{"id":26234,"date":"2019-03-20T19:22:29","date_gmt":"2019-03-20T19:22:29","guid":{"rendered":"http:\/\/c9441148-b0fb-4a60-b151-9650c5bb3e4f"},"modified":"2019-03-20T19:22:29","modified_gmt":"2019-03-20T19:22:29","slug":"att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/","title":{"rendered":"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls"},"content":{"rendered":"<p>AT&amp;T and Comcast announced today that they&#8217;ve successfully tested what they believe to be the first SHAKEN\/STIR-authenticated call between two different telecom networks.<\/p>\n<p><a href=\"https:\/\/transnexus.com\/whitepapers\/understanding-stir-shaken\/\" target=\"_blank\" rel=\"noopener noreferrer\">SHAKEN\/STIR<\/a> stands for Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR), and is a protocol for authenticating phone calls with the help of cryptographic certificates.<\/p>\n<p>The protocol was created to address the problem of call spoofing &#8211;calls that claim to come from a number or network, but they don&#8217;t.<\/p>\n<p>SHAKEN\/STIR works by the network operator where the call has originated &#8220;signining&#8221; the call using a certificate. The telecom operator on the receiving end of the call can verify it came from the network the call claims it originated by looking at its certificate and making a few cryptographic checks.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/03\/20\/2367b8ce-229e-4bad-a160-fa8d94dcc240\/0ae02d367efdf720c161408a3147459b\/shaken-stir-protocol.png\" class alt=\"SHAKEN\/STIR protocol\"><\/span> <span class=\"credit\">Image: TransNexus<\/span><\/p>\n<p>Work on the SHAKEN\/STIR protocol has been underway for a while, and until now, several telecom operators have tested it already, but with calls inside their respective networks, where they could verify that everything was working as intended and calls were getting signed correctly when made, and verified the right way when received.<\/p>\n<p>Today, AT&amp;T and Comcast said they carried out the first SHAKEN\/STIR call made between two different networks.<\/p>\n<p>&#8220;The test used phones on the companies&#8217; consumer networks &#8211; not in a lab or restricted to special equipment,&#8221; AT&amp;T said in a press release. &#8220;It was conducted March 5, between AT&amp;T Phone digital home service and Comcast&#8217;s Xfinity Voice home phone service.&#8221;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;The calls were successfully authenticated and verified using the SHAKEN\/STIR protocol &#8211; believed to be an industry first for calls between separate providers,&#8221; the US telco <a href=\"https:\/\/about.att.com\/story\/2019\/anti_robocall.html\" target=\"_blank\" rel=\"noopener noreferrer\">said<\/a>.<\/p>\n<p>The US Federal Telecommunications Committee has been <a href=\"https:\/\/www.fcc.gov\/call-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">pushing for SHAKEN\/STIR&#8217;s adoption<\/a> and has imposed the end of 2019 as a hard deadline for networks implementing the protocol.<\/p>\n<p>SHAKEN\/STIR won&#8217;t help stop robocalls (spam phone calls) completely, but they will help networks and end users spot them easier.<\/p>\n<p>Telcos will be able to mark calls that not have been SHAKEN\/STIR-signed as suspicious and consumer will be able to act on these warnings and turn down calls.<\/p>\n<p>Further, SHAKEN\/STIR will also be useful in fighting other types of telephony-based fraud, which is estimated to have caused losses of around <a href=\"https:\/\/www.zdnet.com\/article\/phone-fraudsters-are-stealing-billions-each-year-through-a-scheme-known-as-irsf\/\" target=\"_blank\">$38.1 billion<\/a> to telcos and their consumers.<\/p>\n<h3>Related security coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/at-t-comcast-successfully-test-shakenstir-protocol-for-fighting-robocalls\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AT&#038;T and Comcast successfully test first SHAKEN\/STIR-authenticated call between two different networks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-26234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-20T19:22:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AT&amp;T, Comcast successfully test SHAKEN\\\/STIR protocol for fighting robocalls\",\"datePublished\":\"2019-03-20T19:22:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/\",\"name\":\"AT&amp;T, Comcast successfully test SHAKEN\\\/STIR protocol for fighting robocalls 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png\",\"datePublished\":\"2019-03-20T19:22:29+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png\",\"width\":770,\"height\":372},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AT&amp;T, Comcast successfully test SHAKEN\\\/STIR protocol for fighting robocalls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/","og_locale":"en_US","og_type":"article","og_title":"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-20T19:22:29+00:00","og_image":[{"width":770,"height":372,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls","datePublished":"2019-03-20T19:22:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/"},"wordCount":413,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/","url":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/","name":"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png","datePublished":"2019-03-20T19:22:29+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls.png","width":770,"height":372},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/att-comcast-successfully-test-shaken-stir-protocol-for-fighting-robocalls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AT&amp;T, Comcast successfully test SHAKEN\/STIR protocol for fighting robocalls"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26234"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26234\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26235"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}