{"id":25445,"date":"2019-02-20T15:02:56","date_gmt":"2019-02-20T15:02:56","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29848\/Google-Admits-Error-Over-Hidden-Microphone.html"},"modified":"2019-02-20T15:02:56","modified_gmt":"2019-02-20T15:02:56","slug":"google-admits-error-over-hidden-microphone","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/","title":{"rendered":"Google Admits Error Over Hidden Microphone"},"content":{"rendered":"<figure class=\"media-landscape has-caption full-width lead\"><span class=\"image-and-copyright-container\"> <img loading=\"lazy\" decoding=\"async\" class=\"js-image-replace\" alt=\"Nest Guard\" src=\"https:\/\/ichef.bbci.co.uk\/news\/320\/cpsprodpb\/F23B\/production\/_105711026_82eb509f-d892-4cb2-af98-6f5d85d205e3.jpg\" width=\"976\" height=\"549\"\/><span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Google<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> The Nest Guard contained a microphone, but Google did not disclose that in the product&#8217;s specifications <\/span> <\/figcaption><\/figure>\n<p class=\"story-body__introduction\">Google has acknowledged that it made an error in not disclosing that one of its home alarm products contained a microphone.<\/p>\n<p><a href=\"https:\/\/nest.com\/alarm-system\/tech-specs\/\" class=\"story-body__link-external\">Product specifications for the Nest Guard,<\/a> available since 2017, had made no mention of the listening device. <\/p>\n<p>But <a href=\"https:\/\/www.blog.google\/products\/assistant\/nest-secure-google-assistant\/\" class=\"story-body__link-external\">earlier this month, the firm said a software update<\/a> would make Nest Guard voice-controlled. <\/p>\n<p>On Twitter, concerned Nest owners were told the microphone &#8220;has not been used up to this point\u201d.<\/p>\n<p>Business Insider <a href=\"https:\/\/www.businessinsider.com\/nest-microphone-was-never-supposed-to-be-a-secret-2019-2?r=US&amp;IR=T\" class=\"story-body__link-external\">was first to report the development.<\/a><\/p>\n<p>The Nest Guard is one component in the Nest Secure range of home security products. The system includes various sensors that can be monitored remotely by the user. <\/p>\n<p>Nest Guard is an all-in-one alarm, keypad, and motion sensor but, despite being announced well over a year ago, the word \u201cmicrophone\u201d was only added to the product\u2019s specification this month. <\/p>\n<p>The change coincided with the announcement that it was now compatible with Google Assistant. <\/p>\n<figure class=\"media-landscape has-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Google<\/span> <\/span><figcaption class=\"media-caption\"><span class=\"off-screen\">Image caption<\/span> <span class=\"media-caption__text\"> The Nest Guard acts as a way to arm and disarm the firm&#8217;s home security alarm system by use of a code or tap of a key fob <\/span> <\/figcaption><\/figure>\n<p>In response to criticism, Google said on Tuesday: &#8220;The on-device microphone was never intended to be a secret and should have been listed in the tech specs. That was an error on our part.\u201d <\/p>\n<p>It added: \u201cThe microphone has never been on and is only activated when users specifically enable the option.<\/p>\n<p>&#8220;Security systems often use microphones to provide features that rely on sound sensing. We included the mic on the device so that we can potentially offer additional features to our users in the future, such as the ability to detect broken glass.\u201d <\/p>\n<p>The firm&#8217;s mea culpa has been accepted as genuine by many company watchers, but some say it still raises significant privacy concerns.<\/p>\n<p>&#8220;This is the kind of thing that makes me paranoid of smart home devices,&#8221; <a href=\"https:\/\/pxlnv.com\/linklog\/google-nest-secure-microphone\/\" class=\"story-body__link-external\">commented Nick Heer<\/a>, who writes the Pixel Envy blog.<\/p>\n<p>&#8220;If I owned one of these things and found out that the world&#8217;s biggest advertising company hid a microphone in my home for a year, I&#8217;d be livid.&#8221;<\/p>\n<p>UK-based privacy campaign group Big Brother Watch added: &#8220;Many of our worries about smart home devices appear to be proving true&#8230; Google should be held to account for wrongly advertising this product.&#8221;<\/p>\n<p>Nest Guard went on sale in the US last year as part of Google&#8217;s Secure alarm system. A European and Canadian release is also planned but has yet to occur.<\/p>\n<p>Nest, a company known for its smart thermostat, was acquired by Google in February 2014, for a reported $3.2bn (\u00a32.5bn). <\/p>\n<p>The acknowledgment comes days after <a href=\"https:\/\/www.cnet.com\/news\/airplane-seat-cameras-could-be-your-new-spy-in-the-sky\/\" class=\"story-body__link-external\">Singapore Airlines faced criticism<\/a> for installing cameras into the backs of some of its planes&#8217; seats as part of a new in-flight entertainment system.