{"id":29778,"date":"2019-10-18T11:23:13","date_gmt":"2019-10-18T11:23:13","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/"},"modified":"2019-10-18T11:23:13","modified_gmt":"2019-10-18T11:23:13","slug":"how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/","title":{"rendered":"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/08\/11\/lock_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>University of Cambridge researchers and UK industry bods have been tossed \u00a336m from the UK government to support their work with Arm to strengthen security by improving memory protection.<\/p>\n<p>As part of the &#8220;Digital Security by Design&#8221; scheme, part of the funding will be funnelled into the research team&#8217;s Morello project to create a prototype platform to demonstrate how Capability Hardware Enhanced RISC Instructions (CHERI) can work.<\/p>\n<p>Business secretary Andrea Leadsom said that while doing the basics \u2013 strong passwords and keeping software updated \u2013 remained important, businesses can also benefit from innovations in defence technology to deal with future threats.<\/p>\n<p>Minister for Digital and Broadband Matt Warman <a target=\"_blank\" href=\"https:\/\/www.gov.uk\/government\/news\/confronting-cyber-threats-to-businesses-and-personal-data\" rel=\"noopener noreferrer\">said<\/a>: &#8220;The government wants the UK to be the safest place to be online and the best place to start and grow a digital business. As these investments show, we are determined to create the right environment to foster our thriving digital economy while giving people renewed confidence and trust in online services.&#8221;<\/p>\n<p>CHERI aims to improve security by strengthening memory protection to provide systems with better protection from unknown vulnerabilities and attempted exploits.<\/p>\n<p>CHERI is the result of a 10-year DARPA-funded research project, led by Robert N M Watson, Simon Moore and Peter Sewell at the University of Cambridge&#8217;s Department of Computer Science and Technology, and by Peter G Neumann at SRI International (once known as the Stanford Research Institute).<\/p>\n<p>The next step is to check that the proposed design for Morello will provide the promised security benefits. The team claims this will be the first time that formal proof has been applied to the security of a mainstream computing architecture.<\/p>\n<p>There&#8217;s more on the project from the University of Cambridge <a target=\"_blank\" href=\"https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/cheri\/\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>As part of the funding, there is also a call for teams of social scientists to apply for \u00a33m to research the behavioural and adoption challenges of making systems secure. But interested boffins better be quick \u2013 <a target=\"_blank\" href=\"https:\/\/esrc.ukri.org\/funding\/funding-opportunities\/iscf-digital-security-by-design-social-science-hub\/\" rel=\"noopener noreferrer\">expressions of interest must be in by 15 November<\/a>. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1858\/-7813\/how-to-get-more-from-microstrategy-by-optimising-your-data-stack?td=wptl1858\">How to get more from MicroStrategy by optimising your data stack<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/10\/18\/arm_security_by_design_research\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>That&#8217;s &#8216;Capability Hardware Enhanced RISC Instructions&#8217; University of Cambridge researchers and UK industry bods have been tossed \u00a336m from the UK government to support their work with Arm to strengthen security by improving memory protection.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29779,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-29778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-18T11:23:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research\",\"datePublished\":\"2019-10-18T11:23:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/\"},\"wordCount\":355,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/\",\"name\":\"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg\",\"datePublished\":\"2019-10-18T11:23:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg\",\"width\":648,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/","og_locale":"en_US","og_type":"article","og_title":"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-18T11:23:13+00:00","og_image":[{"width":648,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research","datePublished":"2019-10-18T11:23:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/"},"wordCount":355,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/","url":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/","name":"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg","datePublished":"2019-10-18T11:23:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research.jpg","width":648,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-does-36m-sound-mon-cheri-uk-gov-pumps-cash-into-arm-security-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How does \u00a336m sound, mon CHERI? UK.gov pumps cash into Arm security research"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29778"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29778\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29779"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}