{"id":7595,"date":"2018-07-26T20:59:00","date_gmt":"2018-07-26T20:59:00","guid":{"rendered":"http:\/\/9686739b-bb3e-458e-a35b-f9d8257e8364"},"modified":"2018-07-26T20:59:00","modified_gmt":"2018-07-26T20:59:00","slug":"whoops-has-lifelock-been-unlocked","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/","title":{"rendered":"Whoops! Has LifeLock been unlocked?"},"content":{"rendered":"<p><a href=\"https:\/\/www.zdnet.com\/video\/cryptocurrency-mining-malware-now-as-lucrative-as-ransomware-for-hackers\/\"><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/07\/26\/09db078c-62f0-4763-b73b-400240418efc\/resize\/770xauto\/24db465e4080a0ba38ca2cf7a7b34f16\/istock-hands-of-a-hacker.jpg\" class=\"\" alt=\"Cybercriminals switching from ransomware to mining malware attacks\" height=\"auto\" width=\"770\"\/><\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/video\/cryptocurrency-mining-malware-now-as-lucrative-as-ransomware-for-hackers\/\" target=\"_blank\">Video: Cybercriminals switching from ransomware to mining malware attacks<\/a><\/p>\n<p>It&#8217;s become standard boilerplate every time there&#8217;s a major personal security breach: <a href=\"https:\/\/www.zdnet.com\/article\/credit-rating-firm-equifax-reveals-breach-as-many-as-143-million-affected\/\">Equifax gets hacked<\/a>; <a href=\"https:\/\/www.zdnet.com\/article\/essential-apologizes-for-humiliating-customer-data-leak\/\">Essential phishes its own customers<\/a>; whenever this happens, the companies always say, &#8220;We offer troubled customers a year of <a href=\"https:\/\/www.LifeLock.com\/\" target=\"_blank\">LifeLock<\/a>, an identity theft protection service, for free.&#8221;<\/p>\n<p>But what if <a href=\"https:\/\/www.lifelock.com\/\" target=\"_blank\">LifeLock<\/a> itself isn&#8217;t that secure?<\/p>\n<p>Guess what, kids? LifeLock may not be that secure after all.<\/p>\n<p><em>Quis custodiet ipsos custodes?<\/em> (Who will guard the guards themselves?)<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\">What is phishing? Everything you need to know<\/a><\/strong><\/p>\n<p>Security expert Brian Krebs reported on the problem on his must-read security blog, <a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\"><em>Krebs On Security<\/em><\/a>. Krebs said, &#8220;Identity theft protection firm LifeLock &#8212; a company that&#8217;s built a name for itself based on the promise of helping consumers protect their identities online &#8212; <a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/LifeLock-bug-exposed-millions-of-customer-email-addresses\/\" target=\"_blank\">may have actually exposed customers to additional attacks<\/a> from ID thieves and phishers.&#8221;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>How? By having a vulnerability &#8220;on its site that allowed anyone with a Web browser to index email addresses associated with millions of customer accounts, or to unsubscribe users from all communications from the company.&#8221;<\/p>\n<p>Krebs didn&#8217;t discover this security. The credit goes to Nathan Reese, a freelance security researcher and former LifeLock subscriber. Reese found that clicking the &#8220;unsubscribe&#8221; link at the bottom of a LifeLock email brought up a page showing his subscriber key. Using that as a starting point, Reese wrote a proof-of-concept script that used key numbers to pull down user email addresses.<\/p>\n<p>Armed with those, Reese observed, &#8220;If I were a bad guy, I would definitely target your customers with a phishing attack because I know two things about them. That they&#8217;re a LifeLock customer and that I have those customers&#8217; email addresses. That&#8217;s a pretty sharp spear for my spear phishing right there.&#8221;<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.techrepublic.com\/article\/want-to-improve-cybersecurity-try-phishing-your-own-employees\/\" target=\"_blank\">Want to improve cybersecurity? &#8211; TechRepublic<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.juniper.net\/us\/en\/\" target=\"_blank\">Juniper Networks<\/a>&#8216; head of threat research, Mounir Hahad, commented, &#8220;This is poor programming practice, not a misconfiguration.&#8221; The real trouble begins, he continued, &#8220;when these email addresses and subscriber IDs are cross referenced with the billions of previously leaked online accounts from other incidents, such as the Yahoo leak in 2013. From there, phishing campaigns can be very persuasive and may lead to people unknowingly handing out their passwords to scammers.&#8221;<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/symantec-acquires-LifeLock-for-2-3-billion\/\">Symantec, which brought LifeLock in 2016<\/a>, quickly shifted the blame on another company. In a statement, Symantec claimed, &#8220;This issue was not a vulnerability in the LifeLock member portal. The issue has been fixed and was limited to potential exposure of email addresses on a marketing page, managed by a third party, intended to allow recipients to unsubscribe from marketing emails. Based on our investigation, aside from the 70 email address accesses reported by the researcher, we have no indication at this time of any further suspicious activity on the marketing opt-out page.