{"id":4736,"date":"2024-09-13T13:23:36","date_gmt":"2024-09-13T13:23:36","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4736"},"modified":"2024-09-13T13:37:29","modified_gmt":"2024-09-13T13:37:29","slug":"cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/","title":{"rendered":"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p>GitLab has recently released crucial security updates to address a total of 17 <a href=\"https:\/\/secry.me\/explore\/category\/cyber-security\/\">vulnerabilities<\/a>, the most critical of which, identified as <strong>CVE-2024-6678<\/strong>, could allow an attacker to <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-6678\">execute pipeline jobs as an unauthorized user under specific circumstances<\/a>. This vulnerability affects a broad range of GitLab versions, starting from 8.14 up to the latest releases.<\/p>\n<p>In addition to CVE-2024-6678, the security updates also address several other high, medium, and low-severity vulnerabilities. The patched versions for both GitLab Community Edition (CE) and Enterprise Edition (EE) are 17.3.2, 17.2.5, and 17.1.7.<\/p>\n<p>&nbsp;<\/p>\n<h3>Recurring Security Concerns and the Need for Vigilance<\/h3>\n<p>CVE-2024-6678 marks the fourth significant flaw that GitLab has patched in the past year, highlighting the ongoing security challenges faced by the platform. Despite no evidence of active exploitation of these vulnerabilities, users are strongly advised to apply the available patches promptly to mitigate potential risks.<\/p>\n<p>This critical security update comes in the wake of a previous GitLab vulnerability (CVE-2023-7028) that was actively exploited in the wild earlier this year, underscoring the importance of staying vigilant and proactive in addressing security vulnerabilities.<\/p>\n<h3><\/h3>\n<h3>Staying Protected in the Evolving Threat Landscape<\/h3>\n<p>GitLab&#8217;s commitment to promptly addressing security flaws and releasing updates is commendable. However, users must play their part by staying informed about the latest security developments and taking immediate action to protect their systems. By prioritizing security and promptly applying patches, users can help mitigate potential risks and ensure the continued integrity of their GitLab installations.<\/p>\n<p>In today&#8217;s rapidly evolving cyber threat landscape, staying ahead of malicious actors is essential. By proactively addressing vulnerabilities and maintaining strong security practices, individuals and organizations can safeguard their valuable data and protect themselves from potential threats.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678, could allow an attacker to execute pipeline jobs as an unauthorized user under specific circumstances. This vulnerability affects a broad range of GitLab versions, starting from 8.14 up to the latest releases. In [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4739,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[291,486,192,325,4,324,323],"class_list":{"0":"post-4736","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-news","9":"tag-cve","10":"tag-cve-2024-6678","11":"tag-cyber-security","12":"tag-exploit","13":"tag-hacking","14":"tag-vulnerability","15":"tag-zero-day"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution | SECRY<\/title>\n<meta name=\"description\" content=\"GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution | SECRY\" \/>\n<meta property=\"og:description\" content=\"GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-13T13:23:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T13:37:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Gitlab-Unauthorized-Pipeline-Job-Execution.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/5c69c0bdd8490edfc08d16d35d727470\"},\"headline\":\"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution\",\"datePublished\":\"2024-09-13T13:23:36+00:00\",\"dateModified\":\"2024-09-13T13:37:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/\"},\"wordCount\":287,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Gitlab-Unauthorized-Pipeline-Job-Execution.png\",\"keywords\":[\"CVE\",\"CVE-2024-6678\",\"Cyber Security\",\"Exploit\",\"hacking\",\"Vulnerability\",\"Zero Day\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/\",\"name\":\"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Gitlab-Unauthorized-Pipeline-Job-Execution.png\",\"datePublished\":\"2024-09-13T13:23:36+00:00\",\"dateModified\":\"2024-09-13T13:37:29+00:00\",\"description\":\"GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Gitlab-Unauthorized-Pipeline-Job-Execution.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Gitlab-Unauthorized-Pipeline-Job-Execution.png\",\"width\":1280,\"height\":720,\"caption\":\"Vulnerability on Gitlab lead to Unauthorized Pipeline Job Execution\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/5c69c0bdd8490edfc08d16d35d727470\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution | SECRY","description":"GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution | SECRY","og_description":"GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678,","og_url":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2024-09-13T13:23:36+00:00","article_modified_time":"2024-09-13T13:37:29+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Gitlab-Unauthorized-Pipeline-Job-Execution.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/5c69c0bdd8490edfc08d16d35d727470"},"headline":"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution","datePublished":"2024-09-13T13:23:36+00:00","dateModified":"2024-09-13T13:37:29+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/"},"wordCount":287,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Gitlab-Unauthorized-Pipeline-Job-Execution.png","keywords":["CVE","CVE-2024-6678","Cyber Security","Exploit","hacking","Vulnerability","Zero Day"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/","url":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/","name":"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Gitlab-Unauthorized-Pipeline-Job-Execution.png","datePublished":"2024-09-13T13:23:36+00:00","dateModified":"2024-09-13T13:37:29+00:00","description":"GitLab has recently released crucial security updates to address a total of 17 vulnerabilities, the most critical of which, identified as CVE-2024-6678,","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Gitlab-Unauthorized-Pipeline-Job-Execution.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Gitlab-Unauthorized-Pipeline-Job-Execution.png","width":1280,"height":720,"caption":"Vulnerability on Gitlab lead to Unauthorized Pipeline Job Execution"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/cve-2024-6678-critical-vulnerability-allowing-unauthorized-pipeline-job-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-6678: Critical Vulnerability Allowing Unauthorized Pipeline Job Execution"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/5c69c0bdd8490edfc08d16d35d727470","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4736"}],"version-history":[{"count":4,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4736\/revisions"}],"predecessor-version":[{"id":4741,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4736\/revisions\/4741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4739"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}