{"id":32248,"date":"2019-12-11T17:35:00","date_gmt":"2019-12-11T17:35:00","guid":{"rendered":"https:\/\/www.darkreading.com\/application-security\/younger-generations-drive-bulk-of-2fa-adoption\/d\/d-id\/1336581"},"modified":"2019-12-11T17:35:00","modified_gmt":"2019-12-11T17:35:00","slug":"younger-generations-drive-bulk-of-2fa-adoption","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/","title":{"rendered":"Younger Generations Drive Bulk of 2FA Adoption"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header>\n<\/header>\n<p><span class=\"strong black\">Use of two-factor authentication has nearly doubled in the past two years , pointing to a new wave of acceptance.<\/span> <\/p>\n<p class>Adoption of two-factor authentication (2FA) is rapidly increasing, particularly among people aged 18-34, as consumers grow concerned with protecting online accounts from data breaches.<\/p>\n<p>When Duo Labs researchers set out to learn more about adoption and perception of 2FA in 2017, they learned 56% of Americans polled had never heard of the technology. Only 28% used 2FA on at least one website or app. Over the past two years, that adoption has increased &#8211; reaching 51%.<\/p>\n<p>In their new State of the Auth report released this week, Duo analysts shared the results of a second census-representative survey designed to measure 2FA usage in the United States. By 2019, the researchers found, 77% of people surveyed had heard of 2FA, up from 44% two years prior.<\/p>\n<p>Sean Frazier, Advisory CISO with Duo, says there are several reasons why consumers have become more familiar with 2FA. &#8220;Now, people are starting to see these things in their personal lives,&#8221; he explains. Banks and tech companies are encouraging customers to use 2FA for accounts and devices. Newscasters reporting on data breaches now mention 2FA as an option for stronger consumer security.<\/p>\n<p>&#8220;You&#8217;re seeing it come up in basic conversations about security hygiene,&#8221; Frazier continues. Indeed, much has changed in the years since Duo&#8217;s initial poll: Apple released Face ID in its iPhone X, GDPR was fully enforced throughout the EU, and WebAuth was published as a W3C recommendation. Businesses have increasingly implemented 2FA requirements for employees, broadening adoption.<\/p>\n<p>These shifts arrive at a time when a growing amount of data points to the <a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/farewell-dear-password-the-future-of-identity-and-authorization\/b\/d-id\/1335265\" target=\"_blank\" rel=\"noopener noreferrer\">unreliability<\/a> of password-based authentication. Only 32% of US respondents to the Duo survey reported using strong, complex passwords. Password reuse, rampant among <a href=\"https:\/\/www.darkreading.com\/informationweek-home\/password-reuse-abounds-new-survey-shows\/d\/d-id\/1331689\" target=\"_blank\" rel=\"noopener noreferrer\">consumers<\/a> and <a href=\"https:\/\/www.darkreading.com\/endpoint\/nearly-half-of-security-pros-reuse-passwords-\/d\/d-id\/1332314\" target=\"_blank\" rel=\"noopener noreferrer\">security pros<\/a> alike, is at the core of incidents like the <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/password-reuse-misconfiguration-blamed-for-repository-compromises\/d\/d-id\/1334624\" target=\"_blank\" rel=\"noopener noreferrer\">compromise<\/a> of developer repositories on Bitbucket, GitHub, and GitLab.<\/p>\n<p>SMS-based authentication remains the most popular 2FA factor at 72% usage, followed by email (57%), authenticator app (36%), and phone callback (30%). SMS was also the most popular answer when respondents were asked about their preferred authentication factor, indicating their familiarity with this option makes it more convenient and appealing.<\/p>\n<p>&#8220;We want to make sure that even though we have to add friction to the user experience, we want it to be as minimal as possible,&#8221; Frazier explains. While security experts have <a href=\"https:\/\/www.darkreading.com\/endpoint\/cracking-2fa-how-its-done-and-how-to-stay-safe\/d\/d-id\/1331835\" target=\"_blank\" rel=\"noopener noreferrer\">discovered<\/a> flaws with SMS authentication, it&#8217;s &#8220;better than nothing&#8221; if it&#8217;s your only option, he continues.<\/p>\n<p>Researchers asked participants which three online accounts they were most concerned with securing. Banking and financial accounts came out on top (85%), followed by communications and social media (32%), health (28%), retail (25%), and utilities (24%). Lack of concern for email accounts was &#8220;counterintuitive,&#8221; they note <a href=\"https:\/\/duo.com\/blog\/the-2019-state-of-the-auth-report-has-2fa-hit-mainstream-yet\" target=\"_blank\" rel=\"noopener noreferrer\">in the report<\/a>. In the absence of 2FA, email is usually the source of identity for financial accounts. If an attacker can successfully compromise an email account, they can likely change credentials for other accounts without raising red flags.<\/p>\n<p>&#8220;If you&#8217;re compromised once, you&#8217;re compromised everywhere,&#8221; Frazier points out.<\/p>\n<p><strong>Gaming Pays Off<\/strong><\/p>\n<p>A closer look at the demographic data shows younger users are at the forefront of 2FA adoption: 69% of users aged 18-24 use 2FA, as do 68% of those aged 25-34. The percentage drops for users among ages 35-44 (58%), 45-54 (49%), 55-64 (49%), and older than 65 (33%).<\/p>\n<p>Part of the reason for this could be younger users&#8217; stronger familiarity with technology. As Frazier points out, gamers have been using 2FA for several years. As schools include tech and security in curricula, kids will continue to develop a greater understanding of basic security.<\/p>\n<p>Frazier emphasizes the importance of encouraging awareness at the building block level with kids in schools, and continuing as they grow up and enter the workplace. &#8220;Apple, Google, and Microsoft have done a pretty good job of building this into their ecosystems,&#8221; he continues. &#8220;As they are pervasive, it will make people intrinsically understand how these things work.&#8221;<\/p>\n<p>He anticipates by this time next year, consumers will report greater familiarity with, and adoption of, other authentication methods like security keys. In this year&#8217;s survey, security keys were considered by those who used them to be efficient, secure, and easy to use.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<p> <span class=\"italic\">Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance &amp; Technology, where she covered financial &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/younger-generations-drive-bulk-of-2fa-adoption\/d\/d-id\/1336581?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use of two-factor authentication has nearly doubled in the past two years , pointing to a new wave of acceptance. Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/younger-generations-drive-bulk-of-2fa-adoption\/d\/d-id\/1336581?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-32248","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Younger Generations Drive Bulk of 2FA Adoption 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Younger Generations Drive Bulk of 2FA Adoption 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-11T17:35:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Younger Generations Drive Bulk of 2FA Adoption\",\"datePublished\":\"2019-12-11T17:35:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/\"},\"wordCount\":754,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/\",\"name\":\"Younger Generations Drive Bulk of 2FA Adoption 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2019-12-11T17:35:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/younger-generations-drive-bulk-of-2fa-adoption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Younger Generations Drive Bulk of 2FA Adoption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Younger Generations Drive Bulk of 2FA Adoption 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/","og_locale":"en_US","og_type":"article","og_title":"Younger Generations Drive Bulk of 2FA Adoption 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-11T17:35:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Younger Generations Drive Bulk of 2FA Adoption","datePublished":"2019-12-11T17:35:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/"},"wordCount":754,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/","url":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/","name":"Younger Generations Drive Bulk of 2FA Adoption 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2019-12-11T17:35:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/younger-generations-drive-bulk-of-2fa-adoption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Younger Generations Drive Bulk of 2FA Adoption"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32248"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32248\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}