{"id":22532,"date":"2018-12-20T02:27:04","date_gmt":"2018-12-20T02:27:04","guid":{"rendered":"http:\/\/5d41749f-6fec-48ef-84ba-e9b55b606cfe"},"modified":"2018-12-20T02:27:04","modified_gmt":"2018-12-20T02:27:04","slug":"koh-young-applies-fasoos-drm-to-prevent-against-copycat-products","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/","title":{"rendered":"Koh Young applies Fasoo&#8217;s DRM to prevent against copycat products"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/12\/19\/715a7a90-f378-4a21-a8ae-2a43e2d75bc7\/resize\/470xauto\/21d9a1b784d0fdb681c90f9b7c29538b\/fasoo-product-overview.png\" class=\"\" alt=\"fasoo-product-overview.png\" height=\"auto\" width=\"470\"\/><\/span><span class=\"credit\">(Image: Fasoo)<\/span><\/p>\n<p>Semiconductor equipment vendor Koh Young Technology has applied South Korean data security firm Fasoo&#8217;s digital rights management (DRM) solution into its offices which has effectively halted its products from being copied by competitors, it said.<\/p>\n<p>Fasoo&#8217;s enterprise DRM was implemented into Koh Young&#8217;s system back in October 2017, allowing the latter company to trace their intellectual property (IP) in Microsoft Office format documents, as well as for Pro\/E and AutoCAD engineering drawings.<\/p>\n<p>Before the use of Fasoo&#8217;s DRM, Koh Young used conventional, perimeter-based security measures like firewalls, access control, and data loss prevention software to protect its IP, but copycat products would always pop-up within six months after the company&#8217;s various product launches.<\/p>\n<p>Koh Young makes 3D inspection and measurement equipment for printed circuit board assembly, machining and assembly process manufacturing, semiconductor manufacturing, and various medical functions, which requires long-term research and development investment to produce. As such, Koh Young said it is highly likely that data leaks are how competitors have been able to release products that mirror the company&#8217;s own within six months of their release.<\/p>\n<p>Through customisation, Koh Young also added capabilities that only allow users with the appropriate credentials to see local disk drive content and save documents onto the drive.\u00a0 If users attempt to save documents onto another drive, the DRM will then automatically apply protective measures.<\/p>\n<p>According to the 2017 report by the Commission on the Theft of American Intellectual Property, global IP theft is on the rise. The annual loss for the US economy from pirated software and theft of trade secrets could be as high as $600 billion.<\/p>\n<p>Enterprise DRM protects data on the file level and gives policy-makers greater options around who has access to that data.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Files are encrypted whether they are in employee devices, servers, or third-party devices, while policy-makers can grant permissions by organization, team, or projects, and set valid access dates and location.<\/p>\n<p>&#8220;More and more high tech engineering manufacturers are looking at enterprise DRM seriously to protect their intellectual properties,&#8221; said a Fasoo spokesman. \u00a0&#8220;An unstructured data security solution that is information-centric will provide customers with the highest level of protection, and much better chance of safeguarding their valuable assets.&#8221;<\/p>\n<p>In April, Fasoo also updated its Wrapsody enterprise document platform solution with <a href=\"https:\/\/www.zdnet.com\/article\/fasoos-wrapsody-solution-offers-behavioral-analytics-for-max-workspace-output\/\" target=\"_blank\">behavioral analytics<\/a> to solve issues with information management and ROT data.<\/p>\n<h3>Related Coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/fasoo-and-koh-young-apply-drm-to-prevent-copycat-issue\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>South Korea&#8217;s largest data security vendor Fasoo has applied its enterprise DRM solution to semiconductor equipment vendor Koh Young Technology which has halted long-standing copycat issues, they said.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":22533,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-22532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Koh Young applies Fasoo&#039;s DRM to prevent against copycat products 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Koh Young applies Fasoo&#039;s DRM to prevent against copycat products 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-20T02:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png\" \/>\n\t<meta property=\"og:image:width\" content=\"470\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Koh Young applies Fasoo&#8217;s DRM to prevent against copycat products\",\"datePublished\":\"2018-12-20T02:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/\"},\"wordCount\":409,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/\",\"name\":\"Koh Young applies Fasoo's DRM to prevent against copycat products 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png\",\"datePublished\":\"2018-12-20T02:27:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png\",\"width\":470,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Koh Young applies Fasoo&#8217;s DRM to prevent against copycat products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Koh Young applies Fasoo's DRM to prevent against copycat products 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/","og_locale":"en_US","og_type":"article","og_title":"Koh Young applies Fasoo's DRM to prevent against copycat products 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-20T02:27:04+00:00","og_image":[{"width":470,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Koh Young applies Fasoo&#8217;s DRM to prevent against copycat products","datePublished":"2018-12-20T02:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/"},"wordCount":409,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/","url":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/","name":"Koh Young applies Fasoo's DRM to prevent against copycat products 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png","datePublished":"2018-12-20T02:27:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products.png","width":470,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/koh-young-applies-fasoos-drm-to-prevent-against-copycat-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Koh Young applies Fasoo&#8217;s DRM to prevent against copycat products"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/22532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=22532"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/22532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/22533"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=22532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=22532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=22532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}