated by malware and those initiated by the user.\u201d<\/p>\n<h3><strong>A real-world instance: Hackers abuse Discord to target ROBLOX players<\/strong><\/h3>\n<p>In an interesting look at the ways in which hackers are leveraging chat for attack, Trend Micro Senior Threat Researcher Stephen Hilt reported on the <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/chat-app-discord-abused-cybercriminals-attack-roblox-players\/\">connection between Discord and ROBLOX<\/a> last year. As Hilt pointed out, the integration capabilities within Discord enable it to be used by players of ROBLOX, an online game dependent upon user-created content with more than 178 million registered user accounts.<\/p>\n<p>In these instances, hackers abused the Discord API to enable the delivery of malware which steals ROBLOX login credentials. From there, hackers are able to infiltrate the game and steal ROBUX, in-game currency, which can then be traded for actual cash or other digital currency like Bitcoin.<\/p>\n<h3><strong>Safeguarding chat communications<\/strong><\/h3>\n<p>As Trend Micro noted, the issue of chat security is complicated by the fact that hackers are able to leverage the platform\u2019s APIs, and blocking these would also prevent legitimate use.<\/p>\n<p>Thankfully, there are some things businesses can do to support improved chat security:<\/p>\n<table>\n<tbody readability=\"4\">\n<tr readability=\"8\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Inform employees about safe-use guidelines, including not using chat to send particularly sensitive data, and not opening suspicious links.<\/li>\n<li>Educate employees and IT teams on the types of chat risks in the current threat landscape.<\/li>\n<li>Consider the risks in comparison with the criticality of the platform to daily operations. If chat isn\u2019t required for key daily tasks, it may be worth discontinuing use of the platform.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>To find out more about safe use of chat APIs and platforms as well as overall enterprise security, <a href=\"https:\/\/www.trendmicro.com\/en_ca\/business\/products\/all-solutions.html\">connect with the experts at Trend Micro today<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/is-chat-putting-your-business-at-risk\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now that corporate activities are increasingly taking place outside of the office, technology that enables real-time communication and collaboration among office workers and telecommuters is absolutely essential. Elements like file sharing, video conferencing and cloud access have quickly become imperative. However, few solutions address the challenges that can come up with geographically dispersed workers like&#8230;<br \/>\nThe post Is chat putting your business at risk? appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7559,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[856,1651,2305,2306,2307,311,1689,2308,307,1694,13],"class_list":["post-7558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-api","tag-chat","tag-chat-apis","tag-chat-risks","tag-chat-security","tag-current-news","tag-discord","tag-live-chat","tag-security","tag-slack","tag-telegram"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is chat putting your business at risk? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is chat putting your business at risk? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-26T15:30:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/is-chat-putting-your-business-at-risk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"247\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Is chat putting your business at risk?\",\"datePublished\":\"2018-07-26T15:30:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/\"},\"wordCount\":1008,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/is-chat-putting-your-business-at-risk.jpg\",\"keywords\":[\"API\",\"Chat\",\"chat APIs\",\"chat risks\",\"chat security\",\"Current News\",\"Discord\",\"live chat\",\"Security\",\"Slack\",\"Telegram\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/\",\"name\":\"Is chat putting your business at risk? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/is-chat-putting-your-business-at-risk.jpg\",\"datePublished\":\"2018-07-26T15:30:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/is-chat-putting-your-business-at-risk.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/is-chat-putting-your-business-at-risk.jpg\",\"width\":300,\"height\":247},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/is-chat-putting-your-business-at-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"API\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/api\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is chat putting your business at risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is chat putting your business at risk? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"Is chat putting your business at risk? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-26T15:30:37+00:00","og_image":[{"width":300,"height":247,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/is-chat-putting-your-business-at-risk.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Is chat putting your business at risk?","datePublished":"2018-07-26T15:30:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/"},"wordCount":1008,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/is-chat-putting-your-business-at-risk.jpg","keywords":["API","Chat","chat APIs","chat risks","chat security","Current News","Discord","live chat","Security","Slack","Telegram"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/","url":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/","name":"Is chat putting your business at risk? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/is-chat-putting-your-business-at-risk.jpg","datePublished":"2018-07-26T15:30:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/is-chat-putting-your-business-at-risk.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/is-chat-putting-your-business-at-risk.jpg","width":300,"height":247},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/is-chat-putting-your-business-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"API","item":"https:\/\/www.threatshub.org\/blog\/tag\/api\/"},{"@type":"ListItem","position":3,"name":"Is chat putting your business at risk?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=7558"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/7559"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=7558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=7558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=7558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}