{"id":27936,"date":"2019-07-19T17:00:07","date_gmt":"2019-07-19T17:00:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/"},"modified":"2019-07-19T17:00:07","modified_gmt":"2019-07-19T17:00:07","slug":"israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/","title":{"rendered":"Israel&#8217;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#8217;ve misunderstood"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/10\/11\/trojan_horse.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Israeli spyware firm NSO Group has denied it developed malware that can steal user data from cloud services run by Amazon, Apple, Facebook, Google and Microsoft.<\/p>\n<p>The <em>Financial Times<\/em> <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/FinancialTimes\/status\/1152093753470906368\">reported<\/a> this morning that NSO&#8217;s Pegasus malware, which was previously known to be capable of slurping data from a phone handset, &#8220;has now evolved to capture the much greater trove of information stored beyond the phone, in the cloud, such as a full history of a target&#8217;s location data, archived messages or photo&#8221;.<\/p>\n<p>This means it can access iCloud and Google Drive backups. It was suggested by the FT that linked cloud accounts accessed through apps on the target device are also vulnerable to this style of full-take surveillance, based on sales pitch documents shown, among other places, to the Ugandan government.<\/p>\n<p>The Pink &#8216;Un reported that Pegasus is now capable of copying authentication keys of services including Google Drive, Facebook Messenger and iCloud from an infected device, &#8220;allowing a separate server to impersonate the phone, including its location&#8221;. The NSO sales document boasted this allowed spies operating the malware to bypass multi-factor authentification and access control warning emails.<\/p>\n<p>Most concerningly, the firm allegedly claimed that its access remained persistent even when the malware was removed from the target device.<\/p>\n<p>NSO Group was previously linked to the infamous &#8220;WhatsApp calls can pwn your mobe&#8221; malware <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/05\/14\/whatsapp_zero_day\/\" rel=\"noopener noreferrer\">discovered and patched earlier this year<\/a>. The business&#8217;s Pegasus malware was patched in 2016 by Apple after it was learned that they <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/09\/02\/macos_safari_security_update\/\" rel=\"noopener noreferrer\">also affected desktop versions of Safari and OSX<\/a>. A year later, however, a coalition of Mexican and Canadian investigators uncovered sustained efforts by the Mexican government to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/06\/19\/mexican_gov_accused_of_phone_hacking_citizens\/\" rel=\"noopener noreferrer\">use Pegasus for spying on local dissidents<\/a>.<\/p>\n<p>Mitigating this kind of attack ought to be a straightforward matter of resetting passwords and access tokens once the malware is cleansed from the infected device. Indeed, the FT mentions that this workaround was referenced in one of the pitch documents it had seen.<\/p>\n<p>The Israeli company told <em>The Reg<\/em>: &#8220;There is a fundamental misunderstanding of NSO, its services and technology. NSO&#8217;s products do not provide the type of collection capabilities and access to cloud applications, services, or infrastructure, as listed and suggested in today&#8217;s FT article.<\/p>\n<p>&#8220;Increasingly sophisticated terrorists and criminals are taking advantage of encrypted technologies to plan and conceal their crimes, leaving intelligence and law enforcement agencies in the dark and putting public safety and national security at risk. NSO&#8217;s lawful interception products are designed to confront this challenge.<\/p>\n<p>&#8220;Our products are licensed in small scale to legitimate government intelligence and law enforcement agencies for the sole purpose of preventing or investigating serious crime including terrorism.&#8221; \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/07\/19\/nso_group_malware_cloud_report\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After report claimed its sales pitches boasted of doing that Israeli spyware firm NSO Group has denied it developed malware that can steal user data from cloud services run by Amazon, Apple, Facebook, Google and Microsoft.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27937,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Israel&#039;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#039;ve misunderstood 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Israel&#039;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#039;ve misunderstood 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-19T17:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Israel&#8217;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#8217;ve misunderstood\",\"datePublished\":\"2019-07-19T17:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\"},\"wordCount\":469,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\",\"name\":\"Israel's NSO Group: Our malware? Slurp your cloud backups plus phone data? They've misunderstood 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg\",\"datePublished\":\"2019-07-19T17:00:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg\",\"width\":648,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Israel&#8217;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#8217;ve misunderstood\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Israel's NSO Group: Our malware? Slurp your cloud backups plus phone data? They've misunderstood 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/","og_locale":"en_US","og_type":"article","og_title":"Israel's NSO Group: Our malware? Slurp your cloud backups plus phone data? They've misunderstood 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-19T17:00:07+00:00","og_image":[{"width":648,"height":443,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Israel&#8217;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#8217;ve misunderstood","datePublished":"2019-07-19T17:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/"},"wordCount":469,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/","url":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/","name":"Israel's NSO Group: Our malware? Slurp your cloud backups plus phone data? They've misunderstood 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg","datePublished":"2019-07-19T17:00:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood.jpg","width":648,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/israels-nso-group-our-malware-slurp-your-cloud-backups-plus-phone-data-theyve-misunderstood\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Israel&#8217;s NSO Group: Our malware? Slurp your cloud backups plus phone data? They&#8217;ve misunderstood"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27936"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27936\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27937"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}