{"id":28585,"date":"2019-08-21T14:50:09","date_gmt":"2019-08-21T14:50:09","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543199"},"modified":"2019-08-21T14:50:09","modified_gmt":"2019-08-21T14:50:09","slug":"the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/","title":{"rendered":"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-300x169.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-1024x576.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-900x506.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/alejandro-garrido-navarro-SB5YUTJYbRM-unsplash-380x214.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Of course, the much-touted \u201cCybersecurity Skills Shortage\u201d isn\u2019t news to anyone, or it shouldn\u2019t be. For seven or more years, journalists, industry analysts and practitioners have been opining about it <a href=\"https:\/\/www.csoonline.com\/article\/3394876\/is-the-cybersecurity-skills-shortage-getting-worse.html\">one way<\/a> or <a href=\"https:\/\/www.zdnet.com\/article\/there-isnt-a-cybersecurity-skills-gap-rik-ferguson\/\">another<\/a>. Analyses and opinions vary on how we have reached this impasse, my own being that this is a largely self-inflicted crisis caused by proscriptive hiring practices and unreasonable job requirements, but the outcome remains the same. We have too few people doing too much work, with too many tools and too few meaningful resources.<\/p>\n<p>The typical SOC of today is drowning in a volume of alerts. In the financial world for example 60% of banks routinely deal with 100,000+ alerts every day, with 17% of them <a href=\"https:\/\/www.americanbanker.com\/news\/alert-there-are-too-many-cybersecurity-alerts\">reporting<\/a> 300,000+ security alerts, according to research carried out by Ovum, and this pattern is repeated across industry verticals.<\/p>\n<p>There is no way that the typical Security Operations Center is staffed to the levels required to be able to triage these alerts, meaning that a large proportion of them are simply never actioned (read ignored). Of those that do eventually see a pair of eyes, it hardly seems worth the effort. An <a href=\"https:\/\/www.enterprisemanagement.com\/research\/asset.php\/3441\/InfoBrief:-A-Day-in-the-Life-of-a-Cyber-Security-Pro\">EMA report<\/a> all the way back in 2017 found that analysts were spending around half an hour investigating each incident with much of the time being spent either downgrading alerts marked as critical (46%) or otherwise reprioritizing (52%) and identifying false positives (31%).<\/p>\n<p>This deluge of information, coupled with a focus on small, repetitive and often manual tasks are critical components contributing to fatigue, boredom, and a feeling of powerlessness in the workplace. A <a href=\"https:\/\/newsroom.trendmicro.com\/press-release\/commercial\/trend-micro-finds-one-third-cybersecurity-staff-feel-isolated-business\">recent survey carried out by Trend Micro<\/a> revealed that IT teams are under significant pressure, with some of the challenges cited including prioritizing emerging threats (47%) and keeping track of a fractured security environment (43%). The survey showed that they are feeling the weight of this responsibility, with many (34%) stating that the burden they are under has led their job satisfaction to decrease over the past 12 months. It\u2019s not just the SOC analysts either. In that same survey one third of IT executives told us that they felt completely isolated in their role.<\/p>\n<p>Workplace pressure at these levels is simply not sustainable, fatigue leads to neglect, neglect to mistakes, and mistakes lead to burnout, further reducing the available talent pool and dissuading others from ever entering into the industry, it\u2019s a vicious circle.<\/p>\n<p>This security event flood is exacerbated by the fact that the majority of organizations rely on large numbers of specialized and disconnected tools. Many of the alerts that analysts are dealing with are often different views of the same object, or duplicate notifications from discrete security tools. The Ovum report I mentioned above notes that almost half their respondents (47%) told them that only one in five events is actually related to a unique security event.<\/p>\n<p>In fact, Security Operations Centers are drowning in threat data, all the while thirsting for meaningful threat intelligence.<\/p>\n<p><em><a href=\"https:\/\/www.poetryfoundation.org\/poems\/43997\/the-rime-of-the-ancient-mariner-text-of-1834\">Water, water everywhere and all the boards did shrink,<\/a><\/em><\/p>\n<p><em><a href=\"https:\/\/www.poetryfoundation.org\/poems\/43997\/the-rime-of-the-ancient-mariner-text-of-1834\">Water, water everywhere nor any drop to drink<\/a><\/em>.<\/p>\n<p>A recent blog post by my friend and colleague Greg Young laid out his reasoning on \u201c<a href=\"https:\/\/blog.trendmicro.com\/why-xdr-is-a-big-deal-and-is-different-from-siem-and-platforms\/\">Why XDR is a big deal and is different from SIEM and Platforms<\/a>.\u201d And a truly mature XDR technology, with feature rich APIs, collecting, correlating, triaging, reporting and perhaps even remediating (to a certain level) must represent the direction of travel for the SOC of the near future.<\/p>\n<p>We are not going to solve the skills shortage within a decade; arguably, we are not going to solve it at all, particularly if we continue to focus on filling the gap with human brains. The problem is not in the potential recruitment pipeline, it is in the actual data pipeline and that is where technology must play the lead role. An AI driven Tier I SOC platform able to scale with the continually increasing volume of data, automating and accelerating initial analysis, the creation of incident context, chasing down patient zero through an automated root cause analysis. Such a system would present the human Escalation Analysts with aggregated data in a logical attack-centric progression automating the <em>Monitor<\/em>, <em>Prevent<\/em>, <em>Detect<\/em> and <em>Investigate<\/em> roles and providing the SOC analyst with actionable threat intelligence for real <em>Response<\/em> and <em>Remediation<\/em>.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/the-sky-has-already-fallen\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of course, the much-touted \u201cCybersecurity Skills Shortage\u201d isn\u2019t news to anyone, or it shouldn\u2019t be. For seven or more years, journalists, industry analysts and practitioners have been opining about it one way or another. Analyses and opinions vary on how we have reached this impasse, my own being that this is a largely self-inflicted crisis&#8230;<br \/>\nThe post The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28586,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[375,307,2577,7272],"class_list":["post-28585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-business","tag-security","tag-skills-gap","tag-xdr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-21T14:50:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet)\",\"datePublished\":\"2019-08-21T14:50:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\"},\"wordCount\":720,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg\",\"keywords\":[\"Business\",\"Security\",\"Skills Gap\",\"XDR\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\",\"name\":\"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg\",\"datePublished\":\"2019-08-21T14:50:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg\",\"width\":300,\"height\":169},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/business\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/","og_locale":"en_US","og_type":"article","og_title":"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-21T14:50:09+00:00","og_image":[{"width":300,"height":169,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet)","datePublished":"2019-08-21T14:50:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/"},"wordCount":720,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg","keywords":["Business","Security","Skills Gap","XDR"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/","url":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/","name":"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet) 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg","datePublished":"2019-08-21T14:50:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet.jpg","width":300,"height":169},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-sky-has-already-fallen-you-just-havent-seen-the-alert-yet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Business","item":"https:\/\/www.threatshub.org\/blog\/tag\/business\/"},{"@type":"ListItem","position":3,"name":"The Sky Has Already Fallen (you just haven\u2019t seen the alert yet)"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28585"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28586"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}