{"id":26862,"date":"2019-04-19T07:06:03","date_gmt":"2019-04-19T07:06:03","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/"},"modified":"2019-04-19T07:06:03","modified_gmt":"2019-04-19T07:06:03","slug":"old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/","title":{"rendered":"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance"},"content":{"rendered":"<p>The last few months have seen a big increase in malware attacks using PDF email attachments, according to security firm SonicWall.<\/p>\n<p>&#8220;Increasingly, email, Office documents and now PDFs are the vehicle of choice for malware and fraud in the cyber landscape,&#8221; said the outfit&#8217;s Bill Conner.<\/p>\n<p>There&#8217;s nothing new in this, of course, but many recent attacks have relied on getting users to click links in emails leading to infected webpages instead of requiring them to open an attachment, as was traditional.<\/p>\n<p>In many cases, targeted PDFs use zero-day exploits for browsers in order to increase the probability of a successful attack as on-the-ball businesses now patch their systems more quickly to protect against known exploits. Other attacks have been known to nick login details by tricking the user into opening malicious PDFs that use remote document loading mechanisms to capture and leak your credentials.<\/p>\n<p>The infosec firm said its sandbox products had found 47,000 new attack variants using PDF attachments last year. This year they have detected over 73,000 new attacks in March alone \u2013&nbsp;and more than 173,000 new variants altogether in the first quarter of 2019. The attacks were a mixture of actual malware and links to infected sites.<\/p>\n<p>As t&#8217;was ever thus, the emails use social engineering strategies to offer promises of lucrative deals and pretend to be trusted sources to encourage people to click on the attached PDFs.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/06\/20\/acrobat-v1.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Quite possibly the first software package in the world to provide Help in a PDF file.\"><\/p>\n<h2 title=\"A worthy lesson in nifty programming and embracing standards\">How a tax form kludge gifted the world 25 joyous years of PDF<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/06\/21\/how_a_tax_form_kludge_gave_us_25_years_of_pdf\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>SonicWall&#8217;s report naturally pushes its own security solutions for the issue, but that&#8217;s a notable uptick in PDF attacks nonetheless. The firm, which was bought by Dell in 2012 and then spun out four years later, sells hardware, software and cloud-based security products to small and medium firms and government agencies.<\/p>\n<p>Martin Holste, cloud security CTO at FireEye, said in his company&#8217;s <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.fireeye.com\/current-threats\/annual-threat-report\/cyber-security-predictions.html\">recent predictions report<\/a> that the danger of email attack remains high and shows little sign of disappearing.<\/p>\n<p>&#8220;Perhaps the number one thing for cloud security is email security, because phishing is just so hard to defend against. That&#8217;s the number one way that attackers are coming through, and we don&#8217;t expect that to change in 2019.&#8221;<\/p>\n<p>FireEye expects social engineering coupled with email to be the most common form of attack, because it works \u2013 and the best defence is well-trained staff.<\/p>\n<p>Wind the clock forward <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2007\/10\/26\/microsoft_scrambles_to_fix_windows\/\">12 years<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2007\/07\/23\/spammers_switch_to_pdf\/\">and it seems<\/a> not much has changed in the world of phishy malware-flingers. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7146\/top-5-threat-hunting-myths?td=wptl1810\">Top 5 Threat Hunting Myths<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/04\/19\/pdf_malware_warning\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s go back&#8230; way back The last few months have seen a big increase in malware attacks using PDF email attachments, according to security firm SonicWall.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26863,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-26862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Old-school cruel: Dodgy PDF email attachments enjoying a renaissance 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-19T07:06:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance\",\"datePublished\":\"2019-04-19T07:06:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/\"},\"wordCount\":427,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/\",\"name\":\"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg\",\"datePublished\":\"2019-04-19T07:06:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/","og_locale":"en_US","og_type":"article","og_title":"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-19T07:06:03+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance","datePublished":"2019-04-19T07:06:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/"},"wordCount":427,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/","url":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/","name":"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg","datePublished":"2019-04-19T07:06:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/old-school-cruel-dodgy-pdf-email-attachments-enjoying-a-renaissance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Old-school cruel: Dodgy PDF email attachments enjoying a renaissance"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26862"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26863"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}