{"id":3366,"date":"2023-09-26T15:01:12","date_gmt":"2023-09-26T15:01:12","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=3366"},"modified":"2023-10-03T11:42:35","modified_gmt":"2023-10-03T11:42:35","slug":"chinese-hackers-target-south-korean-organizations-for-years","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/","title":{"rendered":"Chinese Hackers Target South Korean Organizations for Years"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p data-sourcepos=\"3:1-3:252\"><strong>TAG-74<\/strong> is a Chinese <a href=\"https:\/\/secry.me\/explore\/bug-bounty\/bug-bounty-an-introduction-to-earning-money-as-an-ethical-hacker\/\">hacker <\/a>group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain access to systems, including phishing emails, malware, and exploiting vulnerabilities in software.<\/p>\n<p data-sourcepos=\"5:1-5:218\"><a href=\"https:\/\/www.google.com\/search?q=TAG-74+chinese+Hacker\">TAG-74<\/a>&#8216;s primary goal is to steal sensitive data, such as intellectual property, trade secrets, and government information. The group has also been known to launch disruptive attacks, such as denial-of-service attacks.<\/p>\n<p data-sourcepos=\"7:1-7:295\">In a recent report, the security firm FireEye attributed a number of attacks against South Korean organizations to TAG-74. The report found that the group has been targeting a wide range of organizations, including aerospace and defense companies, government agencies, and research institutions.<\/p>\n<figure id=\"attachment_3369\" aria-describedby=\"caption-attachment-3369\" style=\"width: 728px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" td-modal-image wp-image-3369 size-full\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Attack-Scheme-TAG-74.jpg\" alt=\"Attack Scheme TAG 74\" width=\"728\" height=\"380\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Attack-Scheme-TAG-74.jpg 728w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Attack-Scheme-TAG-74-300x157.jpg 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Attack-Scheme-TAG-74-150x78.jpg 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Attack-Scheme-TAG-74-696x363.jpg 696w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><figcaption id=\"caption-attachment-3369\" class=\"wp-caption-text\">Attack Scheme TAG 74. Source: TheHacker News<\/figcaption><\/figure>\n<p data-sourcepos=\"9:1-9:210\">The report also found that TAG-74 has been using a new malware tool called &#8220;FASTSOCKET.&#8221; FASTSOCKET is a remote access trojan (RAT) that allows attackers to execute commands on infected systems and steal files.<\/p>\n<p data-sourcepos=\"11:1-11:211\">FireEye&#8217;s report is a reminder that South Korean organizations are at risk of attack from Chinese hackers. Organizations should take steps to protect themselves by implementing strong security measures, such as:<\/p>\n<ul data-sourcepos=\"13:1-16:0\">\n<li data-sourcepos=\"13:1-13:168\"><strong>Educating employees about cybersecurity best practices.<\/strong>\u00a0This includes creating strong passwords, being wary of phishing emails, and reporting suspicious activity.<\/li>\n<li data-sourcepos=\"14:1-14:193\"><strong>Keeping all software up to date.<\/strong>\u00a0This includes operating systems, applications, and security software. Attackers often exploit known vulnerabilities in software to gain access to systems.<\/li>\n<li data-sourcepos=\"15:1-16:0\"><strong>Implementing a layered security approach.<\/strong>\u00a0This includes using firewalls, intrusion detection systems, and next-generation web application firewalls (NGWAFs) to protect against a wide range of attack vectors.<\/li>\n<\/ul>\n<p data-sourcepos=\"17:1-17:167\">Organizations should also consider conducting regular security assessments to identify and address any security vulnerabilities before they are exploited by attackers.<\/p>\n<h2 data-sourcepos=\"19:1-19:91\">Recommendation<\/h2>\n<p data-sourcepos=\"19:1-19:91\">In addition to the above recommendations, organizations should also consider the following:<\/p>\n<ul data-sourcepos=\"21:1-23:0\">\n<li data-sourcepos=\"21:1-21:169\"><strong>Having a plan for responding to cyberattacks.<\/strong>\u00a0This plan should include steps for containing the attack, investigating the incident, and recovering from the attack.<\/li>\n<li data-sourcepos=\"22:1-23:0\"><strong>Working with a reputable security firm.<\/strong>\u00a0A security firm can help organizations to implement and manage a comprehensive security program.<\/li>\n<\/ul>\n<p data-sourcepos=\"24:1-24:122\">By following these recommendations, organizations can reduce their risk of being successfully attacked by Chinese hackers.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain access to systems, including phishing emails, malware, and exploiting vulnerabilities in software. TAG-74&#8216;s primary goal is to steal sensitive data, such as intellectual property, trade secrets, and government information. