{"id":1612,"date":"2021-03-11T14:50:34","date_gmt":"2021-03-11T19:50:34","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1612"},"modified":"2021-03-11T14:50:37","modified_gmt":"2021-03-11T19:50:37","slug":"gab-hacked-for-second-time-in-two-weeks","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/","title":{"rendered":"Gab Hacked for Second Time in Two Weeks"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-gab-a-far-right-wing-social-networking-site-was-hacked-for-a-second-time-their-failure-to-remove-oauth2-bearer-tokens-provided-easy-access-for-the-attackers\">Gab, a far right-wing social networking site, was hacked for a second time. Their failure to remove OAuth2 bearer tokens provided easy access for the attackers.<\/h2>\n\n\n\n<p>Less than two weeks ago, far-right-wing social networking site, Gab, was breached. According to <a href=\"https:\/\/ddosecrets.substack.com\/p\/release-gableaks-70gb\" target=\"_blank\" rel=\"noreferrer noopener\">DDoSecrets<\/a>, there were 70GB of public and private posts, user profiles, hashed passwords, DMs and plaintext passwords for groups collected. Over 700,000 messages between 15,000 users were included in the dataset, in plaintext format. Gab supposedly patched the problem, but missed a step. Earlier this week, the site was breached for the second time.<\/p>\n\n\n\n<p>When Amazon removed Parler from its platform, Parler users flocked to Gab. Having been around since 2017, Gab had already been removed from the Google Play store for terms of service violations. In 2018, GoDaddy terminated its relationship with the site after one of its users criticized the Hebrew Immigrant Aid Society on the site before entering a Pittsburgh synagogue and killing 11 people. Gab has already had its share of uphill battles, even resorting to hosting its own website in order to stay active.<\/p>\n\n\n\n<p>Given that history, you would think that some lessons in protecting the site and its users would have taken place. Apparently, however, Gab leaders did not get that memo. The first attack was initiated by SQL-injection, something that is consistently on the OWASP Top 10 known vulnerabilities that hackers continue to exploit because businesses haven\u2019t patched the problem. After the first attack, Gab did apply the patch, but they failed to revoke OAuth2 bearer tokens, which resulted in Gab founder and CEO Andrew Torba having his account compromised for a second time. And Gab knew nothing about it until the attacker posted a message under Torba\u2019s name.<\/p>\n\n\n\n<p>OAuth2 bearer tokens are stored by browsers and mobile apps after a user has successfully logged into the site. It\u2019s a unique ID to whatever device you are using. When the user goes back to the site, the site recognizes the device and allows them access.&nbsp;<\/p>\n\n\n\n<p>Gab, of course, took the site down and removed the post, but it was archived <a href=\"https:\/\/archive.md\/mSYxk\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>. Torba released a statement when the site came back up:<\/p>\n\n\n\n<p>\u201cThe attacker who stole data from Gab harvested OAuth2 bearer tokens during their initial attack,\u201d <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/03\/gab-a-haven-for-pro-trump-conspiracy-theories-has-been-hacked-again\/?comments=1\" target=\"_blank\" rel=\"noreferrer noopener\">Torba wrote<\/a>. \u201cThough their ability to harvest new tokens was patched, we did not clear all tokens related to the original attack. By reusing these old tokens, the attacker was able to post 177 statuses in an 8-minute period today.\u201d<\/p>\n\n\n\n<p>Gab has a lot of issues to deal with here. They were breached by SQL-injection. They didn\u2019t purge OAuth2 bearer tokens. They haven\u2019t forced users to reset their passwords. They failed to know, or at least failed to report, the theft of OAuth2 bearer tokens. Given these errors, it\u2019s also possible that other sensitive user data was obtained by the attacker and it just hasn\u2019t been revealed yet.<\/p>\n\n\n\n<p>This is yet another business which not only skimped on security and configuration, but didn\u2019t make it right in their attempt to fix it. Instead, they left a door for the attackers to get back in and do who knows what kind of damage. Torba\u2019s statement said that the attacker was able to post 177 statuses in an 8-minute period. What else were they able to do in that time? Threat actors use automation, too. It makes their success rate higher and earns them more data than they would get manually.<\/p>\n\n\n\n<p>Gab made some big mistakes here. They can claim that they were targeted because of their user-base, but really, threat actors hack indiscriminately. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/parler-hack-due-to-zero-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Parler was breached with ease<\/a>, so it stands to reason that Gab would be a similarly easy target, and it was. And when they missed a step in applying the fix, it was just as easy to get in a second time.