{"id":2571,"date":"2018-06-12T15:47:46","date_gmt":"2018-06-12T15:47:46","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29037\/Bug-Allowed-Hackers-To-Make-Malware-Look-Like-Apple-Software.html"},"modified":"2018-06-12T15:47:46","modified_gmt":"2018-06-12T15:47:46","slug":"bug-allowed-hackers-to-make-malware-look-like-apple-software","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/","title":{"rendered":"Bug Allowed Hackers To Make Malware Look Like Apple Software"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/5b1ef201706a880007ca3717\/lede\/1528755049886-shutterstock_491191732.jpeg?crop=1xw:0.84375xh;center,center&amp;resize=1200:*\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>For years, hackers could hide malware alongside legitimate Apple code and sneak it past several popular third-party security products for Mac computers, according to new research. This is not a flaw in MacOS but an issue in how third-party security tools implemented Apple\u2019s APIs.<\/p>\n<p>A researcher from security firm Okta found that several security products for Mac\u2014including Little Snitch, xFence, and Facebook\u2019s OSquery\u2014could be tricked into believing malware was Apple code, and let it past their defenses.<\/p>\n<p>\u201cI can take malicious code and make it look like it\u2019s signed by Apple,\u201d Josh Pitts, the security researcher at Okta who discovered these bugs, told Motherboard.<\/p>\n<p class=\"article__blockquote\"><strong><em>Got a tip? You can contact this reporter securely on Signal at +1 917 257 1382, OTR chat at lorenzo@jabber.ccc.de, or email lorenzo@motherboard.tv<\/em><\/strong><\/p>\n<p><a href=\"https:\/\/www.okta.com\/security-blog\/2018\/06\/issues-around-third-party-apple-code-signing-checks\/\" target=\"_blank\">In a blog post published Tuesday<\/a>, Pitts explained that the issue lies with how the third-party security tools implemented Apple\u2019s code-signing APIs when dealing with Mac\u2019s executable files known as Universal or Fat files. Code-signing is a mechanism that checks files to see if they are signed with digital certificate, which should mean that the code is authentic and comes from the firm that signed it. In the case of Apple\u2019s MacOS, if a file is signed by Apple, the computer is programmed to trust it. But Pitts found that he could bundle malicious files with legitimate Apple-signed code and effectively make the malware look like it was signed by Apple. That way, some third-party tools did not detect the malware.<\/p>\n<p>\u201cIf your security tools are telling you the file is signed by Apple what are you supposed to do?\u201d Pitts added.<\/p>\n<p>Pitts identified the following security tools as vulnerable: Google Santa, Facebook OSquery, Little Snitch, xFence, Yelp\u2019s OSXCollector, Carbon Black\u2019s Cb Response and several of Objective See\u2019s tools.<\/p>\n<p>The researcher said all of them have patches ready that fix the issue.<\/p>\n<p class=\"article__blockquote\"><strong><em>Read more:<\/em><\/strong> <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8xa4ka\/iphone-jailbreak-life-death-legacy\" target=\"_blank\"><strong><em>The Life, Death, and Legacy of iPhone Jailbreaking<\/em><\/strong><\/a><\/p>\n<p>A Google spokesperson confirmed that Santa has been patched, and the company <a href=\"https:\/\/github.com\/google\/santa\/releases\/tag\/0.9.25\" target=\"_blank\">credited<\/a> Pitts for the discovery.<\/p>\n<p>A Facebook spokesperson also thanked Pitts and said the issue was fixed \u201din the latest version of OSquery, which is already available for download.\u201d<\/p>\n<p>F-Secure said in a statement that it already pushed an automatic update to xFENCE that fixes the issue.<\/p>\n<p>Yelp sent the following statement: \u201cOSXCollector is a tool used for internal forensics on Mac computers. This vulnerability was responsibly disclosed to us and, as an interim solution, we have disabled the code signing check functionality which can be bypassed by this vulnerability. Yelp&#8217;s data and users were never at risk due to this vulnerability, but we will disclose this change to other OSXCollector users who may have relied on this functionality. A more comprehensive fix may be released in the future.&#8221;<\/p>\n<p>Google,, Objective Development, and Carbon Black did not respond to Motherboard\u2019s request for comment.<\/p>\n<p>Patrick Wardle, the developer of Objective See\u2019s free Mac security tools, said that part of the issue was that Apple\u2019s APIs were \u201cconfusing,\u201d an assessment that Pitts agreed with. Apple said the company is in the process of updating its documentation.<\/p>\n<p>\u201cThe code signing APIs are a bit confusing, because if you say, \u2018please validate this file\u2019 it can say, &#8216;yes, everything looks good&#8217;\u2014even if the programs in the Fat file are signed by two different code signers,\u201d Wardle told Motherboard. \u201cIf it&#8217;s signed by Apple, everything will come back OK, even if there is a second program in the file, that is signed by the hacker, that will be the code that is executed, when the file is run.\u201d<\/p>\n<p>If you use any of the security products listed above, patch, patch, patch.<\/p>\n<p><em>This piece was updated to include Facebook and F-Secure&#8217;s comments.<\/em><\/p>\n<p><strong><em>Get six of our favorite Motherboard stories every day<\/em><\/strong> <a href=\"http:\/\/motherboard.club\/\" target=\"_blank\"><strong><em>by signing up for our newsletter<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29037\/Bug-Allowed-Hackers-To-Make-Malware-Look-Like-Apple-Software.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2572,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1187],"class_list":["post-2571","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflawapplecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bug Allowed Hackers To Make Malware Look Like Apple Software 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bug Allowed Hackers To Make Malware Look Like Apple Software 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-12T15:47:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3000\" \/>\n\t<meta property=\"og:image:height\" content=\"1687\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Bug Allowed Hackers To Make Malware Look Like Apple Software\",\"datePublished\":\"2018-06-12T15:47:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/\"},\"wordCount\":664,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg\",\"keywords\":[\"headline,flaw,apple,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/\",\"name\":\"Bug Allowed Hackers To Make Malware Look Like Apple Software 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg\",\"datePublished\":\"2018-06-12T15:47:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg\",\"width\":3000,\"height\":1687},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bug-allowed-hackers-to-make-malware-look-like-apple-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,apple,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawapplecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bug Allowed Hackers To Make Malware Look Like Apple Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bug Allowed Hackers To Make Malware Look Like Apple Software 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/","og_locale":"en_US","og_type":"article","og_title":"Bug Allowed Hackers To Make Malware Look Like Apple Software 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-12T15:47:46+00:00","og_image":[{"width":3000,"height":1687,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Bug Allowed Hackers To Make Malware Look Like Apple Software","datePublished":"2018-06-12T15:47:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/"},"wordCount":664,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg","keywords":["headline,flaw,apple,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/","url":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/","name":"Bug Allowed Hackers To Make Malware Look Like Apple Software 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg","datePublished":"2018-06-12T15:47:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/bug-allowed-hackers-to-make-malware-look-like-apple-software.jpg","width":3000,"height":1687},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bug-allowed-hackers-to-make-malware-look-like-apple-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,apple,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawapplecryptography\/"},{"@type":"ListItem","position":3,"name":"Bug Allowed Hackers To Make Malware Look Like Apple Software"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2571"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2572"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}