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[285,192,307,288,287,286,284],"class_list":["post-3366","post","type-post","status-publish","format-standard","has-post-thumbnail","category-cyber-security","category-news","tag-chinese-hackers","tag-cyber-security","tag-cybersecurity","tag-fastsocket","tag-rusia","tag-south-korean","tag-tag74"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Chinese Hackers Target South Korean Organizations for Years | SECRY<\/title>\n<meta name=\"description\" content=\"TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chinese Hackers Target South Korean Organizations for Years | SECRY\" \/>\n<meta property=\"og:description\" content=\"TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T15:01:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-03T11:42:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/09\/Chinese-Hackers-Target-South-Korean-Organizations.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Chinese Hackers Target South Korean Organizations for Years\",\"datePublished\":\"2023-09-26T15:01:12+00:00\",\"dateModified\":\"2023-10-03T11:42:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/\"},\"wordCount\":366,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Chinese-Hackers-Target-South-Korean-Organizations.png\",\"keywords\":[\"Chinese Hackers\",\"Cyber Security\",\"CyberSecurity\",\"FASTSOCKET\",\"Rusia\",\"South Korean\",\"TAG74\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/\",\"name\":\"Chinese Hackers Target South Korean Organizations for Years | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Chinese-Hackers-Target-South-Korean-Organizations.png\",\"datePublished\":\"2023-09-26T15:01:12+00:00\",\"dateModified\":\"2023-10-03T11:42:35+00:00\",\"description\":\"TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Chinese-Hackers-Target-South-Korean-Organizations.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Chinese-Hackers-Target-South-Korean-Organizations.png\",\"width\":1280,\"height\":720,\"caption\":\"Chinese Hackers Target South Korean Organizations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/chinese-hackers-target-south-korean-organizations-for-years\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chinese Hackers Target South Korean Organizations for Years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Chinese Hackers Target South Korean Organizations for Years | SECRY","description":"TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/","og_locale":"en_US","og_type":"article","og_title":"Chinese Hackers Target South Korean Organizations for Years | SECRY","og_description":"TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain","og_url":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-09-26T15:01:12+00:00","article_modified_time":"2023-10-03T11:42:35+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/09\/Chinese-Hackers-Target-South-Korean-Organizations.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Chinese Hackers Target South Korean Organizations for Years","datePublished":"2023-09-26T15:01:12+00:00","dateModified":"2023-10-03T11:42:35+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/"},"wordCount":366,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Chinese-Hackers-Target-South-Korean-Organizations.png","keywords":["Chinese Hackers","Cyber Security","CyberSecurity","FASTSOCKET","Rusia","South Korean","TAG74"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/","url":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/","name":"Chinese Hackers Target South Korean Organizations for Years | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Chinese-Hackers-Target-South-Korean-Organizations.png","datePublished":"2023-09-26T15:01:12+00:00","dateModified":"2023-10-03T11:42:35+00:00","description":"TAG-74 is a Chinese hacker group that has been targeting South Korean organizations for several years. The group has used a variety of techniques to gain","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Chinese-Hackers-Target-South-Korean-Organizations.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/09\/Chinese-Hackers-Target-South-Korean-Organizations.png","width":1280,"height":720,"caption":"Chinese Hackers Target South Korean Organizations"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/chinese-hackers-target-south-korean-organizations-for-years\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Chinese Hackers Target South Korean Organizations for Years"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=3366"}],"version-history":[{"count":5,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3366\/revisions"}],"predecessor-version":[{"id":3453,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3366\/revisions\/3453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/3370"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=3366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=3366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=3366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}