{"id":26355,"date":"2019-03-25T14:52:10","date_gmt":"2019-03-25T14:52:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/"},"modified":"2019-03-25T14:52:10","modified_gmt":"2019-03-25T14:52:10","slug":"get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/","title":{"rendered":"Get trained to turn the tables on your computer adversaries at SANS Bucharest"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/10\/13\/cyber_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Promo<\/strong> Organisations can no longer afford to rely on prevention systems alone to protect them from increasingly numerous and determined adversaries who can find their way round most of today&#8217;s monitoring tools.<\/p>\n<p>If you are a security professional working as part of an incident response and prevention team, the SANS Institute&#8217;s training event in Bucharest, Romania from 6 to 11 May promises to deliver two immersive courses that will deepen the knowledge you need to keep your organisation safe from data breaches.<\/p>\n<p>Students have the chance to gain GIAC certification, and SANS pledges that they will be able to apply their new skills immediately.<\/p>\n<p>The courses are as follows:<\/p>\n<h3>Advanced incident response, threat hunting, and digital forensics<\/h3>\n<p>Once an attack gets past your security systems, the key is to catch the intrusion in progress rather than wait till the attackers have achieved their aim and wrought havoc on your data.<\/p>\n<p>Today&#8217;s fast-developing threat hunting techniques use known adversary behaviours to examine an organisation\u2019s network and endpoints. This course will show you how to recognise malware indicators and patterns of activity that enable you to spot potential intrusions.<\/p>\n<p>Topics include detecting when a breach has occurred, identifying compromised systems, performing damage assessments, containing and remedying incidents, and building up accurate threat intelligence on malicious actors.<\/p>\n<p>Instructor Francesco Picasso is co-founder of Reality Net System Solutions, an Italian company specialising in digital forensics.<\/p>\n<h3>Hacker tools, techniques, exploits and incident handling<\/h3>\n<p>The internet is full of powerful hacking tools and bad guys only too eager to use them so defenders need to understand their methods to keep their organisations safe from data breaches.<\/p>\n<p>This course will give you hands-on experience in finding vulnerabilities, discovering and responding to intrusions, and laying out a comprehensive incident handling plan. It addresses the latest cutting-edge insidious attack vectors as well as older, tried and tested forms of attack.<\/p>\n<p>In addition you will explore the legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement and handling evidence.<\/p>\n<p>Particularly suited to incident handling teams the course will also help general security practitioners, administrators and security architects understand how to design and operate safer systems.<\/p>\n<p><strong><a href=\"https:\/\/go.theregister.co.uk\/k\/sans-14478-3\">More information and registration details are here<\/a>.<\/strong><\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7146\/top-5-threat-hunting-myths?td=wptl1810\">Top 5 Threat Hunting Myths<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/03\/25\/train_to_turn_the_tables_on_your_computer_adversaries_at_sans_bucharest\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>May 2019: Two courses expose cybercriminals&#8217; tools and techniques Promo\u00a0 Organisations can no longer afford to rely on prevention systems alone to protect them from increasingly numerous and determined adversaries who can find their way round most of today&#8217;s monitoring tools.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26356,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-26355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Get trained to turn the tables on your computer adversaries at SANS Bucharest 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Get trained to turn the tables on your computer adversaries at SANS Bucharest 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T14:52:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Get trained to turn the tables on your computer adversaries at SANS Bucharest\",\"datePublished\":\"2019-03-25T14:52:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/\"},\"wordCount\":391,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/\",\"name\":\"Get trained to turn the tables on your computer adversaries at SANS Bucharest 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg\",\"datePublished\":\"2019-03-25T14:52:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Get trained to turn the tables on your computer adversaries at SANS Bucharest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Get trained to turn the tables on your computer adversaries at SANS Bucharest 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/","og_locale":"en_US","og_type":"article","og_title":"Get trained to turn the tables on your computer adversaries at SANS Bucharest 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-25T14:52:10+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Get trained to turn the tables on your computer adversaries at SANS Bucharest","datePublished":"2019-03-25T14:52:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/"},"wordCount":391,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/","url":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/","name":"Get trained to turn the tables on your computer adversaries at SANS Bucharest 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg","datePublished":"2019-03-25T14:52:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/get-trained-to-turn-the-tables-on-your-computer-adversaries-at-sans-bucharest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Get trained to turn the tables on your computer adversaries at SANS Bucharest"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26355"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26355\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26356"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}