{"id":25218,"date":"2019-02-13T15:01:46","date_gmt":"2019-02-13T15:01:46","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29819\/Xiaomi-Electric-Scooter-Reportedly-Vulnerable-To-Hijacking-Hack.html"},"modified":"2019-02-13T15:01:46","modified_gmt":"2019-02-13T15:01:46","slug":"xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/","title":{"rendered":"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack"},"content":{"rendered":"<p><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/1eII_o2jox0WUXsujWxVwjp1N7g=\/970x0\/2018\/04\/21\/da69c17d-1a48-4a64-9552-d82c8e2e854f\/xiaomi-mi-spin-bird-electric-scooter.jpg\" class=\"\" alt=\"xiaomi-mi-spin-bird-electric-scooter\" height=\"0\" width=\"970\"\/><\/span><\/span><\/p>\n<p><span class=\"caption\">The Xioami M365 has a flaw that could allow a hacker to hijack control of the vehicle, a security researcher says.<\/span><\/p>\n<p><span class=\"credit\">Sean Hollister\/CNET<\/span><\/p>\n<p class=\"speakableTextP1\">A flaw in a popular electric scooter has added to the list of safety concerns surrounding the devices, which have invaded several US cities in the past year.<\/p>\n<p class=\"speakableTextP2\">The <a href=\"https:\/\/www.cnet.com\/tags\/xiaomi\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Xiaomi|CNET_TAG|402&quot;}\">Xiaomi<\/a> M365 is an electric scooter used by some scooter rental companies that contains a flaw that could allow a hacker to take full remote control over the vehicle, including causing the scooter to suddenly accelerate or brake, according to information released Tuesday by security research group Zimperium. The firm blames the scooter&#8217;s password authentication process, which is done via Bluetooth communications.<\/p>\n<p>&#8220;During our research, we determined the password is not being used properly as part of the authentication process with the scooter and that all commands can be executed without the password,&#8221; Zimperium said in a <a href=\"https:\/\/blog.zimperium.com\/dont-give-me-a-brake-xiaomi-scooter-hack-enables-dangerous-accelerations-and-stops-for-unsuspecting-riders\/\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">statement<\/a>. &#8220;The password is only validated on the application side, but the scooter itself doesn&#8217;t keep track of the authentication state.&#8221;<\/p>\n<p>Researchers said they were able to interact with the device&#8217;s anti-theft system, cruise control and eco mode, as well as update its firmware, without required authentication.<\/p>\n<p>Zimperium published a proof-of-concept video showing its app scanning for nearby Xiaomi <a href=\"https:\/\/www.cnet.com\/topics\/scooters\/products\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Scooters|CNET_CAT_TOPIC|285&quot;}\">scooters<\/a> and disabling them through their anti-theft feature. The app will work on any M365 within a radius of about 328 feet (100 meters), Zimperium said.<\/p>\n<p>The hack adds to the concerns surrounding rentable e-scooters, which have become a controversial topic as they show up in more US cities and regulators hurry to write laws around the new form of transportation. Some people say they love being able to scoot block-to-block around congested cities. Others complain that riders endanger pedestrians by ignoring traffic laws, riding on sidewalks and leaving the scooters wherever they feel like it.<\/p>\n<p>The flaw Zimperium discovered is similar to one discovered afflicting a Segway hoverboard in 2017. IOActive found it could <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/ibms-ai-loses-to-human-debater-but-remains-persuasive-technology\/\">gain full remote access to the hoverboard<\/a><\/span> by manually sending commands to the Segway app through Bluetooth updates without the need for authentication.<\/p>\n<p>Zimperium said it informed Xiaomi of the flaw. Xiaomi didn&#8217;t immediately respond to a request for comment.<\/p>\n<p><a href=\"https:\/\/www.cnet.com\/topics\/security\/\">Security<\/a>: Stay up-to-date on the latest in breaches, hacks, fixes and all those cybersecurity issues that keep you up at night.<\/p>\n<p><a href=\"https:\/\/cms.cnet.com\/hub\/cmsframework\/reroute\/content_feature\/60e43c79-3b00-4eda-ac81-b79fb49310d2#link=%7B%22linkText%22:%22Blockchain%20Decoded%22,%22assetType%22:%22feature%22,%22uuid%22:%2260e43c79-3b00-4eda-ac81-b79fb49310d2%22,%22slug%22:%22blockchain-decoded%22,%22role%22:%22content_link%22,%22href%22:%22https:\/\/www.cnet.com\/blockchain-decoded\/%\">Blockchain Decoded<\/a>: CNET looks at the tech powering bitcoin &#8212; and soon, too, a myriad services that will change your life.<\/p>\n<footer class=\"row\"> <\/footer>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29819\/Xiaomi-Electric-Scooter-Reportedly-Vulnerable-To-Hijacking-Hack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25219,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[256],"class_list":["post-25218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-13T15:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"970\" \/>\n\t<meta property=\"og:image:height\" content=\"728\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack\",\"datePublished\":\"2019-02-13T15:01:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\"},\"wordCount\":418,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\",\"name\":\"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg\",\"datePublished\":\"2019-02-13T15:01:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg\",\"width\":970,\"height\":728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/","og_locale":"en_US","og_type":"article","og_title":"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-13T15:01:46+00:00","og_image":[{"width":970,"height":728,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack","datePublished":"2019-02-13T15:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/"},"wordCount":418,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg","keywords":["headline,hacker,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/","url":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/","name":"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg","datePublished":"2019-02-13T15:01:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack.jpg","width":970,"height":728},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/xiaomi-electric-scooter-reportedly-vulnerable-to-hijacking-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"Xiaomi Electric Scooter Reportedly Vulnerable To Hijacking Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25218"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25219"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}