{"id":28551,"date":"2019-08-19T13:22:58","date_gmt":"2019-08-19T13:22:58","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543187"},"modified":"2019-08-19T13:22:58","modified_gmt":"2019-08-19T13:22:58","slug":"xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/","title":{"rendered":"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR"},"content":{"rendered":"<div class=\"post-text\" readability=\"71.892890698403\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/09\/iStock-898079502.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Real enterprises are messy places. One messy reality is that enterprises don\u2019t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric.<\/p>\n<p>On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network. On the other end are places like some large banking and R&amp;D companies that can manage about 98 or 99%. A financial services company that was spending millions of dollars on getting from 96% to achieving 98%, using the very good reasoning that they were \u201ccutting their biggest security problem in half\u201d rather than \u201c2%, meh.\u201d So even the very best enterprises can have unmanaged endpoints that can be more easily exploited than ones with a security agent deployed on them. A lot of the advanced security we\u2019ve been delivering on the last few years has been focused on this problem.<\/p>\n<p>EDR s an example of how stealthy or evasive attackers can be better uncovered than with traditional endpoint protection. EDR is great for endpoints they are on. Ian Lee of NTUC gives a killer example of uncovering stealthy attacks using EDR and MDR <a href=\"https:\/\/blog.trendmicro.com\/customer-perspective-catching-the-thief-lurking-in-the-shadows-with-edr-and-mdr\/\">here<\/a>.<\/p>\n<p>But most of EDR\u2019s capabilities are for endpoints they are on: ones they manage. Sure there\u2019s some herd-immunity with EDR that the greater number of managed endpoints the harder it is for an attacker to move laterally or deeper. But more capable, patient, and stealthy attackers are getting better at being evasive, knowing that EDR may be or is deployed. Mark Nunnikhoven does a great job in <a href=\"https:\/\/blog.trendmicro.com\/cyberattack-lateral-movement-explained\/\">this post<\/a> talking about lateral movement.<\/p>\n<p>EDR can only go so far on its own to help spot attacks that are exceptionally low and slow, and\/or using unmanaged endpoints. Endpoint security needs to step outside the endpoint silo to keep step with advanced attackers. An attack using many hops could see movement between managed endpoints, IoT, email, network components, containers and cloud-based servers over the course of many months. The delivery and reconnaissance could involve multiple protocols, emails, payloads, files, and credentials. Pulling together the tenuous and ephemeral threads of such an intentional attack needs more modern tools, rather than hoping we stumble on a supply of highly advanced threat hunters.<\/p>\n<p>Pulling together deep security information from across your enterprise is what is needed to face off against such advanced and intentionally evasive attacks. XDR is intended to be that security data lake of deeper enterprise infrastructure and security information than we\u2019ve previously gathered in a single addressable pool and designed to be useful for threat hunters and analysts. In these posts <a href=\"https:\/\/blog.trendmicro.com\/why-xdr-is-a-big-deal-and-is-different-from-siem-and-platforms\/\">here<\/a> and <a href=\"https:\/\/blog.trendmicro.com\/xdr-needs-network-data-and-heres-why\/\">here<\/a> we talk about what XDR is and how it brings in more sources, such as network data.<\/p>\n<p>In the game of measure-countermeasure that is cybersecurity today and tomorrow, XDR is the next evolutionary step in dealing with more evasive threats.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Real enterprises are messy places. One messy reality is that enterprises don\u2019t manage all their endpoints. A smart colleague turned me onto using the % of endpoints and servers managed as a prime security metric. On one end of the spectrum are places like universities that maybe manage 10% of the endpoints on their network&#8230;.<br \/>\nThe post XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28552,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1413,1414,307,7272],"class_list":["post-28551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-endpoint","tag-managed-detection-and-response","tag-security","tag-xdr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-19T13:22:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR\",\"datePublished\":\"2019-08-19T13:22:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg\",\"keywords\":[\"Endpoint\",\"Managed Detection and Response\",\"Security\",\"XDR\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\",\"name\":\"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg\",\"datePublished\":\"2019-08-19T13:22:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg\",\"width\":300,\"height\":169},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/endpoint\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/","og_locale":"en_US","og_type":"article","og_title":"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-19T13:22:58+00:00","og_image":[{"width":300,"height":169,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR","datePublished":"2019-08-19T13:22:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg","keywords":["Endpoint","Managed Detection and Response","Security","XDR"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/","url":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/","name":"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg","datePublished":"2019-08-19T13:22:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr.jpg","width":300,"height":169},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/xdr-is-the-best-remedy-as-attackers-increasingly-seek-to-evade-edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Endpoint","item":"https:\/\/www.threatshub.org\/blog\/tag\/endpoint\/"},{"@type":"ListItem","position":3,"name":"XDR Is The Best Remedy As Attackers Increasingly Seek To Evade EDR"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28551"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28552"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}