{"id":29040,"date":"2019-09-12T14:25:33","date_gmt":"2019-09-12T14:25:33","guid":{"rendered":"http:\/\/b302dafd-d1f4-43c6-af72-981565fdb62a"},"modified":"2019-09-12T14:25:33","modified_gmt":"2019-09-12T14:25:33","slug":"hey-google-what-we-search-for-most-in-cybersecurity-cyber-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/","title":{"rendered":"Hey Google: What we search for most in cybersecurity .. cyber security?"},"content":{"rendered":"<p>In recent years, cybersecurity &#8212; or cyber security, depending on your preferred usage &#8212; has become a frequent topic.&nbsp;<\/p>\n<p>Escalating cases of fraud, cybercrime, and data breaches have ensured that terms relating to cybersecurity, whether it be phishing or account compromise, have <a href=\"https:\/\/www.zdnet.com\/article\/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government\/\" target=\"_blank\" rel=\"noopener noreferrer\">entered the consumer space<\/a> and are no longer just known by professionals in the industry.&nbsp;<\/p>\n<p>Google, as the provider of one of the most popular search engines in the world, can provide an interesting resource to find out what areas of cybersecurity we are interested in, how threats are evolving &#8212; alongside our knowledge of them &#8212; and which vulnerabilities and attacks have gained the most widespread attention.&nbsp;<\/p>\n<p>This week, incident response platform Redscan published the <a href=\"https:\/\/www.redscan.com\/wp-content\/uploads\/2019\/09\/Redscan-Report_-Cyber-Security-In-Search_Sept19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">results of research<\/a> (.PDF) into Google cybersecurity-related search trends and their popularity based on Google Trends data from 2004 &#8211; 2019.<\/p>\n<p>The most-searched-for public figure in the industry is <a href=\"https:\/\/www.techrepublic.com\/article\/shark-tanks-herjavec-tells-how-to-get-one-of-3-5m-cybersecurity-jobs-that-will-be-open-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\">Robert Herjavec<\/a>, investor and CEO of IT security firm Herjavec Group. Searches for Herjavec take place four times as often as those for <a href=\"https:\/\/www.zdnet.com\/article\/infamous-hacker-kevin-mitnick-sniffs-fiber-reads-email\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kevin Mitnick<\/a>, dubbed the &#8220;world&#8217;s most famous hacker&#8221; and now an active security consultant.&nbsp;<\/p>\n<p>In addition to Herjavec and Mitnick, John McAfee, Bruce Schneier, and Troy Hunt are in the top five most searched-for security professionals.&nbsp;<\/p>\n<p>The cybersecurity companies that most commonly feature on general Google searches are Norton, Avast, AVG, Kaspersky, and ESET. When it comes to <a href=\"https:\/\/www.techrepublic.com\/article\/enterprises-may-be-clouding-up-their-security-future\/\" target=\"_blank\" rel=\"noopener noreferrer\">enterprise-related<\/a> queries, Symantec, Fortinet, Akamai, Mimecast, and FireEye are the most popular, according to Redscan.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/google-discloses-vulnerability-in-chrome-os-built-in-security-key-feature\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google discloses vulnerability in Chrome OS &#8216;built-in security key&#8217; feature<\/a><\/p>\n<p>If you receive a strange call from an unknown number, you may take to a search engine to see if the number has been connected to scams by other people. In the same manner, <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing emails<\/a> pretending to be legitimate brands are also continually searched for, and the report shows that <a href=\"https:\/\/www.zdnet.com\/topic\/apple\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> is a name continually abused by fraudsters. &nbsp;<\/p>\n<p>The iPad and iPhone maker snagged the top spot as the most-searched-for brand in relation to phishing scams, followed by PayPal, HMRC, Amazon, and NatWest.<\/p>\n<p>To date, Equifax has the dubious honor of being the company most commonly connected to searches related to data breaches. The credit monitoring agency <a href=\"https:\/\/www.zdnet.com\/article\/equifax-regulators-sign-700m-deal-to-settle-data-breach-lawsuits\/\" target=\"_blank\" rel=\"noopener noreferrer\">was compromised in 2017<\/a>, leading to the exposure of sensitive data belonging to almost 150 million people.&nbsp;<\/p>\n<p>Given the mammoth data breach&#8217;s reach and impact, it is not surprising that Equifax is the most-searched-for data breach. While the majority of queries were made at the time of disclosure, there has been a recent uptick likely owing to a settlement reached between the company and the US Federal Trade Commission (FTC).&nbsp;<\/p>\n<p>&#8220;The fact that Equifax disclosed the breach late and communicated details poorly may also have had an impact on search behavior, driving people to find out whether their details had been stolen,&#8221; Redscan says. &#8220;Indeed, interest in the Equifax data breach is so high that it skews all historical searches for the term &#8216;data breach.'