{"id":25524,"date":"2019-02-22T17:04:21","date_gmt":"2019-02-22T17:04:21","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542702"},"modified":"2019-02-22T17:04:21","modified_gmt":"2019-02-22T17:04:21","slug":"trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/","title":{"rendered":"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST"},"content":{"rendered":"<div class=\"post-text\" readability=\"55.552087397581\"><img loading=\"lazy\" decoding=\"async\" width=\"193\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/av-1-193x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/av-1-193x300.jpg 193w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/02\/av-1.jpg 344w\" sizes=\"auto, (max-width: 193px) 100vw, 193px\"\/><\/p>\n<p>February 21, 2019. If the main criterion for judging the value of a security application is how well it protects your computer from web and email threats, malware and viruses, then both users and potential users of <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/internet-security.html\">Trend Micro Internet Security<\/a> will be happy to hear that the product has been given a <a href=\"https:\/\/www.av-test.org\/en\/news\/av-test-awards-2018-go-to-trend-micro\/\">\u201cBest Protection\u201d Award<\/a> for the whole of 2018 by <a href=\"https:\/\/www.av-test.org\/en\/\">AV-TEST<\/a>, the premier independent security testing lab, located in Magdeburg, Germany. With one of the largest collections of malware samples in the world, the AV-TEST Institute guarantees its results on an internationally-recognized level, unbiased by third parties or the idiosyncrasies of individual product reviewers.<\/p>\n<p>What the award requires is peak performance in the targeted category throughout the test year in question. \u00a0Since a core factor in AV-TEST\u2019s evaluation is against real-world threats as they arise across the internet, testing of the leading security products\u2014typically between eighteen to twenty products\u2014is a monthly affair. However, consistency and high security results across all twelve months of testing is the main criterion highlighted here. The fact that Trend Micro Internet Security has won a Best Protection Award across the monthly tides of emerging malware means that everyday users can rely upon the product\u2014and of course, Trend Micro\u2014beyond the monthly fluctuations in competitive test results, which are often visible in any given month.<\/p>\n<p>In short, AV-TEST\u2019s Best Protection Award for 2018, given today to Trend Micro Internet Security and four others, is based upon an objective, scientific evaluation over a twelve-month period against seventeen other competing security products. When we say that Trend Micro Internet Security is simply the best antivirus software that users can buy to protect their Windows PC, the AV-TEST results and the Best Protection Award for 2018, provide the hard facts to back that up statement.<\/p>\n<p>For more information about the Trend Micro Security family of products, go to <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome.html\">Trend Micro Security For Home<\/a>.<\/p>\n<p>To evaluate or buy the verifiably best protection for your PC, go to <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/internet-security.html\">Trend Micro Internet Security<\/a>.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>February 21, 2019. If the main criterion for judging the value of a security application is how well it protects your computer from web and email threats, malware and viruses, then both users and potential users of Trend Micro Internet Security will be happy to hear that the product has been given a \u201cBest Protection\u201d&#8230;<br \/>\nThe post Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25525,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[715,390],"class_list":["post-25524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-av-test","tag-consumer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-22T17:04:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"193\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST\",\"datePublished\":\"2019-02-22T17:04:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/\"},\"wordCount\":348,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg\",\"keywords\":[\"AV-TEST\",\"Consumer\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/\",\"name\":\"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg\",\"datePublished\":\"2019-02-22T17:04:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg\",\"width\":193,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AV-TEST\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/av-test\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-22T17:04:21+00:00","og_image":[{"width":193,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST","datePublished":"2019-02-22T17:04:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/"},"wordCount":348,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg","keywords":["AV-TEST","Consumer"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/","url":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/","name":"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg","datePublished":"2019-02-22T17:04:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test.jpg","width":193,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trend-micro-internet-security-wins-a-best-protection-award-for-2018-from-av-test\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AV-TEST","item":"https:\/\/www.threatshub.org\/blog\/tag\/av-test\/"},{"@type":"ListItem","position":3,"name":"Trend Micro Internet Security Wins a \u201cBest Protection\u201d Award for 2018 from AV-TEST"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25524"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25525"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}