diff --git a/blog/posts/threat-model-series-contraceptive-pills.md b/blog/posts/threat-model-series-contraceptive-pills.md
index 8231dd949..8d6b6e896 100644
--- a/blog/posts/threat-model-series-contraceptive-pills.md
+++ b/blog/posts/threat-model-series-contraceptive-pills.md
@@ -17,7 +17,7 @@ schema_type: BackgroundNewsArticle

-Photo: Placeholder / Unsplash
+Photo: Reproductive Health Supplies Coalition / Unsplashed
[Privacy threat modeling](https://www.privacyguides.org/en/basics/threat-modeling/) could be an intimidating topic for most people. In this blog series, we introduce a hypothetical situation inspired by real-world usage cases. Each article will cover different recomendations already present in Privacy Guides' knowledge base. For today, we focus on Sally - a Texan college student seeking to purchase contraceptive pills online.