{"id":28208,"date":"2019-08-02T22:11:30","date_gmt":"2019-08-02T22:11:30","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/"},"modified":"2019-08-02T22:11:30","modified_gmt":"2019-08-02T22:11:30","slug":"its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/","title":{"rendered":"It&#8217;s a bird! It&#8217;s a plane! No, it&#8217;s two-dozen government surveillance balloons over America"},"content":{"rendered":"<p>Uncle Sam is testing a system that uses high-altitude balloons to conduct surveillance over American soil.<\/p>\n<p>Government contractor Sierra Nevada Corporation \u2013 the aerospace company, not the brewery \u2013 has released balloons that will drift over a large area in the United States&#8217; Midwest, and form a network capable of monitoring and tracking activity on the ground over massive distances.<\/p>\n<p>The Pentagon-ordered tests, involving 25 balloons cruising at 65,000-odd feet, will run from July 12 to September 1. It is understood the craft are carrying radar equipment to track the movement of vehicles far below.<\/p>\n<p>Mid-July, Sierra Nevada successfully <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/apps.fcc.gov\/els\/GetAtt.html?id=233815&amp;x=\">filed the necessary paperwork<\/a> with America&#8217;s comms watchdog, the FCC, to obtain permits for wireless communications from the balloons. They will float over South Dakota and then move into neighboring Iowa, Minnesota, Wisconsin, Missouri, and Illinois. The filings sought permission for Sierra Nevada to use various radio frequencies over the area as well as inform those who are in the flight path of the trial.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/08\/24\/airlander_10_crash.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Airlander 10 crash\"><\/p>\n<h2 title=\"All together now: I like big butts but I cannot fly, you boffins can't deny...\">Watch the world&#8217;s biggest &#8216;flying bum&#8217; go arse over tit in a crash<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2016\/08\/24\/worlds_longest_aircraft_crash_lands\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Sierra Nevada did not return a request for comment on the report, though the FCC filing includes a passage in which the biz provides a brief description of its activities, stating it wants to &#8220;conduct high altitude MESH networking tests over South Dakota to provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats.&#8221;<\/p>\n<p>Meanwhile, The Guardian newspaper <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.theguardian.com\/us-news\/2019\/aug\/02\/pentagon-balloons-surveillance-midwest\">today noted<\/a> that Sierra Nevada&#8217;s other contracts with the US government are for small aircraft that have been equipped with cameras and sensors and used to provide images and surveillance in Mexico, Central America, and the Caribbean.<\/p>\n<p>It would stand to reason, then, that the balloon network would be designed to operate alongside, or as a replacement for, these light aircraft. By operating at 65,000 feet (19,812 meters) and using solar panels to power its radar and surveillance systems, the unmanned balloons would be able to stay in the air for days, far longer periods than the planes would.<\/p>\n<p>They would also, however, raise privacy concerns, particularly in this trial as the massive balloon network is going to be operated over populated American cities. Privacy advocates will be less than-thrilled to learn that the US military&#8217;s unmanned observation craft are floating over large parts of the Midwest. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/08\/02\/government_spy_balloons\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back at base, bugs in the software. Flash the message, &#8216;Something&#8217;s out there&#8217;&#8230; Floating in the summer sky, 99 Fed balloons go by Uncle Sam is testing a system that uses high-altitude balloons to conduct surveillance over American soil.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28209,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-28208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>It&#039;s a bird! It&#039;s a plane! No, it&#039;s two-dozen government surveillance balloons over America 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It&#039;s a bird! It&#039;s a plane! No, it&#039;s two-dozen government surveillance balloons over America 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-02T22:11:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"It&#8217;s a bird! It&#8217;s a plane! No, it&#8217;s two-dozen government surveillance balloons over America\",\"datePublished\":\"2019-08-02T22:11:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/\"},\"wordCount\":412,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/\",\"name\":\"It's a bird! It's a plane! No, it's two-dozen government surveillance balloons over America 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg\",\"datePublished\":\"2019-08-02T22:11:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"It&#8217;s a bird! It&#8217;s a plane! No, it&#8217;s two-dozen government surveillance balloons over America\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"It's a bird! It's a plane! No, it's two-dozen government surveillance balloons over America 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/","og_locale":"en_US","og_type":"article","og_title":"It's a bird! It's a plane! No, it's two-dozen government surveillance balloons over America 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-02T22:11:30+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"It&#8217;s a bird! It&#8217;s a plane! No, it&#8217;s two-dozen government surveillance balloons over America","datePublished":"2019-08-02T22:11:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/"},"wordCount":412,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/","url":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/","name":"It's a bird! It's a plane! No, it's two-dozen government surveillance balloons over America 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg","datePublished":"2019-08-02T22:11:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/its-a-bird-its-a-plane-no-its-two-dozen-government-surveillance-balloons-over-america\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"It&#8217;s a bird! It&#8217;s a plane! No, it&#8217;s two-dozen government surveillance balloons over America"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28208"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28208\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28209"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}