&#8221;<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2019\/09\/12\/6f61cfcd-1904-4609-afd6-5799bb7fe5ea\/resize\/470xauto\/10771b49b60d086088144f1aca596a5f\/screenshot-2019-09-12-at-14-54-20.png\" class alt=\"screenshot-2019-09-12-at-14-54-20.png\" height=\"auto\" width=\"470\"><\/span> <span class=\"credit\">Redscan<\/span><\/p>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/spotify-wants-to-know-where-you-live-and-will-be-checking-in\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\">Spotify wants to know where you live, and will be checking in<\/a><\/p>\n<p>Other data breaches of note that have been commonly searched for are <a href=\"https:\/\/www.zdnet.com\/article\/in-ashley-madisons-wake-heres-one-mans-story-of-sex-sorrow-and-extortion\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ashley Maddison<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/talktalk-customer-financial-details-found-through-google-search\/\" target=\"_blank\" rel=\"noopener noreferrer\">TalkTalk<\/a>, the <a href=\"https:\/\/www.zdnet.com\/article\/sony-settles-psn-hack-lawsuit-for-15-million\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sony PlayStation Network<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/yahoo-users-can-sue-over-data-breaches-judge-rules\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo<\/a>, and <a href=\"https:\/\/www.zdnet.com\/article\/us-charges-one-of-the-anthem-hackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anthem<\/a>.&nbsp;<\/p>\n<p>The vulnerabilities sometimes responsible for high-impact data breaches or those that may invade the nightmares of IT professionals are also searched for on a regular basis. Over the last decade, Heartbleed &#8212; a&nbsp; security flaw <a href=\"https:\/\/www.zdnet.com\/article\/how-to-recover-from-heartbleed\/\" target=\"_blank\" rel=\"noopener noreferrer\">disclosed in 2014<\/a> which impacted servers making use of OpenSSL&#8217;s 1.0.1 and 1.0.2-beta release &#8212; remains the most-searched-for security threat.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-to-enable-dns-over-https-in-firefox\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\">How to enable DNS-over-HTTPS in Firefox<\/a><\/p>\n<p>Indeed, despite the worldwide disruption caused by the <a href=\"https:\/\/www.zdnet.com\/article\/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry ransomware outbreak<\/a> and another severe hardware-based vulnerability called <a href=\"https:\/\/www.zdnet.com\/article\/researchers-discover-seven-new-meltdown-and-spectre-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Meltdown<\/a> also reaching global news, neither is as popular as search queries.&nbsp;<\/p>\n<p>It also seems that traditional security terms are on the decline, with searches for terms including &#8216;keylogger&#8217; and &#8216;antivirus&#8217; reducing in popularity. Instead, Google Trends data suggests that endpoint and cloud-based security is on the up, with a gradual increase in the search for terms such as cloud security, SIEM, Mobile Device Management (MDM), bring your own device (BYOD), and IoT security.<\/p>\n<p>As a final point of interest, it seems we are yet to decide on whether we prefer cybersecurity or cyber security. Cyber security is more popular in worldwide searches, but in the US, cybersecurity remains the preferred option.&nbsp;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/hey-google-what-we-search-for-most-in-cybersecurity\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google search data reveals the most popular hacker in the world, alongside the cybersecurity topics we care most about.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29041,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-29040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hey Google: What we search for most in cybersecurity .. cyber security? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hey Google: What we search for most in cybersecurity .. cyber security? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-12T14:25:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"470\" \/>\n\t<meta property=\"og:image:height\" content=\"584\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hey Google: What we search for most in cybersecurity .. cyber security?\",\"datePublished\":\"2019-09-12T14:25:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/\"},\"wordCount\":763,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/\",\"name\":\"Hey Google: What we search for most in cybersecurity .. cyber security? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png\",\"datePublished\":\"2019-09-12T14:25:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png\",\"width\":470,\"height\":584},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hey Google: What we search for most in cybersecurity .. cyber security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hey Google: What we search for most in cybersecurity .. cyber security? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Hey Google: What we search for most in cybersecurity .. cyber security? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-09-12T14:25:33+00:00","og_image":[{"width":470,"height":584,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hey Google: What we search for most in cybersecurity .. cyber security?","datePublished":"2019-09-12T14:25:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/"},"wordCount":763,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/","url":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/","name":"Hey Google: What we search for most in cybersecurity .. cyber security? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png","datePublished":"2019-09-12T14:25:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security.png","width":470,"height":584},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hey-google-what-we-search-for-most-in-cybersecurity-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hey Google: What we search for most in cybersecurity .. cyber security?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29040"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29040\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29041"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}