&#8221;<\/p>\n<p>That would be, because, no one else had used that security hole yet. As an excuse, it doesn&#8217;t cut it. It&#8217;s nice that the brakes were fixed before there was an accident, but for some time, LifeLock had partnered with a company that didn&#8217;t provide any security brakes.<\/p>\n<p>The site, while ran by a third party, also certainly appears to be an official LifeLock site. In addition, several eagle-eyed commenters noticed from the LifeLock screenshots that the site seems to have a misconfigured Transport Layer Security (TLS) certificate<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.cnet.com\/how-to\/spot-a-phishing-email\/\" target=\"_blank\">How to spot a phishing email &#8211; CNET<\/a><\/strong><\/p>\n<p>Others saw the site appears to have not been updated since 2015. Has this hole been there for three years? Maybe. Some people might say that, since there was no harm, there was no foul, and that there&#8217;s really no security news here.<\/p>\n<p>Wrong. As Krebs said in a follow-up note, &#8220;It&#8217;s newsworthy because a company like this shouldn&#8217;t be making such Internet Security 101 mistakes, and the fact that they did in this case raises legitimate questions about whether they take user account security seriously.&#8221;<\/p>\n<p>Exactly.<\/p>\n<p>I can only add that the LifeLock business plan&#8217;s reason to exist is to protect your identity. If it fails on something as fundamental as this, you really must ask: &#8220;How safe is it?&#8221;<\/p>\n<h3><strong>Related stories:<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/whoops-has-lifelock-been-unlocked\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LifeLock, the identity theft protection service, might have been revealing its users&#8217; identities. Whoops!<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":7596,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-7595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Whoops! Has LifeLock been unlocked? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whoops! Has LifeLock been unlocked? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-26T20:59:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/whoops-has-lifelock-been-unlocked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Whoops! Has LifeLock been unlocked?\",\"datePublished\":\"2018-07-26T20:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/whoops-has-lifelock-been-unlocked.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/\",\"name\":\"Whoops! Has LifeLock been unlocked? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/whoops-has-lifelock-been-unlocked.jpg\",\"datePublished\":\"2018-07-26T20:59:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/whoops-has-lifelock-been-unlocked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/whoops-has-lifelock-been-unlocked.jpg\",\"width\":770,\"height\":577},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/whoops-has-lifelock-been-unlocked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whoops! Has LifeLock been unlocked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whoops! Has LifeLock been unlocked? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/","og_locale":"en_US","og_type":"article","og_title":"Whoops! Has LifeLock been unlocked? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-26T20:59:00+00:00","og_image":[{"width":770,"height":577,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/whoops-has-lifelock-been-unlocked.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Whoops! Has LifeLock been unlocked?","datePublished":"2018-07-26T20:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/whoops-has-lifelock-been-unlocked.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/","url":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/","name":"Whoops! Has LifeLock been unlocked? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/whoops-has-lifelock-been-unlocked.jpg","datePublished":"2018-07-26T20:59:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/whoops-has-lifelock-been-unlocked.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/whoops-has-lifelock-been-unlocked.jpg","width":770,"height":577},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/whoops-has-lifelock-been-unlocked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Whoops! Has LifeLock been unlocked?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=7595"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/7595\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/7596"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=7595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=7595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=7595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}