{"id":4746,"date":"2024-09-14T04:24:41","date_gmt":"2024-09-14T04:24:41","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4746"},"modified":"2025-01-13T13:13:22","modified_gmt":"2025-01-13T13:13:22","slug":"apple-vision-pro-virtual-keyboard-vulnerability","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/","title":{"rendered":"<img src=xxx onerror=alert(2)>Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p><strong>GAZEploit Exploit<\/strong> <strong>on Apple<\/strong> &#8211; <strong>Apple Vision Pro Vulnerability &#8211;<\/strong> A recently patched <a href=\"https:\/\/secry.me\/explore\/category\/cyber-security\/\">security flaw<\/a> in Apple&#8217;s Vision Pro headset has highlighted the potential privacy risks associated with emerging technologies. Dubbed GAZEploit, the vulnerability could have exposed Virtual Keyboard Inputs to Attackers that allowed attackers to deduce sensitive information, such as passwords, by analyzing the eye movements of a user&#8217;s virtual avatar during gaze-controlled typing. The security vulnerability has been formally identified and tracked under the designation <strong>CVE-2024-40865<\/strong>.<\/p>\n<h3>The Mechanics of GAZEploit<\/h3>\n<p>Apple Vision Pro Vulnerability with <a href=\"https:\/\/www.google.com\/search?q=Gazeploit\">GAZEploit <\/a>exploits the inherent vulnerability of gaze-controlled text entry when users share a virtual avatar. By analyzing the avatar&#8217;s eye movements, or &#8220;gaze&#8221;, attackers could potentially reconstruct the keystrokes made on the virtual keyboard. This posed a significant risk, as it could enable the extraction of confidential information from virtual meetings, video calls, or live streaming platforms.<\/p>\n<h3>Apple&#8217;s Response after Known this Vulnerability<\/h3>\n<p>Following responsible disclosure by a group of academics from the University of Florida on <em>https:\/\/sites.google.com\/view\/Gazeploit\/<\/em>, Apple promptly addressed the issue in <strong>visionOS 1.3<\/strong>, released on July 29, 2024. The fix involved suspending the Persona feature \u2013 which creates a virtual avatar for users \u2013 whenever the virtual keyboard is active. This effectively blocks the potential leakage of gaze information and safeguards user privacy.<\/p>\n<p><iframe loading=\"lazy\" title=\"GAZEploit, unblurred version of demo video\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/DPYT8IH-R18?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h3><\/h3>\n<h3>The Broader Implications<\/h3>\n<p>The GAZEploit attack serves as a stark reminder of the challenges posed by the increasing integration of biometric data and virtual reality technologies. As these technologies continue to evolve, it becomes imperative to prioritize robust security measures to protect user privacy. This incident underscores the critical importance of responsible disclosure and proactive patching to mitigate potential vulnerabilities before they can be exploited by malicious actors.<\/p>\n<h3>Looking Ahead<\/h3>\n<p>While the GAZEploit vulnerability has been addressed, it&#8217;s crucial to remain vigilant as new technologies inevitably introduce new security challenges. As users, we must stay informed about potential risks and adopt best practices to protect our privacy. As developers, we must prioritize security from the outset and continuously work to identify and address any potential vulnerabilities.<\/p>\n<p><strong>free ai.secry.me account:<\/strong><br \/>\nClick this link: <a href=\"https:\/\/secry.me\/explore\/convert-cyber-security-into-money\/\">https:\/\/secry.me\/explore\/convert-cyber-security-into-money\/<\/a><\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>GAZEploit Exploit on Apple &#8211; Apple Vision Pro Vulnerability &#8211; A recently patched security flaw in Apple&#8217;s Vision Pro headset has highlighted the potential privacy risks associated with emerging technologies. Dubbed GAZEploit, the vulnerability could have exposed Virtual Keyboard Inputs to Attackers that allowed attackers to deduce sensitive information, such as passwords, by analyzing the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4749,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,131],"tags":[401,291,325,490,491,324,216],"class_list":{"0":"post-4746","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-news","9":"tag-apple","10":"tag-cve","11":"tag-exploit","12":"tag-gazeploit","13":"tag-university-of-florida","14":"tag-vulnerability","15":"tag-vulnerability-report"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit | SECRY<\/title>\n<meta name=\"description\" content=\"GAZEploit Exploit on Apple - Apple Vision Pro Vulnerability - A recently patched security flaw in Apple&#039;s Vision Pro headset has highlighted the potential\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit | SECRY\" \/>\n<meta property=\"og:description\" content=\"GAZEploit Exploit on Apple - Apple Vision Pro Vulnerability - A recently patched security flaw in Apple&#039;s Vision Pro headset has highlighted the potential\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-14T04:24:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-13T13:13:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit\",\"datePublished\":\"2024-09-14T04:24:41+00:00\",\"dateModified\":\"2025-01-13T13:13:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/\"},\"wordCount\":365,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png\",\"keywords\":[\"Apple\",\"CVE\",\"Exploit\",\"GAZEploit\",\"University of Florida\",\"Vulnerability\",\"Vulnerability Report\"],\"articleSection\":[\"Cyber Security\",\"Hacker News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/\",\"name\":\"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png\",\"datePublished\":\"2024-09-14T04:24:41+00:00\",\"dateModified\":\"2025-01-13T13:13:22+00:00\",\"description\":\"GAZEploit Exploit on Apple - Apple Vision Pro Vulnerability - A recently patched security flaw in Apple's Vision Pro headset has highlighted the potential\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png\",\"width\":1280,\"height\":720,\"caption\":\"Apple Vision Pro Vulnerability Gazeploit: Exposed Virtual Keyboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/apple-vision-pro-virtual-keyboard-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit | SECRY","description":"GAZEploit Exploit on Apple - Apple Vision Pro Vulnerability - A recently patched security flaw in Apple's Vision Pro headset has highlighted the potential","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit | SECRY","og_description":"GAZEploit Exploit on Apple - Apple Vision Pro Vulnerability - A recently patched security flaw in Apple's Vision Pro headset has highlighted the potential","og_url":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2024-09-14T04:24:41+00:00","article_modified_time":"2025-01-13T13:13:22+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit","datePublished":"2024-09-14T04:24:41+00:00","dateModified":"2025-01-13T13:13:22+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/"},"wordCount":365,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png","keywords":["Apple","CVE","Exploit","GAZEploit","University of Florida","Vulnerability","Vulnerability Report"],"articleSection":["Cyber Security","Hacker News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/","url":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/","name":"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png","datePublished":"2024-09-14T04:24:41+00:00","dateModified":"2025-01-13T13:13:22+00:00","description":"GAZEploit Exploit on Apple - Apple Vision Pro Vulnerability - A recently patched security flaw in Apple's Vision Pro headset has highlighted the potential","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Vulnerability-Gazeploit-1.png","width":1280,"height":720,"caption":"Apple Vision Pro Vulnerability Gazeploit: Exposed Virtual Keyboard"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/apple-vision-pro-virtual-keyboard-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Apple Vision Pro Virtual Keyboard Vulnerability: GAZEploit"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4746"}],"version-history":[{"count":8,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4746\/revisions"}],"predecessor-version":[{"id":4770,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4746\/revisions\/4770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4749"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}