<\/p>\n\n\n\n<p>Be proactive. Tighten up your security, make sure it\u2019s coded into all of your internal and external systems, apps, products and features. And should your company suffer an attack (which it likely will at some point in the business lifecycle), make sure the fix is implemented properly and incident response accurately cleans up the mess.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social networking site Gab was hacked twice in two weeks. Gab&#8217;s security failures highlight the need for proper incident response.<\/p>\n","protected":false},"author":1,"featured_media":1618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,959],"tags":[25,1910,31,926,2182,708,2070,1992,17,2183],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gab Hacked for Second Time in Two Weeks - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Social networking site Gab was hacked twice in two weeks. Gab&#039;s security failures highlight the need for proper incident response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gab Hacked for Second Time in Two Weeks\" \/>\n<meta property=\"og:description\" content=\"Social networking site Gab was hacked twice in two weeks. Gab&#039;s security failures highlight the need for proper incident response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-11T19:50:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-11T19:50:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Gab Hacked for Second Time in Two Weeks\",\"datePublished\":\"2021-03-11T19:50:34+00:00\",\"dateModified\":\"2021-03-11T19:50:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\"},\"wordCount\":703,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg\",\"keywords\":[\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"data breach\",\"Gab\",\"Incident Response\",\"Parler\",\"patching\",\"Security\",\"SQL-injection\"],\"articleSection\":[\"Cyber Security\",\"Data Breaches\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\",\"name\":\"Gab Hacked for Second Time in Two Weeks - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg\",\"datePublished\":\"2021-03-11T19:50:34+00:00\",\"dateModified\":\"2021-03-11T19:50:37+00:00\",\"description\":\"Social networking site Gab was hacked twice in two weeks. Gab's security failures highlight the need for proper incident response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Stafford, United Kingdom - January 10 2021: GAB social media seen on the smarthpne placed near diary and pen. Gab app is a micro-blogging social network defending free speech online.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gab Hacked for Second Time in Two Weeks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gab Hacked for Second Time in Two Weeks - PWV Consultants","description":"Social networking site Gab was hacked twice in two weeks. Gab's security failures highlight the need for proper incident response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/","og_locale":"en_US","og_type":"article","og_title":"Gab Hacked for Second Time in Two Weeks","og_description":"Social networking site Gab was hacked twice in two weeks. Gab's security failures highlight the need for proper incident response.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-03-11T19:50:34+00:00","article_modified_time":"2021-03-11T19:50:37+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Gab Hacked for Second Time in Two Weeks","datePublished":"2021-03-11T19:50:34+00:00","dateModified":"2021-03-11T19:50:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/"},"wordCount":703,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg","keywords":["cyber attack","CyberSec","Cybersecurity","data breach","Gab","Incident Response","Parler","patching","Security","SQL-injection"],"articleSection":["Cyber Security","Data Breaches"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/","url":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/","name":"Gab Hacked for Second Time in Two Weeks - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg","datePublished":"2021-03-11T19:50:34+00:00","dateModified":"2021-03-11T19:50:37+00:00","description":"Social networking site Gab was hacked twice in two weeks. Gab's security failures highlight the need for proper incident response.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Gab-Hacked-2nd-Time-scaled.jpeg","width":2560,"height":1707,"caption":"Stafford, United Kingdom - January 10 2021: GAB social media seen on the smarthpne placed near diary and pen. Gab app is a micro-blogging social network defending free speech online."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/gab-hacked-for-second-time-in-two-weeks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Gab Hacked for Second Time in Two Weeks"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1612"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1612"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1612\/revisions"}],"predecessor-version":[{"id":1622,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1612\/revisions\/1622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1618"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}