{"id":28775,"date":"2019-08-29T15:57:21","date_gmt":"2019-08-29T15:57:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30445\/US-Hack-Attack-Hobbles-Irans-Ability-To-Target-Oil-Tankers.html"},"modified":"2019-08-29T15:57:21","modified_gmt":"2019-08-29T15:57:21","slug":"us-hack-attack-hobbles-irans-ability-to-target-oil-tankers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/","title":{"rendered":"US Hack Attack Hobbles Iran&#8217;s Ability To Target Oil Tankers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/08\/tanker-800x521.jpg\" alt=\"Commercial oil tanker AbQaiq in 2003.\"><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/08\/tanker.jpg\" class=\"enlarge-link\" data-height=\"834\" data-width=\"1280\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Commercial oil tanker AbQaiq in 2003.<\/div>\n<aside id=\"social-left\" aria-label=\"Read the comments or share this article\">\n<h4 class=\"comment-count-before\"><a title=\"64 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers-nyt-says\/?comments=1\">reader comments<\/a><\/h4>\n<p><a title=\"64 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers-nyt-says\/?comments=1\"><span class=\"comment-count-number\">84<\/span> <span class=\"visually-hidden\">with 64 posters participating<\/span><\/a><\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/div>\n<\/aside>\n<p>Hackers working for the US government wiped out a database and computer systems that Iran\u2019s paramilitary arm used to plan attacks against oil tankers in the Persian Gulf, <a href=\"https:\/\/www.nytimes.com\/2019\/08\/28\/us\/politics\/us-iran-cyber-attack.html\">The New York Times reported on Wednesday<\/a>.<\/p>\n<p>The attack occurred on June 20, the same day that <a href=\"https:\/\/www.nytimes.com\/2019\/06\/20\/world\/middleeast\/iran-us-drone.html?module=inline\">President Trump called off a retaliatory airstrike<\/a> after Iran shot down a US drone. Iran is still trying to recover information destroyed in the attack and to restart Iranian computer systems and military communications networks that were taken offline, Wednesday\u2019s report said.<\/p>\n<p>The attack was part of a sustained and undeclared cyberconflict between the US and Iran. Both sides, the NYT said, calibrate their operations to ensure they don\u2019t reach the threshold considered to be war. The US operations, which are carried out by the US Cyber Command, are designed to influence Iran\u2019s actions without creating a broader conflict or prompting retaliation, a former senior intelligence official told the paper. Iran hasn\u2019t escalated its attacks since the June 20 attack and has instead continued its cyber operations against the US government and corporations at its previous, steady rate.<\/p>\n<p>Despite the success in degrading Tehran\u2019s ability to covertly target shipping traffic, some officials within the Trump administration have questioned whether the cost of the attack outweighed the benefit, since it likely revealed critical information about US hacking capabilities that previously wasn\u2019t known to Iran. By exploiting the vulnerability in Iran&#8217;s network, the US may have allowed Iran to patch a weakness the US has long relied on and may also have tipped off other adversaries. The <em>NYT<\/em> continued:<\/p>\n<blockquote>\n<p>\u201cIran is a sophisticated actor. They will look at what happened,\u201d said Mark Quantock, a retired major general who served as the director of intelligence for the United States Central Command, which oversees operations related to Iran. \u201cRussia, China, Iran and even North Korea would all be able to see how they were penetrated.\u201d<\/p>\n<p>Cyberstrikes also inevitably cut off access to intelligence that American operatives gained from exploiting that vulnerability, once the adversary discovers and fixes it. Losing even some access to the Islamic Revolutionary Guards Corps, Tehran\u2019s paramilitary force that is deeply involved with proxy forces around the Middle East, is a high price to pay, according to some officials.<\/p>\n<\/blockquote>\n<p>The database destroyed in the attacks helped Iran choose which tankers to target. No tankers have been targeted in significant covert attacks since the June 20 operation, although Iran did seize a British tanker to retaliate against the detention of one of its own ships. Although the effects of the US attack were always intended to be temporary, they have lasted longer than expected, and Iran is still trying to repair its communications systems and recover lost data.<\/p>\n<p>Senior officials discussed the results of the strike in part to quell doubts about its benefit.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30445\/US-Hack-Attack-Hobbles-Irans-Ability-To-Target-Oil-Tankers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28776,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7615],"class_list":["post-28775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusacyberwariranmilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>US Hack Attack Hobbles Iran&#039;s Ability To Target Oil Tankers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US Hack Attack Hobbles Iran&#039;s Ability To Target Oil Tankers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-29T15:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"US Hack Attack Hobbles Iran&#8217;s Ability To Target Oil Tankers\",\"datePublished\":\"2019-08-29T15:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg\",\"keywords\":[\"headline,hacker,government,usa,cyberwar,iran,military\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/\",\"name\":\"US Hack Attack Hobbles Iran's Ability To Target Oil Tankers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg\",\"datePublished\":\"2019-08-29T15:57:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg\",\"width\":800,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,cyberwar,iran,military\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusacyberwariranmilitary\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"US Hack Attack Hobbles Iran&#8217;s Ability To Target Oil Tankers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US Hack Attack Hobbles Iran's Ability To Target Oil Tankers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/","og_locale":"en_US","og_type":"article","og_title":"US Hack Attack Hobbles Iran's Ability To Target Oil Tankers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-29T15:57:21+00:00","og_image":[{"width":800,"height":521,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"US Hack Attack Hobbles Iran&#8217;s Ability To Target Oil Tankers","datePublished":"2019-08-29T15:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/"},"wordCount":501,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg","keywords":["headline,hacker,government,usa,cyberwar,iran,military"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/","url":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/","name":"US Hack Attack Hobbles Iran's Ability To Target Oil Tankers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg","datePublished":"2019-08-29T15:57:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers.jpg","width":800,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/us-hack-attack-hobbles-irans-ability-to-target-oil-tankers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,cyberwar,iran,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusacyberwariranmilitary\/"},{"@type":"ListItem","position":3,"name":"US Hack Attack Hobbles Iran&#8217;s Ability To Target Oil Tankers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28775"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28775\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28776"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}