<\/p>\n<figure class=\"media-landscape no-caption full-width\"><span class=\"image-and-copyright-container\"> <span class=\"off-screen\">Image copyright<\/span> <span class=\"story-image-copyright\">Twitter<\/span> <\/span> <\/figure>\n<p>The company confirmed the cameras&#8217; existence on Sunday, but <a href=\"https:\/\/twitter.com\/SingaporeAir\/status\/1097124503178616832\" class=\"story-body__link-external\">said they had been disabled<\/a> and added that it had no plans to use them.<\/p>\n<p>____<\/p>\n<p><i>Additional reporting by Leo Kelion<\/i><\/p>\n<p><i>Follow Dave Lee on Twitter <\/i><a href=\"http:\/\/twitter.com\/daveleebbc\" class=\"story-body__link-external\">@DaveLeeBBC<\/a><\/p>\n<p><i>Do you have more information about this or any other technology story? You can reach Dave directly and securely through encrypted messaging app Signal on: +1 (628) 400-7370 <\/i><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29848\/Google-Admits-Error-Over-Hidden-Microphone.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25446,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5896],"class_list":["post-25445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacygooglespyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google Admits Error Over Hidden Microphone 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Admits Error Over Hidden Microphone 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-20T15:02:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/google-admits-error-over-hidden-microphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"320\" \/>\n\t<meta property=\"og:image:height\" content=\"180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google Admits Error Over Hidden Microphone\",\"datePublished\":\"2019-02-20T15:02:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/\"},\"wordCount\":561,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/google-admits-error-over-hidden-microphone.jpg\",\"keywords\":[\"headline,privacy,google,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/\",\"name\":\"Google Admits Error Over Hidden Microphone 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/google-admits-error-over-hidden-microphone.jpg\",\"datePublished\":\"2019-02-20T15:02:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/google-admits-error-over-hidden-microphone.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/google-admits-error-over-hidden-microphone.jpg\",\"width\":320,\"height\":180},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-admits-error-over-hidden-microphone\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,google,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacygooglespyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Google Admits Error Over Hidden Microphone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Admits Error Over Hidden Microphone 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/","og_locale":"en_US","og_type":"article","og_title":"Google Admits Error Over Hidden Microphone 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-20T15:02:56+00:00","og_image":[{"width":320,"height":180,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/google-admits-error-over-hidden-microphone.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google Admits Error Over Hidden Microphone","datePublished":"2019-02-20T15:02:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/"},"wordCount":561,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/google-admits-error-over-hidden-microphone.jpg","keywords":["headline,privacy,google,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/","url":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/","name":"Google Admits Error Over Hidden Microphone 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/google-admits-error-over-hidden-microphone.jpg","datePublished":"2019-02-20T15:02:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/google-admits-error-over-hidden-microphone.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/google-admits-error-over-hidden-microphone.jpg","width":320,"height":180},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-admits-error-over-hidden-microphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,google,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacygooglespyware\/"},{"@type":"ListItem","position":3,"name":"Google Admits Error Over Hidden Microphone"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25445"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25445\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25446"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}