{"id":22284,"date":"2018-12-17T11:00:07","date_gmt":"2018-12-17T11:00:07","guid":{"rendered":"http:\/\/864f62a2-9c81-44a4-ba8b-d001462cdc21"},"modified":"2018-12-17T11:00:07","modified_gmt":"2018-12-17T11:00:07","slug":"why-blackberry-should-change-its-name","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/","title":{"rendered":"Why BlackBerry should change its name"},"content":{"rendered":"<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">Featured stories<\/span><\/h3>\n<\/div>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/blackberrys-ambitious-target-protecting-everything-from-smartphones-to-cities\/\" target=\"_blank\">BlackBerry<\/a> is in need of a name change given its transformation to an enterprise software company is nearly complete. Simply put, BlackBerry needs a name that reflects the company&#8217;s current state not <a href=\"https:\/\/www.zdnet.com\/article\/palm-is-back-tiny-new-device-aims-to-let-you-leave-your-big-smartphone-at-home\/\" target=\"_blank\">a retro device manufactured by TCL<\/a>.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/in-a-market-without-keyboards-blackberry-presses-on\/\">In a market without keyboards, BlackBerry presses on<\/a><\/strong><\/p>\n<p>The company reports its fiscal third quarter earnings on Thursday. Estimates call for third quarter non-GAA{ earnings of 2 cents a share on revenue of $214.45 million.<\/p>\n<p>In the quarter, the BlackBerry Technology Solutions division is expected to show fiscal third quarter revenue growth of 21.5 percent to $52.27 million. Enterprise software and services will deliver revenue of $98.7 million, up 1.75 percent. Licensing, IP, and other is expected to deliver revenue of $55.83 million, up almost 12 percent.<\/p>\n<p>Add it up and there is no hardware revenue to speak of. BlackBerry is about the <a href=\"https:\/\/www.zdnet.com\/article\/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now\/\" target=\"_blank\">Internet of Things<\/a>, its <a href=\"https:\/\/www.zdnet.com\/article\/blackberry-qnx-launches-three-safety-certified-auto-systems\/\" target=\"_blank\">QNX platform for autos<\/a>, and increasingly <a href=\"https:\/\/www.zdnet.com\/article\/blackberry-is-buying-ai-powered-security-company-cylance-for-1-4bn\/\" target=\"_blank\">security software<\/a> via the acquisition of Cylance.<\/p>\n<p>Now whether you buy into this BlackBerry name change idea depends on whether you think hardware or software when you hear the name. I&#8217;m willing to bet most of you think keyboard-based smartphone when you hear BlackBerry.<\/p>\n<p>The company&#8217;s future goes more like this:<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>BlackBerry CEO John Chen spoke of the Cylance purchase largely as a security and software deal that can accelerate growth. Chen said Cylance &#8220;is a key investment to accelerate our future software and services growth in the enterprise of things market.&#8221;<\/p>\n<p>Analysts tend to agree. TD Securities analyst Daniel Chan said:<\/p>\n<blockquote readability=\"12\">\n<p>Cylance has been successful in the manufacturing, healthcare, and technology industries. BlackBerry&#8217;s strengths are in financial services, government, and other regulated industries. Management has viewed the healthcare industry as the next step for QNX beyond automotive. We believe that pairing Cylance with BlackBerry&#8217;s Spark platform could help it break into healthcare.<\/p>\n<\/blockquote>\n<p>Here&#8217;s how BlackBerry sees its future:<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/12\/14\/b843beaf-19ed-425f-b610-07ff866ca305\/resize\/770xauto\/38c6118a55483edd73ef909af456b4b0\/blackberry-spark.png\" class=\"\" alt=\"blackberry-spark.png\" height=\"auto\" width=\"770\"\/><\/span><\/p>\n<p>Clearly, the company is about way more than a brand tied to a smartphone and email system.<\/p>\n<p>What should BlackBerry&#8217;s new moniker be? I&#8217;m thinking BlackBerry could revert back to its original name: <a href=\"https:\/\/www.zdnet.com\/article\/research-in-motion\/\" target=\"_blank\">Research in Motion<\/a>. The name more applies to its enterprise of things strategy and leaves the door open for more transformation in the future. Should the company want to take a product line as a name again QNX would be more appropriate.<\/p>\n<p>In any case, Chen has nearly completed a heroic transformation. Now it&#8217;s time to swap the name of the company to complete the deal.<\/p>\n<h3>Previous and related coverage:<\/h3>\n<p><a href=\"https:\/\/www.zdnet.com\/product\/blackberry-key2\/\"><strong>BlackBerry KEY2 review: An old-school concept<\/strong><\/a><\/p>\n<p>You couldn&#8217;t mistake the KEY2 for anything but a BlackBerry. The keyboard on the front, the programmable &#8216;convenience key&#8217; &#8212; a button on the right edge that can be set to launch whatever you want &#8212; and the familiar BlackBerry stylised logo on the back give the game away.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/pictures\/photos-blackberrys-through-the-ages\/\"><strong>Photos: BlackBerrys through the ages<\/strong><\/a><\/p>\n<p><em>ZDNet<\/em> takes a look back at how the BlackBerry device has developed since the first BlackBerry hit the shelves more than a decade ago.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/why-blackberry-should-change-its-name\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BlackBerry is all about enterprise software, services, security, and the Internet of Things these days. Why keep a name that mostly brings up an image of a keyboard-based smartphone?<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":22285,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-22284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why BlackBerry should change its name 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why BlackBerry should change its name 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-17T11:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/why-blackberry-should-change-its-name.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why BlackBerry should change its name\",\"datePublished\":\"2018-12-17T11:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/\"},\"wordCount\":511,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/why-blackberry-should-change-its-name.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/\",\"name\":\"Why BlackBerry should change its name 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/why-blackberry-should-change-its-name.png\",\"datePublished\":\"2018-12-17T11:00:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/why-blackberry-should-change-its-name.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/why-blackberry-should-change-its-name.png\",\"width\":770,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-blackberry-should-change-its-name\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why BlackBerry should change its name\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why BlackBerry should change its name 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/","og_locale":"en_US","og_type":"article","og_title":"Why BlackBerry should change its name 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-17T11:00:07+00:00","og_image":[{"width":770,"height":401,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/why-blackberry-should-change-its-name.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why BlackBerry should change its name","datePublished":"2018-12-17T11:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/"},"wordCount":511,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/why-blackberry-should-change-its-name.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/","url":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/","name":"Why BlackBerry should change its name 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/why-blackberry-should-change-its-name.png","datePublished":"2018-12-17T11:00:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/why-blackberry-should-change-its-name.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/why-blackberry-should-change-its-name.png","width":770,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-blackberry-should-change-its-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why BlackBerry should change its name"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/22284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=22284"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/22284\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/22285"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=22284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=22284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=22284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}